xref: /f-stack/dpdk/app/test/test_cryptodev_asym.c (revision 2d9fd380)
14418919fSjohnjiang /* SPDX-License-Identifier: BSD-3-Clause
24418919fSjohnjiang  * Copyright(c) 2018 Cavium Networks
34418919fSjohnjiang  * Copyright (c) 2019 Intel Corporation
44418919fSjohnjiang  */
54418919fSjohnjiang 
64418919fSjohnjiang #include <rte_bus_vdev.h>
74418919fSjohnjiang #include <rte_common.h>
84418919fSjohnjiang #include <rte_hexdump.h>
94418919fSjohnjiang #include <rte_mbuf.h>
104418919fSjohnjiang #include <rte_malloc.h>
114418919fSjohnjiang #include <rte_memcpy.h>
124418919fSjohnjiang #include <rte_pause.h>
134418919fSjohnjiang 
144418919fSjohnjiang #include <rte_cryptodev.h>
154418919fSjohnjiang #include <rte_cryptodev_pmd.h>
164418919fSjohnjiang #include <rte_crypto.h>
174418919fSjohnjiang 
184418919fSjohnjiang #include "test_cryptodev.h"
194418919fSjohnjiang #include "test_cryptodev_dh_test_vectors.h"
204418919fSjohnjiang #include "test_cryptodev_dsa_test_vectors.h"
21*2d9fd380Sjfb8856606 #include "test_cryptodev_ecdsa_test_vectors.h"
22*2d9fd380Sjfb8856606 #include "test_cryptodev_ecpm_test_vectors.h"
234418919fSjohnjiang #include "test_cryptodev_mod_test_vectors.h"
244418919fSjohnjiang #include "test_cryptodev_rsa_test_vectors.h"
254418919fSjohnjiang #include "test_cryptodev_asym_util.h"
264418919fSjohnjiang #include "test.h"
274418919fSjohnjiang 
284418919fSjohnjiang #define TEST_NUM_BUFS 10
294418919fSjohnjiang #define TEST_NUM_SESSIONS 4
304418919fSjohnjiang 
314418919fSjohnjiang #ifndef TEST_DATA_SIZE
324418919fSjohnjiang 	#define TEST_DATA_SIZE 4096
334418919fSjohnjiang #endif
344418919fSjohnjiang #define ASYM_TEST_MSG_LEN 256
354418919fSjohnjiang #define TEST_VECTOR_SIZE 256
364418919fSjohnjiang 
374418919fSjohnjiang static int gbl_driver_id;
384418919fSjohnjiang struct crypto_testsuite_params {
394418919fSjohnjiang 	struct rte_mempool *op_mpool;
404418919fSjohnjiang 	struct rte_mempool *session_mpool;
414418919fSjohnjiang 	struct rte_cryptodev_config conf;
424418919fSjohnjiang 	struct rte_cryptodev_qp_conf qp_conf;
434418919fSjohnjiang 	uint8_t valid_devs[RTE_CRYPTO_MAX_DEVS];
444418919fSjohnjiang 	uint8_t valid_dev_count;
454418919fSjohnjiang };
464418919fSjohnjiang 
474418919fSjohnjiang struct crypto_unittest_params {
484418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess;
494418919fSjohnjiang 	struct rte_crypto_op *op;
504418919fSjohnjiang };
514418919fSjohnjiang 
524418919fSjohnjiang union test_case_structure {
534418919fSjohnjiang 	struct modex_test_data modex;
544418919fSjohnjiang 	struct modinv_test_data modinv;
554418919fSjohnjiang 	struct rsa_test_data_2 rsa_data;
564418919fSjohnjiang };
574418919fSjohnjiang 
584418919fSjohnjiang struct test_cases_array {
594418919fSjohnjiang 	uint32_t size;
604418919fSjohnjiang 	const void *address[TEST_VECTOR_SIZE];
614418919fSjohnjiang };
624418919fSjohnjiang static struct test_cases_array test_vector = {0, { NULL } };
634418919fSjohnjiang 
644418919fSjohnjiang static uint32_t test_index;
654418919fSjohnjiang 
664418919fSjohnjiang static struct crypto_testsuite_params testsuite_params = { NULL };
674418919fSjohnjiang 
684418919fSjohnjiang static int
queue_ops_rsa_sign_verify(struct rte_cryptodev_asym_session * sess)694418919fSjohnjiang queue_ops_rsa_sign_verify(struct rte_cryptodev_asym_session *sess)
704418919fSjohnjiang {
714418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
724418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
734418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
744418919fSjohnjiang 	struct rte_crypto_op *op, *result_op;
754418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op;
764418919fSjohnjiang 	uint8_t output_buf[TEST_DATA_SIZE];
774418919fSjohnjiang 	int status = TEST_SUCCESS;
784418919fSjohnjiang 
794418919fSjohnjiang 	/* Set up crypto op data structure */
804418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
