From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 714E445610 for ; Fri, 12 Jul 2024 13:03:57 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 66404402E5; Fri, 12 Jul 2024 13:03:57 +0200 (CEST) Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2059.outbound.protection.outlook.com [40.107.237.59]) by mails.dpdk.org (Postfix) with ESMTP id ADB6440261 for ; Fri, 12 Jul 2024 13:03:55 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TKf5Q2kBbzYs+OTTZwrvOsJphqsQbfFP9YwJA7S/F9UjD+IcPZ2i/7pok8u6bDh/Ep0qZmcvPTRZkUTdUK1Gqp73rZttJdZz05/CjkdmhVx9mcmSpqbJW/kAn+V1Dt3cj5RjfLjl4kP4gxS5AFzG+9JDiG4CxgvcdU1WfsHixyJikV8Bavu86T3hXpipvtuU82q5R6D1PBcYRqMCCwar1uRvq65aIZgUr4OYhBdoqttN8jcAKDSE/NWIQarTaX8CI1muWzXxQ30jSDKvUluUtwVugxqq3cLDMeFnLES4Bp/W3mBZFDLPmEdeen1aiWE4lIxiaCI7lEQHlcmmVAoyNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=f5huVkIj2o+yfxnevEP32ZY2phbz1uG03tHztWuvtlA=; b=CEduv2Uy5fRvck0nyA9mdnTGFe4TeEgRLm8hKtDYcZYoMJhNSciHBsXlLw69tMU5iZWqFJI2TfZ4VESPFkr16vg7N2mHDlTI5A6XZS7QtWxdVU8d9VAWylCtLjORP6P98R+AsrIMPFVjfRs0h+VJ4iZa2FirUPVNBj/ypEOcOlT/Wj0Cz5+dCaNRx0ubPy2xt7W4JDGgd5sGIZt0NBlEMzfzJyGLvbYiHZ+bbYk3KU0ItnOf4cF6AG/CHK3syYPeZ9l1NWggxNCoMpHzPxSFk3mxTdmuzxu02TZdTUdmQ80Dy1ig9y/Mu2tz8l4+WVTusNSklmAr7+0yeo7q3YKoSw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=intel.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f5huVkIj2o+yfxnevEP32ZY2phbz1uG03tHztWuvtlA=; b=iHZPqPKeHbTP7SNkxFicFFHCMlygQ5o8qswMSO2B+CXo1W0qpCYWbt/QmTFtxyWvkwJMEfTXv2MYAmkI/DrUSvCxUfng1PKtf5A8pHGi9S1dZ2y+5Uhx17r7U3yqRf+lA6iYuWB7lf07rc9WQ8wp/3af3YPql9NrBfbRCbBteH2N01HwY17TbfcJMe4bF1w0N23inFGNyKK7ybxeBub2CI/2QOqsoRF2ywt86JZfIiTNvcDfVVgHzZMXtNvoGF+0QOczzwmjsyC8HuZ5KsPg8Ajqwe8QEbr0coYD6CRw+UtfuBq8ozIXRGkfttjstEY/HgEg4H+wuD1cU4XbKhgPDg== Received: from SJ0PR03CA0002.namprd03.prod.outlook.com (2603:10b6:a03:33a::7) by DM4PR12MB6613.namprd12.prod.outlook.com (2603:10b6:8:b8::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.41; Fri, 12 Jul 2024 11:03:52 +0000 Received: from SJ5PEPF000001EC.namprd05.prod.outlook.com (2603:10b6:a03:33a:cafe::f7) by SJ0PR03CA0002.outlook.office365.com (2603:10b6:a03:33a::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.23 via Frontend Transport; Fri, 12 Jul 2024 11:03:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by SJ5PEPF000001EC.mail.protection.outlook.com (10.167.242.200) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.17 via Frontend Transport; Fri, 12 Jul 2024 11:03:51 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 12 Jul 2024 04:03:41 -0700 Received: from nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 12 Jul 2024 04:03:39 -0700 From: Xueming Li To: Arkadiusz Kusztal CC: Ciara Power , dpdk stable Subject: patch 'test/crypto: fix RSA cases in QAT suite' has been queued to stable release 23.11.2 Date: Fri, 12 Jul 2024 19:01:48 +0800 Message-ID: <20240712110153.309690-18-xuemingl@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240712110153.309690-1-xuemingl@nvidia.com> References: <20240712104528.308638-1-xuemingl@nvidia.com> <20240712110153.309690-1-xuemingl@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF000001EC:EE_|DM4PR12MB6613:EE_ X-MS-Office365-Filtering-Correlation-Id: af8ce249-8c4b-4c94-bab5-08dca2625060 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|376014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?B/TQwY9fkaWTtfViDWI0040EeDnD+Yurj0rsM0mAKcDYUonYosXrW04dE7Yy?