[dpdk-dev] [EXT] [PATCH v3 04/11] test: add cipher field to RSA test

Kusztal, ArkadiuszX arkadiuszx.kusztal at intel.com
Wed Jul 17 10:27:08 CEST 2019



> -----Original Message-----
> From: Shally Verma [mailto:shallyv at marvell.com]
> Sent: Wednesday, July 17, 2019 9:42 AM
> To: Kusztal, ArkadiuszX <arkadiuszx.kusztal at intel.com>; dev at dpdk.org
> Cc: akhil.goyal at nxp.com; Trahe, Fiona <fiona.trahe at intel.com>
> Subject: RE: [EXT] [PATCH v3 04/11] test: add cipher field to RSA test
> 
> 
> 
> > -----Original Message-----
> > From: Arek Kusztal <arkadiuszx.kusztal at intel.com>
> > Sent: Wednesday, July 17, 2019 12:23 AM
> > To: dev at dpdk.org
> > Cc: akhil.goyal at nxp.com; fiona.trahe at intel.com; Shally Verma
> > <shallyv at marvell.com>; Arek Kusztal <arkadiuszx.kusztal at intel.com>
> > Subject: [EXT] [PATCH v3 04/11] test: add cipher field to RSA test
> >
> > External Email
> >
> > ----------------------------------------------------------------------
> > This patch adds cipher field to RSA test cases
> >
> > Signed-off-by: Arek Kusztal <arkadiuszx.kusztal at intel.com>
> > ---
> >  app/test/test_cryptodev_asym.c | 3 +++
> >  1 file changed, 3 insertions(+)
> >
> > diff --git a/app/test/test_cryptodev_asym.c
> > b/app/test/test_cryptodev_asym.c index 4dee164..8391545 100644
> > --- a/app/test/test_cryptodev_asym.c
> > +++ b/app/test/test_cryptodev_asym.c
> > @@ -164,6 +164,7 @@ queue_ops_rsa_enc_dec(struct
> > rte_cryptodev_asym_session *sess)
> >  	uint8_t dev_id = ts_params->valid_devs[0];
> >  	struct rte_crypto_op *op, *result_op;
> >  	struct rte_crypto_asym_op *asym_op;
> > +	uint8_t cipher_buf[TEST_DATA_SIZE] = {0};
> >  	int ret, status = TEST_SUCCESS;
> >
> >  	/* Set up crypto op data structure */ @@ -180,6 +181,8 @@
> > queue_ops_rsa_enc_dec(struct rte_cryptodev_asym_session *sess)
> >  	asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_ENCRYPT;
> >
> >  	asym_op->rsa.message.data = rsaplaintext.data;
> > +	asym_op->rsa.cipher.data = cipher_buf;
> > +	asym_op->rsa.cipher.length = 0;
> [Shally] I think this should be initialized to length of buffer available i.e. RSA
> Key size? PMD can override it with length of actual data written at output,
> which has to be less than , equal to RSA_key size.
[AK] - its because API comments are ambiguous in this case and we have only one field describing array length.
I would suggest to rephrase cipher field API comments from "length in bytes
	 * of this field needs to be greater or equal to the length of
	 * corresponding RSA key in bytes"
To "underlying array should have allocated enough memory to hold cipher output (bigger or equal to RSA key size". Then length could and I think should be zero or unspecified at this point. 
What do you think? 
> 
> >  	asym_op->rsa.message.length = rsaplaintext.len;
> >  	asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT2;
> >
> > --
> > 2.1.0



More information about the dev mailing list