814418919fSjohnjiang 	if (!op) {
824418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to allocate asymmetric crypto "
834418919fSjohnjiang 			"operation struct\n");
844418919fSjohnjiang 		return TEST_FAILED;
854418919fSjohnjiang 	}
864418919fSjohnjiang 
874418919fSjohnjiang 	asym_op = op->asym;
884418919fSjohnjiang 
894418919fSjohnjiang 	/* Compute sign on the test vector */
904418919fSjohnjiang 	asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_SIGN;
914418919fSjohnjiang 
924418919fSjohnjiang 	asym_op->rsa.message.data = rsaplaintext.data;
934418919fSjohnjiang 	asym_op->rsa.message.length = rsaplaintext.len;
944418919fSjohnjiang 	asym_op->rsa.sign.length = 0;
954418919fSjohnjiang 	asym_op->rsa.sign.data = output_buf;
964418919fSjohnjiang 	asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
974418919fSjohnjiang 
984418919fSjohnjiang 	debug_hexdump(stdout, "message", asym_op->rsa.message.data,
994418919fSjohnjiang 		      asym_op->rsa.message.length);
1004418919fSjohnjiang 
1014418919fSjohnjiang 	/* Attach asymmetric crypto session to crypto operations */
1024418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
1034418919fSjohnjiang 
1044418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation\n");
1054418919fSjohnjiang 
1064418919fSjohnjiang 	/* Process crypto operation */
1074418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
1084418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Error sending packet for sign\n");
1094418919fSjohnjiang 		status = TEST_FAILED;
1104418919fSjohnjiang 		goto error_exit;
1114418919fSjohnjiang 	}
1124418919fSjohnjiang 
1134418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
1144418919fSjohnjiang 		rte_pause();
1154418919fSjohnjiang 
1164418919fSjohnjiang 	if (result_op == NULL) {
1174418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to process sign op\n");
1184418919fSjohnjiang 		status = TEST_FAILED;
1194418919fSjohnjiang 		goto error_exit;
1204418919fSjohnjiang 	}
1214418919fSjohnjiang 
1224418919fSjohnjiang 	debug_hexdump(stdout, "signed message", asym_op->rsa.sign.data,
1234418919fSjohnjiang 		      asym_op->rsa.sign.length);
1244418919fSjohnjiang 	asym_op = result_op->asym;
1254418919fSjohnjiang 
1264418919fSjohnjiang 	/* Verify sign */
1274418919fSjohnjiang 	asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;
1284418919fSjohnjiang 	asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
1294418919fSjohnjiang 
1304418919fSjohnjiang 	/* Process crypto operation */
1314418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
1324418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Error sending packet for verify\n");
1334418919fSjohnjiang 		status = TEST_FAILED;
1344418919fSjohnjiang 		goto error_exit;
1354418919fSjohnjiang 	}
1364418919fSjohnjiang 
1374418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
1384418919fSjohnjiang 		rte_pause();
1394418919fSjohnjiang 
1404418919fSjohnjiang 	if (result_op == NULL) {
1414418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to process verify op\n");
1424418919fSjohnjiang 		status = TEST_FAILED;
1434418919fSjohnjiang 		goto error_exit;
1444418919fSjohnjiang 	}
1454418919fSjohnjiang 
1464418919fSjohnjiang 	status = TEST_SUCCESS;
1474418919fSjohnjiang 	if (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {
1484418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to process sign-verify op\n");
1494418919fSjohnjiang 		status = TEST_FAILED;
1504418919fSjohnjiang 	}
1514418919fSjohnjiang 
1524418919fSjohnjiang error_exit:
1534418919fSjohnjiang 
1544418919fSjohnjiang 	rte_crypto_op_free(op);
1554418919fSjohnjiang 
1564418919fSjohnjiang 	return status;
1574418919fSjohnjiang }
1584418919fSjohnjiang 
1594418919fSjohnjiang static int
queue_ops_rsa_enc_dec(struct rte_cryptodev_asym_session * sess)1604418919fSjohnjiang queue_ops_rsa_enc_dec(struct rte_cryptodev_asym_session *sess)