= =?us-ascii?Q?oQo/YPHFb3FewfX1603IHRqUS+sKjcaanERvVCFNFSIV7Yjaoo+C8B9bhDd9?= =?us-ascii?Q?lAm4lpF3vYT/6O4mM20T/V0mUH/bk44I9U34kG7iVeQLXtWWwZC0C6Mu6swQ?= =?us-ascii?Q?xs5WMbmtHgwSBXKYcYhK4WGDs0+0lJFRSL6ylxwaOUc0EBK8YxMb6xc8PDvX?= =?us-ascii?Q?Zvew2Pn87tPQVWwD/MB+WAfzoVx325mjWC5rONTFDSgOwjJOTIZ3JPEmGqGL?= =?us-ascii?Q?WEJEt4e84bESa+xIqBC5hU48o0k35PBRUd/usae5K5nLeNQdTIXwmY2E4RON?= =?us-ascii?Q?fkHKYIKiHJVIQp6/su36ndu+Kt0h+4ZqrSLJYqpwK5LhLLeh8G2l/gsF/J9C?= =?us-ascii?Q?G4+1k9KBPwr0mXl6DRbwDh/OsEYAK1hiJSYFrS0a5SxmO7XvCepmAJYauNtW?= =?us-ascii?Q?vgEulF+tCsxIXj2cRfOcl6CaSNmDNk0eBzY4L0OTC3e9ubQoaWS7yOP8ZNij?= =?us-ascii?Q?NDmYItikidEvcMpTt37v1cDYmY2/Y0YgHueUegP2bukYCHTD07zQX6Al1nQg?= =?us-ascii?Q?4TZ20Ow3gu+yBxVGwpGCfNT9Ncshj2JqoJODhzgIYyrn78FRzbMHDepehdYP?= =?us-ascii?Q?1IJBQhN1NYorZoSsCHUcFWcIkshKZc55Y9mwvQvbadgRv1thhU67K1CDm21w?= =?us-ascii?Q?rCs+H5vZNJBgEUC3FuPaxinayaqTxWxlRoIVjd425IYvXAyHuxuElus+XScf?= =?us-ascii?Q?bo21kTq4X3vi4fo9mC3eP1p6M71LRU7AxHxHntolSEyTYg8n+IGHsOv/3PZr?= =?us-ascii?Q?q1IjGgOlOT+R83ffPRE3GwTOk6EFOnk5CzXJIhn/uq7pZODpGp5bf78YYcdw?= =?us-ascii?Q?vpPS5aCvaBRe/MPBg2aAMoN1eOohCpugzG5sb2N0QyVyVo69nsSewshuAoj8?= =?us-ascii?Q?pFPGAc2OT41RzMeyoyjFEGiUqj5peJE9cJACq4zbqlkM6UgpbXvRT5LCAQys?= =?us-ascii?Q?N6oPQaCovyO4b/nQtvfRHuuf3+AepRmq1jIeOQ4do0u/3kpEweNr3jC54GIj?= =?us-ascii?Q?2dkinyLEh//+M8mCeOY9s3Olp/F3em7nI9+0umd733KFLl8Liy2C6Jo7jp21?= =?us-ascii?Q?jfwbkkrstq4iuSRPAvLdSJYXgpq1m4z2qOSkE3AQZInhcnfKEPHbDnW+lUr7?= =?us-ascii?Q?bop2CcMG/5xZTQQcLptLv83vjp5hAfknmOYSUcPR09TwjQs6f190AgD/Cq88?= =?us-ascii?Q?lFIAd0DMoTj5iLO568Ub/drTLln1N6DtKmpoM5l1eshnotgl2p7L8p9NYRdm?= =?us-ascii?Q?OG1h+ah1Y7x9cYlYR7hCqinClmrXkynOJ0XGRFrd/nXLjgRXBZ/XoujY8P3t?= =?us-ascii?Q?axp74wa1p2QcbDdli37Rs3vhtSmYzqRI7v2Z4EUqz4mqnXEWkutk2QDkTMiB?= =?us-ascii?Q?gncGSMX3UoIAPyxyt4r/ulzh6lJn1knK?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(376014)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jul 2024 11:03:51.8466 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: af8ce249-8c4b-4c94-bab5-08dca2625060 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF000001EC.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB6613 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 23.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 07/14/24. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://git.dpdk.org/dpdk-stable/log/?h=23.11-staging This queued commit can be viewed at: https://git.dpdk.org/dpdk-stable/commit/?h=23.11-staging&id=acf2e69c23da6fffec152a67baa4af7fd6860472 Thanks. Xueming Li --- >From acf2e69c23da6fffec152a67baa4af7fd6860472 Mon Sep 17 00:00:00 2001 From: Arkadiusz Kusztal Date: Thu, 21 Mar 2024 08:35:02 +0000 Subject: [PATCH] test/crypto: fix RSA cases in QAT suite Cc: Xueming Li [ upstream commit 226f1ca0c1d7e16d87b601c380983c2167b4bef7 ] This commit fixes following issues in the QAT testsuite for the RSA algorithm: 1) Incorrectly set keys in the internal functions are now set in the calling function. 