From: Arek Kusztal Date: Fri, 8 Feb 2019 11:13:38 +0000 (+0100) Subject: test: add result field to mod exp and inv X-Git-Url: http://git.droids-corp.org/?a=commitdiff_plain;h=5e4fb861f7e2d2f744859a889f194f03f8846c8d;p=dpdk.git test: add result field to mod exp and inv This patch adds result field to modular exponentiation and modular multiplicative inverse tests Signed-off-by: Arek Kusztal Acked-by: Shally Verma --- diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index 0f6fc5767d..a779e8f9cd 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -940,6 +940,7 @@ test_mod_inv(void) const struct rte_cryptodev_asymmetric_xform_capability *capability; uint8_t input[TEST_DATA_SIZE] = {0}; int ret = 0; + uint8_t result[sizeof(mod_p)] = { 0 }; if (rte_cryptodev_asym_get_xform_enum( &modinv_xform.xform_type, "modinv") < 0) { @@ -993,6 +994,8 @@ test_mod_inv(void) memcpy(input, base, sizeof(base)); asym_op->modinv.base.data = input; asym_op->modinv.base.length = sizeof(base); + asym_op->modinv.result.data = result; + asym_op->modinv.result.length = sizeof(result); /* attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); @@ -1055,6 +1058,7 @@ test_mod_exp(void) const struct rte_cryptodev_asymmetric_xform_capability *capability; uint8_t input[TEST_DATA_SIZE] = {0}; int ret = 0; + uint8_t result[sizeof(mod_p)] = { 0 }; if (rte_cryptodev_asym_get_xform_enum(&modex_xform.xform_type, "modexp") @@ -1109,6 +1113,8 @@ test_mod_exp(void) memcpy(input, base, sizeof(base)); asym_op->modex.base.data = input; asym_op->modex.base.length = sizeof(base); + asym_op->modex.result.data = result; + asym_op->modex.result.length = sizeof(result); /* attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); diff --git a/app/test/test_cryptodev_asym_util.h b/app/test/test_cryptodev_asym_util.h index dff0c2ada6..b3d9fb4688 100644 --- a/app/test/test_cryptodev_asym_util.h +++ b/app/test/test_cryptodev_asym_util.h @@ -20,8 +20,8 @@ static inline int rsa_verify(struct rsa_test_data *rsa_param, static inline int verify_modinv(uint8_t *mod_inv, struct rte_crypto_op *result_op) { - if (memcmp(mod_inv, result_op->asym->modinv.base.data, - result_op->asym->modinv.base.length)) + if (memcmp(mod_inv, result_op->asym->modinv.result.data, + result_op->asym->modinv.result.length)) return -1; return 0; } @@ -29,8 +29,8 @@ static inline int verify_modinv(uint8_t *mod_inv, static inline int verify_modexp(uint8_t *mod_exp, struct rte_crypto_op *result_op) { - if (memcmp(mod_exp, result_op->asym->modex.base.data, - result_op->asym->modex.base.length)) + if (memcmp(mod_exp, result_op->asym->modex.result.data, + result_op->asym->modex.result.length)) return -1; return 0; }