1614418919fSjohnjiang {
1624418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
1634418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
1644418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
1654418919fSjohnjiang 	struct rte_crypto_op *op, *result_op;
1664418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op;
1674418919fSjohnjiang 	uint8_t cipher_buf[TEST_DATA_SIZE] = {0};
1684418919fSjohnjiang 	int ret, status = TEST_SUCCESS;
1694418919fSjohnjiang 
1704418919fSjohnjiang 	/* Set up crypto op data structure */
1714418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
1724418919fSjohnjiang 	if (!op) {
1734418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to allocate asymmetric crypto "
1744418919fSjohnjiang 			"operation struct\n");
1754418919fSjohnjiang 		return TEST_FAILED;
1764418919fSjohnjiang 	}
1774418919fSjohnjiang 
1784418919fSjohnjiang 	asym_op = op->asym;
1794418919fSjohnjiang 
1804418919fSjohnjiang 	/* Compute encryption on the test vector */
1814418919fSjohnjiang 	asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_ENCRYPT;
1824418919fSjohnjiang 
1834418919fSjohnjiang 	asym_op->rsa.message.data = rsaplaintext.data;
1844418919fSjohnjiang 	asym_op->rsa.cipher.data = cipher_buf;
1854418919fSjohnjiang 	asym_op->rsa.cipher.length = 0;
1864418919fSjohnjiang 	asym_op->rsa.message.length = rsaplaintext.len;
1874418919fSjohnjiang 	asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
1884418919fSjohnjiang 
1894418919fSjohnjiang 	debug_hexdump(stdout, "message", asym_op->rsa.message.data,
1904418919fSjohnjiang 		      asym_op->rsa.message.length);
1914418919fSjohnjiang 
1924418919fSjohnjiang 	/* Attach asymmetric crypto session to crypto operations */
1934418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
1944418919fSjohnjiang 
1954418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation\n");
1964418919fSjohnjiang 
1974418919fSjohnjiang 	/* Process crypto operation */
1984418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
1994418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Error sending packet for encryption\n");
2004418919fSjohnjiang 		status = TEST_FAILED;
2014418919fSjohnjiang 		goto error_exit;
2024418919fSjohnjiang 	}
2034418919fSjohnjiang 
2044418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
2054418919fSjohnjiang 		rte_pause();
2064418919fSjohnjiang 
2074418919fSjohnjiang 	if (result_op == NULL) {
2084418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to process encryption op\n");
2094418919fSjohnjiang 		status = TEST_FAILED;
2104418919fSjohnjiang 		goto error_exit;
2114418919fSjohnjiang 	}
2124418919fSjohnjiang 	debug_hexdump(stdout, "encrypted message", asym_op->rsa.message.data,
2134418919fSjohnjiang 		      asym_op->rsa.message.length);
2144418919fSjohnjiang 
2154418919fSjohnjiang 	/* Use the resulted output as decryption Input vector*/
2164418919fSjohnjiang 	asym_op = result_op->asym;
2174418919fSjohnjiang 	asym_op->rsa.message.length = 0;
2184418919fSjohnjiang 	asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT;
2194418919fSjohnjiang 	asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
2204418919fSjohnjiang 
2214418919fSjohnjiang 	/* Process crypto operation */
2224418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
2234418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Error sending packet for decryption\n");
2244418919fSjohnjiang 		status = TEST_FAILED;
2254418919fSjohnjiang 		goto error_exit;
2264418919fSjohnjiang 	}
2274418919fSjohnjiang 
2284418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
2294418919fSjohnjiang 		rte_pause();
2304418919fSjohnjiang 
2314418919fSjohnjiang 	if (result_op == NULL) {
2324418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Failed to process decryption op\n");
2334418919fSjohnjiang 		status = TEST_FAILED;
2344418919fSjohnjiang 		goto error_exit;