2) Camel case functions were changed to the snake case. Fixes: 9b5465867fb8 ("test/crypto: add RSA none padding cases") Signed-off-by: Arkadiusz Kusztal Acked-by: Ciara Power --- app/test/test_cryptodev_asym.c | 102 ++++++++++----------- app/test/test_cryptodev_rsa_test_vectors.h | 2 +- 2 files changed, 52 insertions(+), 52 deletions(-) diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index 17daf734e8..2c745a7f7c 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -3292,11 +3292,8 @@ modular_multiplicative_inverse(const void *test_data) arg.qt.coef.data = coef; \ arg.qt.coef.length = vector->coef.len -typedef void (*rsa_key_init_t)(struct rte_crypto_asym_xform *, - const struct rsa_test_data_2 *); - static int -RSA_Encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf) +rsa_encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf) { self->result_op = NULL; /* Compute encryption on the test vector */ @@ -3314,7 +3311,7 @@ RSA_Encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf) } static int -RSA_Decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext, +rsa_decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext, const int use_op) { uint8_t cipher[TEST_DATA_SIZE] = { 0 }; @@ -3335,41 +3332,14 @@ RSA_Decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext, return 0; } -static void -RSA_key_init_Exp(struct rte_crypto_asym_xform *xform, - const struct rsa_test_data_2 *vector) -{ - SET_RSA_PARAM(xform->rsa, vector, n); - SET_RSA_PARAM(xform->rsa, vector, e); - SET_RSA_PARAM(xform->rsa, vector, d); - xform->rsa.key_type = RTE_RSA_KEY_TYPE_EXP; -} - -static void -RSA_key_init_CRT(struct rte_crypto_asym_xform *xform, - const struct rsa_test_data_2 *vector) -{ - SET_RSA_PARAM(xform->rsa, vector, n); - SET_RSA_PARAM(xform->rsa, vector, e); - SET_RSA_PARAM_QT(xform->rsa, vector, p); - SET_RSA_PARAM_QT(xform->rsa, vector, q); - SET_RSA_PARAM_QT(xform->rsa, vector, dP); - SET_RSA_PARAM_QT(xform->rsa, vector, dQ); - SET_RSA_PARAM_QT(xform->rsa, vector, qInv); - xform->rsa.key_type = RTE_RSA_KEY_TYPE_QT; -} - static int -RSA_Init_Session(const struct rsa_test_data_2 *vector, - rsa_key_init_t key_init) +rsa_init_session(struct rte_crypto_asym_xform *xform) { const uint8_t dev_id = params->valid_devs[0]; struct rte_cryptodev_info dev_info; - struct rte_crypto_asym_xform xform = { }; int ret = 0; - key_init(&xform, vector); - xform.xform_type = RTE_CRYPTO_ASYM_XFORM_RSA; + xform->xform_type = RTE_CRYPTO_ASYM_XFORM_RSA; rte_cryptodev_info_get(dev_id, &dev_info); if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) { @@ -3377,7 +3347,7 @@ RSA_Init_Session(const struct rsa_test_data_2 *vector, "Device doesn't support decrypt op with quintuple key type. Test