[dpdk-dev] [PATCH v5 1/1] test: new test structure for asymmetric crypto
Shally Verma
shallyv at marvell.com
Thu Jul 25 09:18:03 CEST 2019
Hi Damian, Fiona, Arek
Though am bit late to come back to this. But I have question on mod_exp test vector.
Please see below.
> -----Original Message-----
> From: dev <dev-bounces at dpdk.org> On Behalf Of Damian Nowak
> Sent: Wednesday, March 27, 2019 3:15 PM
> To: dev at dpdk.org
> Cc: fiona.trahe at intel.com; arkadiuszx.kusztal at intel.com; Damian Nowak
> <damianx.nowak at intel.com>
> Subject: [dpdk-dev] [PATCH v5 1/1] test: new test structure for asymmetric
> crypto
>
> This patch adds new test structure for modexp
> and modinv for asymmetric cryptography
>
> Signed-off-by: Damian Nowak <damianx.nowak at intel.com>
> ---
> app/test/test_cryptodev.h | 1 +
> app/test/test_cryptodev_asym.c | 318 ++++++++++
> app/test/test_cryptodev_mod_test_vectors.h | 967
> +++++++++++++++++++++++++++++
> 3 files changed, 1286 insertions(+)
>
...
> REGISTER_TEST_COMMAND(cryptodev_openssl_asym_autotest,
> test_cryptodev_openssl_asym);
> +
> +REGISTER_TEST_COMMAND(cryptodev_qat_asym_autotest,
> test_cryptodev_qat_asym);
> diff --git a/app/test/test_cryptodev_mod_test_vectors.h
> b/app/test/test_cryptodev_mod_test_vectors.h
> index a25c676..c66f4b1 100644
> --- a/app/test/test_cryptodev_mod_test_vectors.h
> +++ b/app/test/test_cryptodev_mod_test_vectors.h
> @@ -1,10 +1,977 @@
> /* SPDX-License-Identifier: BSD-3-Clause
> * Copyright(c) 2018 Cavium Networks
> + * Copyright (c) 2019 Intel Corporation
> */
>
> #ifndef TEST_CRYPTODEV_MOD_TEST_VECTORS_H_
> #define TEST_CRYPTODEV_MOD_TEST_VECTORS_H_
>
> +#define DATA_SIZE 512
> +
...
> +static const struct
> +modex_test_data modex_test_case[] = {
> +{
> + .description = "Modular Exponentiation "
> + "(mod=128, base=20, exp=3, res=128)",
> + .xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX,
...
> + .modulus = {
> + .data = {
> + 0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00, 0x0a,
There's already a testvector mod_p[] in file with leading 0. Where as I see this one duplicate of that but without leading 0.
Could you tell me if you ever tested with mod_p[] with leading 0 and if your qat PMD passed that?
> + 0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5, 0xce,
> + 0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a, 0xa2,
> + 0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde, 0x0a,
> + 0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a, 0x3d,
> + 0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63, 0x6a,
> + 0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27, 0x6e,
> + 0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa, 0x72,
> + 0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53, 0x87,
> + 0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a, 0x62,
> + 0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63, 0x18,
> + 0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33, 0x4e,
> + 0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3, 0x03,
> + 0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e, 0xee,
> + 0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb, 0xa6,
> + 0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde, 0x55
> + },
> + .len = 128
> + },
> + .result_len = 128
> +},
....
> /* modular operation test data */
> uint8_t base[] = {
> 0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,
> --
> 2.7.4
More information about the dev
mailing list