2354418919fSjohnjiang 	}
2364418919fSjohnjiang 	status = TEST_SUCCESS;
2374418919fSjohnjiang 	ret = rsa_verify(&rsaplaintext, result_op);
2384418919fSjohnjiang 	if (ret)
2394418919fSjohnjiang 		status = TEST_FAILED;
2404418919fSjohnjiang 
2414418919fSjohnjiang error_exit:
2424418919fSjohnjiang 
2434418919fSjohnjiang 	rte_crypto_op_free(op);
2444418919fSjohnjiang 
2454418919fSjohnjiang 	return status;
2464418919fSjohnjiang }
2474418919fSjohnjiang static int
test_cryptodev_asym_ver(struct rte_crypto_op * op,struct rte_crypto_asym_xform * xform_tc,union test_case_structure * data_tc,struct rte_crypto_op * result_op)2484418919fSjohnjiang test_cryptodev_asym_ver(struct rte_crypto_op *op,
2494418919fSjohnjiang 				struct rte_crypto_asym_xform *xform_tc,
2504418919fSjohnjiang 				union test_case_structure *data_tc,
2514418919fSjohnjiang 				struct rte_crypto_op *result_op)
2524418919fSjohnjiang {
2534418919fSjohnjiang 	int status = TEST_FAILED;
2544418919fSjohnjiang 	int ret = 0;
2554418919fSjohnjiang 	uint8_t *data_expected = NULL, *data_received = NULL;
2564418919fSjohnjiang 	size_t data_size = 0;
2574418919fSjohnjiang 
2584418919fSjohnjiang 	switch (data_tc->modex.xform_type) {
2594418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_MODEX:
2604418919fSjohnjiang 		data_expected = data_tc->modex.reminder.data;
2614418919fSjohnjiang 		data_received = result_op->asym->modex.result.data;
2624418919fSjohnjiang 		data_size = result_op->asym->modex.result.length;
2634418919fSjohnjiang 		break;
2644418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_MODINV:
2654418919fSjohnjiang 		data_expected = data_tc->modinv.inverse.data;
2664418919fSjohnjiang 		data_received = result_op->asym->modinv.result.data;
2674418919fSjohnjiang 		data_size = result_op->asym->modinv.result.length;
2684418919fSjohnjiang 		break;
2694418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_RSA:
2704418919fSjohnjiang 		if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {
2714418919fSjohnjiang 			data_size = xform_tc->rsa.n.length;
2724418919fSjohnjiang 			data_received = result_op->asym->rsa.cipher.data;
2734418919fSjohnjiang 			data_expected = data_tc->rsa_data.ct.data;
2744418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) {
2754418919fSjohnjiang 			data_size = xform_tc->rsa.n.length;
2764418919fSjohnjiang 			data_expected = data_tc->rsa_data.pt.data;
2774418919fSjohnjiang 			data_received = result_op->asym->rsa.message.data;
2784418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) {
2794418919fSjohnjiang 			data_size = xform_tc->rsa.n.length;
2804418919fSjohnjiang 			data_expected = data_tc->rsa_data.sign.data;
2814418919fSjohnjiang 			data_received = result_op->asym->rsa.sign.data;
2824418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) {
2834418919fSjohnjiang 			data_size = xform_tc->rsa.n.length;
2844418919fSjohnjiang 			data_expected = data_tc->rsa_data.pt.data;
2854418919fSjohnjiang 			data_received = result_op->asym->rsa.cipher.data;
2864418919fSjohnjiang 		}
2874418919fSjohnjiang 		break;
2884418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_DH:
2894418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_DSA:
2904418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_NONE:
2914418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_UNSPECIFIED:
2924418919fSjohnjiang 	default:
2934418919fSjohnjiang 		break;
2944418919fSjohnjiang 	}
2954418919fSjohnjiang 	ret = memcmp(data_expected, data_received, data_size);
2964418919fSjohnjiang 	if (!ret && data_size)
2974418919fSjohnjiang 		status = TEST_SUCCESS;
2984418919fSjohnjiang 
2994418919fSjohnjiang 	return status;
3004418919fSjohnjiang }
3014418919fSjohnjiang 
3024418919fSjohnjiang static int
test_cryptodev_asym_op(struct crypto_testsuite_params * ts_params,union test_case_structure * data_tc,char * test_msg,int sessionless,enum rte_crypto_asym_op_type type,enum rte_crypto_rsa_priv_key_type key_type)3034418919fSjohnjiang test_cryptodev_asym_op(struct crypto_testsuite_params *ts_params,