skipped\n"); return TEST_SKIPPED; } - ret = rte_cryptodev_asym_session_create(dev_id, &xform, + ret = rte_cryptodev_asym_session_create(dev_id, xform, params->session_mpool, &self->sess); if (ret < 0) { RTE_LOG(ERR, USER1, @@ -3388,17 +3358,23 @@ RSA_Init_Session(const struct rsa_test_data_2 *vector, } static int -KAT_RSA_Encrypt(const void *data) +kat_rsa_encrypt(const void *data) { uint8_t cipher_buf[TEST_DATA_SIZE] = {0}; const struct rsa_test_data_2 *vector = data; - int ret = RSA_Init_Session(vector, RSA_key_init_Exp); + struct rte_crypto_asym_xform xform = { }; + + SET_RSA_PARAM(xform.rsa, vector, n); + SET_RSA_PARAM(xform.rsa, vector, e); + SET_RSA_PARAM(xform.rsa, vector, d); + xform.rsa.key_type = RTE_RSA_KEY_TYPE_EXP; + int ret = rsa_init_session(&xform); if (ret) { RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); return ret; } - TEST_ASSERT_SUCCESS(RSA_Encrypt(vector, cipher_buf), + TEST_ASSERT_SUCCESS(rsa_encrypt(vector, cipher_buf), "RSA: Failed to encrypt"); TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->cipher.data, self->result_op->asym->rsa.cipher.data, @@ -3408,17 +3384,26 @@ KAT_RSA_Encrypt(const void *data) } static int -KAT_RSA_Encrypt_CRT(const void *data) +kat_rsa_encrypt_crt(const void *data) { uint8_t cipher_buf[TEST_DATA_SIZE] = {0}; const struct rsa_test_data_2 *vector = data; - int ret = RSA_Init_Session(vector, RSA_key_init_CRT); + struct rte_crypto_asym_xform xform = { }; + SET_RSA_PARAM(xform.rsa, vector, n); + SET_RSA_PARAM(xform.rsa, vector, e); + SET_RSA_PARAM_QT(xform.rsa, vector, p); + SET_RSA_PARAM_QT(xform.rsa, vector, q); + SET_RSA_PARAM_QT(xform.rsa, vector, dP); + SET_RSA_PARAM_QT(xform.rsa, vector, dQ); + SET_RSA_PARAM_QT(xform.rsa, vector, qInv); + xform.rsa.key_type = RTE_RSA_KEY_TYPE_QT; + int ret = rsa_init_session(&xform); if (ret) { RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); return ret; } - TEST_ASSERT_SUCCESS(RSA_Encrypt(vector, cipher_buf), + TEST_ASSERT_SUCCESS(rsa_encrypt(vector, cipher_buf), "RSA: Failed to encrypt"); TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->cipher.data, self->result_op->asym->rsa.cipher.data, @@ -3428,17 +3413,23 @@ KAT_RSA_Encrypt_CRT(const void *data) } static int -KAT_RSA_Decrypt(const void *data) +kat_rsa_decrypt(const void *data) { uint8_t message[TEST_DATA_SIZE] = {0}; const struct rsa_test_data_2 *vector = data; - int ret = RSA_Init_Session(vector, RSA_key_init_Exp); + struct rte_crypto_asym_xform xform = { }; + + SET_RSA_PARAM(xform.rsa, vector, n); + SET_RSA_PARAM(xform.rsa, vector, e); + SET_RSA_PARAM(xform.rsa, vector, d); + xform.rsa.key_type = RTE_RSA_KEY_TYPE_EXP; + int ret = rsa_init_session(&xform); if (ret) { RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); return ret; } - TEST_ASSERT_SUCCESS(RSA_Decrypt(vector, message, 0), + TEST_ASSERT_SUCCESS(rsa_decrypt(vector, message, 0), "RSA: Failed to encrypt"); TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->message.data, self->result_op->asym->rsa.message.data, @@ -3448,17 +3439,26 @@ KAT_RSA_Decrypt(const void *data) } static int -KAT_RSA_Decrypt_CRT(const void *data) +kat_rsa_decrypt_crt(const void *data) { uint8_t message[TEST_DATA_SIZE] = {0}; const struct rsa_test_data_2 *vector = data; - int ret = RSA_Init_Session(vector, RSA_key_init_CRT); + struct rte_crypto_asym_xform xform = { }; + SET_RSA_PARAM(xform.rsa, vector, n); + SET_RSA_PARAM(xform.rsa, vector, e); + SET_RSA_PARAM_QT(xform.rsa, vector, p); + SET_RSA_PARAM_QT(xform.rsa, vector, q); + SET_RSA_PARAM_QT(xform.rsa, vector, dP); + SET_RSA_PARAM_QT(xform.rsa, vector, dQ); + SET_RSA_PARAM_QT(xform.rsa, vector, qInv); + xform.rsa.key_type = RTE_RSA_KEY_TYPE_QT; + int ret = rsa_init_session(&xform); if (ret) { RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); return ret; } - TEST_ASSERT_SUCCESS(RSA_Decrypt(vector, message, 0), + TEST_ASSERT_SUCCESS(rsa_decrypt(vector, message, 0), "RSA: Failed to encrypt"); TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->message.data, self->result_op->asym->rsa.message.data, @@ -3535,20 +3535,20 @@ static struct unit_test_suite cryptodev_qat_asym_testsuite = { TEST_CASE_NAMED_WITH_DATA( "RSA Encryption (n=128, pt=20, e=3) EXP, Padding: NONE", ut_setup_asym, ut_teardown_asym, - KAT_RSA_Encrypt, &RSA_vector_128_20_3_None), + kat_rsa_encrypt, &rsa_vector_128_20_3_none), TEST_CASE_NAMED_WITH_DATA( "RSA Decryption (n=128, pt=20, e=3) EXP, Padding: NONE", ut_setup_asym, ut_teardown_asym, - KAT_RSA_Decrypt, &RSA_vector_128_20_3_None), + kat_rsa_decrypt, &rsa_vector_128_20_3_none), /* RSA CRT */ TEST_CASE_NAMED_WITH_DATA( "RSA Encryption (n=128, pt=20, e=3) CRT, Padding: NONE", ut_setup_asym, ut_teardown_asym, - KAT_RSA_Encrypt_CRT, &RSA_vector_128_20_3_None), + kat_rsa_encrypt_crt, &rsa_vector_128_20_3_none), TEST_CASE_NAMED_WITH_DATA( "RSA Decryption (n=128, pt=20, e=3) CRT, Padding: NONE", ut_setup_asym, ut_teardown_asym, - KAT_RSA_Decrypt_CRT, &RSA_vector_128_20_3_None), + kat_rsa_decrypt_crt, &rsa_vector_128_20_3_none), TEST_CASES_END() /**< NULL terminate unit test array */ } }; diff --git a/app/test/test_cryptodev_rsa_test_vectors.h b/app/test/test_cryptodev_rsa_test_vectors.h index b4982014a2..89981f13f0 100644 --- a/app/test/test_cryptodev_rsa_test_vectors.h +++ b/app/test/test_cryptodev_rsa_test_vectors.h @@ -72,7 +72,7 @@ struct rsa_test_data_2 { }; static const struct -rsa_test_data_2 RSA_vector_128_20_3_None = { +rsa_test_data_2 rsa_vector_128_20_3_none = { .description = "RSA Encryption Decryption (n=128, pt=20, e=3) EXP, QT", .xform_type = RTE_CRYPTO_ASYM_XFORM_RSA, -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2024-07-12 18:40:18.434814907 +0800 +++ 0097-test-crypto-fix-RSA-cases-in-QAT-suite.patch 2024-07-12 18:40:14.346594198 +0800 @@ -1 +1 @@ -From 226f1ca0c1d7e16d87b601c380983c2167b4bef7 Mon Sep 17 00:00:00 2001 +From acf2e69c23da6fffec152a67baa4af7fd6860472 Mon Sep 17 00:00:00 2001 @@ -4,0 +5,3 @@ +Cc: Xueming Li + +[ upstream commit 226f1ca0c1d7e16d87b601c380983c2167b4bef7 ] @@ -14 +16,0 @@ -Cc: stable@dpdk.org