3044418919fSjohnjiang 	union test_case_structure *data_tc,
3054418919fSjohnjiang 	char *test_msg, int sessionless, enum rte_crypto_asym_op_type type,
3064418919fSjohnjiang 	enum rte_crypto_rsa_priv_key_type key_type)
3074418919fSjohnjiang {
3084418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
3094418919fSjohnjiang 	struct rte_crypto_op *op = NULL;
3104418919fSjohnjiang 	struct rte_crypto_op *result_op = NULL;
3114418919fSjohnjiang 	struct rte_crypto_asym_xform xform_tc;
3124418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
3134418919fSjohnjiang 	struct rte_cryptodev_asym_capability_idx cap_idx;
3144418919fSjohnjiang 	const struct rte_cryptodev_asymmetric_xform_capability *capability;
3154418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
3164418919fSjohnjiang 	uint8_t input[TEST_DATA_SIZE] = {0};
3174418919fSjohnjiang 	uint8_t *result = NULL;
3184418919fSjohnjiang 
3194418919fSjohnjiang 	int status = TEST_SUCCESS;
3204418919fSjohnjiang 
3214418919fSjohnjiang 	xform_tc.next = NULL;
3224418919fSjohnjiang 	xform_tc.xform_type = data_tc->modex.xform_type;
3234418919fSjohnjiang 
3244418919fSjohnjiang 	cap_idx.type = xform_tc.xform_type;
3254418919fSjohnjiang 	capability = rte_cryptodev_asym_capability_get(dev_id, &cap_idx);
3264418919fSjohnjiang 
3274418919fSjohnjiang 	if (capability == NULL) {
3284418919fSjohnjiang 		RTE_LOG(INFO, USER1,
3294418919fSjohnjiang 			"Device doesn't support MODEX. Test Skipped\n");
3304418919fSjohnjiang 		return -ENOTSUP;
3314418919fSjohnjiang 	}
3324418919fSjohnjiang 
3334418919fSjohnjiang 	/* Generate crypto op data structure */
3344418919fSjohnjiang 	op = rte_crypto_op_alloc(ts_params->op_mpool,
3354418919fSjohnjiang 		RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
3364418919fSjohnjiang 
3374418919fSjohnjiang 	if (!op) {
3384418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN,
3394418919fSjohnjiang 			"line %u FAILED: %s",
3404418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
3414418919fSjohnjiang 			"operation struct");
3424418919fSjohnjiang 		status = TEST_FAILED;
3434418919fSjohnjiang 		goto error_exit;
3444418919fSjohnjiang 	}
3454418919fSjohnjiang 
3464418919fSjohnjiang 	asym_op = op->asym;
3474418919fSjohnjiang 
3484418919fSjohnjiang 	switch (xform_tc.xform_type) {
3494418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_MODEX:
3504418919fSjohnjiang 		result = rte_zmalloc(NULL, data_tc->modex.result_len, 0);
3514418919fSjohnjiang 		xform_tc.modex.modulus.data = data_tc->modex.modulus.data;
3524418919fSjohnjiang 		xform_tc.modex.modulus.length = data_tc->modex.modulus.len;
3534418919fSjohnjiang 		xform_tc.modex.exponent.data = data_tc->modex.exponent.data;
3544418919fSjohnjiang 		xform_tc.modex.exponent.length = data_tc->modex.exponent.len;
3554418919fSjohnjiang 		memcpy(input, data_tc->modex.base.data,
3564418919fSjohnjiang 			data_tc->modex.base.len);
3574418919fSjohnjiang 		asym_op->modex.base.data = input;
3584418919fSjohnjiang 		asym_op->modex.base.length = data_tc->modex.base.len;
3594418919fSjohnjiang 		asym_op->modex.result.data = result;
3604418919fSjohnjiang 		asym_op->modex.result.length = data_tc->modex.result_len;
3614418919fSjohnjiang 		if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
3624418919fSjohnjiang 				xform_tc.modex.modulus.length)) {
3634418919fSjohnjiang 			snprintf(test_msg, ASYM_TEST_MSG_LEN,
3644418919fSjohnjiang 				"line %u "
3654418919fSjohnjiang 				"FAILED: %s", __LINE__,
3664418919fSjohnjiang 				"Invalid MODULUS length specified");
3674418919fSjohnjiang 			status = TEST_FAILED;
3684418919fSjohnjiang 			goto error_exit;
3694418919fSjohnjiang 		}
3704418919fSjohnjiang 		break;
3714418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_MODINV:
3724418919fSjohnjiang 		result = rte_zmalloc(NULL, data_tc->modinv.result_len, 0);
3734418919fSjohnjiang 		xform_tc.modinv.modulus.data = data_tc->modinv.modulus.data;
3744418919fSjohnjiang 		xform_tc.modinv.modulus.length = data_tc->modinv.modulus.len;
3754418919fSjohnjiang 		memcpy(input, data_tc->modinv.base.data,
3764418919fSjohnjiang 			data_tc->modinv.base.len);
3774418919fSjohnjiang 		asym_op->modinv.base.data = input;
3784418919fSjohnjiang 		asym_op->modinv.base.length = data_tc->modinv.base.len;
3794418919fSjohnjiang 		asym_op->modinv.result.data = result;
3804418919fSjohnjiang 		asym_op->modinv.result.length = data_tc->modinv.result_len;
3814418919fSjohnjiang 		if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
3824418919fSjohnjiang 				xform_tc.modinv.modulus.length)) {
3834418919fSjohnjiang 			snprintf(test_msg, ASYM_TEST_MSG_LEN,
3844418919fSjohnjiang 				"line %u "
3854418919fSjohnjiang 				"FAILED: %s", __LINE__,
3864418919fSjohnjiang 				"Invalid MODULUS length specified");
3874418919fSjohnjiang 			status = TEST_FAILED;
3884418919fSjohnjiang 			goto error_exit;
3894418919fSjohnjiang 		}
3904418919fSjohnjiang 		break;
3914418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_RSA:
3924418919fSjohnjiang 		result = rte_zmalloc(NULL, data_tc->rsa_data.n.len, 0);
3934418919fSjohnjiang 		op->asym->rsa.op_type = type;
3944418919fSjohnjiang 		xform_tc.rsa.e.data = data_tc->rsa_data.e.data;
3954418919fSjohnjiang 		xform_tc.rsa.e.length = data_tc->rsa_data.e.len;
3964418919fSjohnjiang 		xform_tc.rsa.n.data = data_tc->rsa_data.n.data;
3974418919fSjohnjiang 		xform_tc.rsa.n.length = data_tc->rsa_data.n.len;
3984418919fSjohnjiang 
3994418919fSjohnjiang 		if (key_type == RTE_RSA_KEY_TYPE_EXP) {
4004418919fSjohnjiang 			xform_tc.rsa.d.data = data_tc->rsa_data.d.data;
4014418919fSjohnjiang 			xform_tc.rsa.d.length = data_tc->rsa_data.d.len;
4024418919fSjohnjiang 		} else {
4034418919fSjohnjiang 			xform_tc.rsa.qt.p.data = data_tc->rsa_data.p.data;
4044418919fSjohnjiang 			xform_tc.rsa.qt.p.length = data_tc->rsa_data.p.len;
4054418919fSjohnjiang 			xform_tc.rsa.qt.q.data = data_tc->rsa_data.q.data;
4064418919fSjohnjiang 			xform_tc.rsa.qt.q.length = data_tc->rsa_data.q.len;
4074418919fSjohnjiang 			xform_tc.rsa.qt.dP.data = data_tc->rsa_data.dP.data;
4084418919fSjohnjiang 			xform_tc.rsa.qt.dP.length = data_tc->rsa_data.dP.len;
4094418919fSjohnjiang 			xform_tc.rsa.qt.dQ.data = data_tc->rsa_data.dQ.data;
4104418919fSjohnjiang 			xform_tc.rsa.qt.dQ.length = data_tc->rsa_data.dQ.len;
4114418919fSjohnjiang 			xform_tc.rsa.qt.qInv.data = data_tc->rsa_data.qInv.data;
4124418919fSjohnjiang 			xform_tc.rsa.qt.qInv.length = data_tc->rsa_data.qInv.len;
4134418919fSjohnjiang 		}
4144418919fSjohnjiang 
4154418919fSjohnjiang 		xform_tc.rsa.key_type = key_type;
4164418919fSjohnjiang 		op->asym->rsa.pad = data_tc->rsa_data.padding;
4174418919fSjohnjiang 
4184418919fSjohnjiang 		if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {
4194418919fSjohnjiang 			asym_op->rsa.message.data = data_tc->rsa_data.pt.data;
4204418919fSjohnjiang 			asym_op->rsa.message.length = data_tc->rsa_data.pt.len;
4214418919fSjohnjiang 			asym_op->rsa.cipher.data = result;
4224418919fSjohnjiang 			asym_op->rsa.cipher.length = data_tc->rsa_data.n.len;
4234418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) {
4244418919fSjohnjiang 			asym_op->rsa.message.data = result;
4254418919fSjohnjiang 			asym_op->rsa.message.length = data_tc->rsa_data.n.len;
4264418919fSjohnjiang 			asym_op->rsa.cipher.data = data_tc->rsa_data.ct.data;
4274418919fSjohnjiang 			asym_op->rsa.cipher.length = data_tc->rsa_data.ct.len;
4284418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) {
4294418919fSjohnjiang 			asym_op->rsa.sign.data = result;
4304418919fSjohnjiang 			asym_op->rsa.sign.length = data_tc->rsa_data.n.len;
4314418919fSjohnjiang 			asym_op->rsa.message.data = data_tc->rsa_data.pt.data;
4324418919fSjohnjiang 			asym_op->rsa.message.length = data_tc->rsa_data.pt.len;
4334418919fSjohnjiang 		} else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) {
4344418919fSjohnjiang 			asym_op->rsa.cipher.data = result;
4354418919fSjohnjiang 			asym_op->rsa.cipher.length = data_tc->rsa_data.n.len;
4364418919fSjohnjiang 			asym_op->rsa.sign.data = data_tc->rsa_data.sign.data;
4374418919fSjohnjiang 			asym_op->rsa.sign.length = data_tc->rsa_data.sign.len;
4384418919fSjohnjiang 		}
4394418919fSjohnjiang 		break;
4404418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_DH:
4414418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_DSA:
4424418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_NONE:
4434418919fSjohnjiang 	case RTE_CRYPTO_ASYM_XFORM_UNSPECIFIED:
4444418919fSjohnjiang 	default:
4454418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN,
4464418919fSjohnjiang 				"line %u "
4474418919fSjohnjiang 				"FAILED: %s", __LINE__,
4484418919fSjohnjiang 				"Invalid ASYM algorithm specified");
4494418919fSjohnjiang 		status = TEST_FAILED;
4504418919fSjohnjiang 		goto error_exit;
4514418919fSjohnjiang 	}
4524418919fSjohnjiang 
4534418919fSjohnjiang 	if (!sessionless) {
4544418919fSjohnjiang 		sess = rte_cryptodev_asym_session_create(ts_params->session_mpool);
4554418919fSjohnjiang 		if (!sess) {
4564418919fSjohnjiang 			snprintf(test_msg, ASYM_TEST_MSG_LEN,
4574418919fSjohnjiang 					"line %u "
4584418919fSjohnjiang 					"FAILED: %s", __LINE__,
4594418919fSjohnjiang 					"Session creation failed");
4604418919fSjohnjiang 			status = TEST_FAILED;
4614418919fSjohnjiang 			goto error_exit;
4624418919fSjohnjiang 		}
4634418919fSjohnjiang 
4644418919fSjohnjiang 		if (rte_cryptodev_asym_session_init(dev_id, sess, &xform_tc,
4654418919fSjohnjiang 				ts_params->session_mpool) < 0) {
4664418919fSjohnjiang 			snprintf(test_msg, ASYM_TEST_MSG_LEN,
4674418919fSjohnjiang 					"line %u FAILED: %s",
4684418919fSjohnjiang 					__LINE__, "unabled to config sym session");
4694418919fSjohnjiang 			status = TEST_FAILED;
4704418919fSjohnjiang 			goto error_exit;
4714418919fSjohnjiang 		}
4724418919fSjohnjiang 
4734418919fSjohnjiang 		rte_crypto_op_attach_asym_session(op, sess);
4744418919fSjohnjiang 	} else {
4754418919fSjohnjiang 		asym_op->xform = &xform_tc;
4764418919fSjohnjiang 		op->sess_type = RTE_CRYPTO_OP_SESSIONLESS;
4774418919fSjohnjiang 	}
4784418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
4794418919fSjohnjiang 
4804418919fSjohnjiang 	/* Process crypto operation */
4814418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
4824418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN,
4834418919fSjohnjiang 				"line %u FAILED: %s",
4844418919fSjohnjiang 				__LINE__, "Error sending packet for operation");
4854418919fSjohnjiang 		status = TEST_FAILED;
4864418919fSjohnjiang 		goto error_exit;
4874418919fSjohnjiang 	}
4884418919fSjohnjiang 
4894418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
4904418919fSjohnjiang 		rte_pause();
4914418919fSjohnjiang 
4924418919fSjohnjiang 	if (result_op == NULL) {
4934418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN,
4944418919fSjohnjiang 				"line %u FAILED: %s",
4954418919fSjohnjiang 				__LINE__, "Failed to process asym crypto op");
4964418919fSjohnjiang 		status = TEST_FAILED;
4974418919fSjohnjiang 		goto error_exit;
4984418919fSjohnjiang 	}
4994418919fSjohnjiang 
5004418919fSjohnjiang 	if (test_cryptodev_asym_ver(op, &xform_tc, data_tc, result_op) != TEST_SUCCESS) {
5014418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN,
5024418919fSjohnjiang 			"line %u FAILED: %s",
5034418919fSjohnjiang 			__LINE__, "Verification failed ");
5044418919fSjohnjiang 		status = TEST_FAILED;
5054418919fSjohnjiang 		goto error_exit;
5064418919fSjohnjiang 	}
5074418919fSjohnjiang 
5084418919fSjohnjiang 	if (!sessionless)
5094418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN, "PASS");
5104418919fSjohnjiang 	else
5114418919fSjohnjiang 		snprintf(test_msg, ASYM_TEST_MSG_LEN, "SESSIONLESS PASS");
5124418919fSjohnjiang 
5134418919fSjohnjiang error_exit:
5144418919fSjohnjiang 		if (sess != NULL) {
5154418919fSjohnjiang 			rte_cryptodev_asym_session_clear(dev_id, sess);
5164418919fSjohnjiang 			rte_cryptodev_asym_session_free(sess);
5174418919fSjohnjiang 		}
5184418919fSjohnjiang 
5194418919fSjohnjiang 		if (op != NULL)
5204418919fSjohnjiang 			rte_crypto_op_free(op);
5214418919fSjohnjiang 
5224418919fSjohnjiang 		if (result != NULL)
5234418919fSjohnjiang 			rte_free(result);
5244418919fSjohnjiang 
5254418919fSjohnjiang 	return status;
5264418919fSjohnjiang }
5274418919fSjohnjiang 
5284418919fSjohnjiang static int
test_one_case(const void * test_case,int sessionless)5294418919fSjohnjiang test_one_case(const void *test_case, int sessionless)
5304418919fSjohnjiang {
5314418919fSjohnjiang 	int status = TEST_SUCCESS, i = 0;
5324418919fSjohnjiang 	char test_msg[ASYM_TEST_MSG_LEN + 1];
5334418919fSjohnjiang 
5344418919fSjohnjiang 	/* Map the case to union */
5354418919fSjohnjiang 	union test_case_structure tc;
5364418919fSjohnjiang 	memcpy(&tc, test_case, sizeof(tc));
5374418919fSjohnjiang 
5384418919fSjohnjiang 	if (tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_MODEX
5394418919fSjohnjiang 			|| tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_MODINV) {
5404418919fSjohnjiang 		status = test_cryptodev_asym_op(&testsuite_params, &tc, test_msg,
5414418919fSjohnjiang 				sessionless, 0, 0);
5424418919fSjohnjiang 		printf("  %u) TestCase %s %s\n", test_index++,
5434418919fSjohnjiang 			tc.modex.description, test_msg);
5444418919fSjohnjiang 	} else {
5454418919fSjohnjiang 		for (i = 0; i < RTE_CRYPTO_ASYM_OP_LIST_END; i++) {
5464418919fSjohnjiang 			if (tc.modex.xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) {
5474418919fSjohnjiang 				if (tc.rsa_data.op_type_flags & (1 << i)) {
5484418919fSjohnjiang 					if (tc.rsa_data.key_exp) {
5494418919fSjohnjiang 						status = test_cryptodev_asym_op(
5504418919fSjohnjiang 							&testsuite_params, &tc,
5514418919fSjohnjiang 							test_msg, sessionless, i,
5524418919fSjohnjiang 							RTE_RSA_KEY_TYPE_EXP);
5534418919fSjohnjiang 					}
5544418919fSjohnjiang 					if (status)
5554418919fSjohnjiang 						break;
5564418919fSjohnjiang 					if (tc.rsa_data.key_qt && (i ==
5574418919fSjohnjiang 							RTE_CRYPTO_ASYM_OP_DECRYPT ||
5584418919fSjohnjiang 							i == RTE_CRYPTO_ASYM_OP_SIGN)) {
5594418919fSjohnjiang 						status = test_cryptodev_asym_op(
5604418919fSjohnjiang 							&testsuite_params,
5614418919fSjohnjiang 							&tc, test_msg, sessionless, i,
5624418919fSjohnjiang 							RTE_RSA_KET_TYPE_QT);
5634418919fSjohnjiang 					}
5644418919fSjohnjiang 					if (status)
5654418919fSjohnjiang 						break;
5664418919fSjohnjiang 				}
5674418919fSjohnjiang 			}
5684418919fSjohnjiang 		}
5694418919fSjohnjiang 		printf("  %u) TestCase %s %s\n", test_index++,
5704418919fSjohnjiang 			tc.modex.description, test_msg);
5714418919fSjohnjiang 	}
5724418919fSjohnjiang 
5734418919fSjohnjiang 	return status;
5744418919fSjohnjiang }
5754418919fSjohnjiang 
5764418919fSjohnjiang static int
load_test_vectors(void)5774418919fSjohnjiang load_test_vectors(void)
5784418919fSjohnjiang {
5794418919fSjohnjiang 	uint32_t i = 0, v_size = 0;
5804418919fSjohnjiang 	/* Load MODEX vector*/
5814418919fSjohnjiang 	v_size = RTE_DIM(modex_test_case);
5824418919fSjohnjiang 	for (i = 0; i < v_size; i++) {
5834418919fSjohnjiang 		if (test_vector.size >= (TEST_VECTOR_SIZE)) {
5844418919fSjohnjiang 			RTE_LOG(DEBUG, USER1,
5854418919fSjohnjiang 				"TEST_VECTOR_SIZE too small\n");
5864418919fSjohnjiang 			return -1;
5874418919fSjohnjiang 		}
5884418919fSjohnjiang 		test_vector.address[test_vector.size] = &modex_test_case[i];
5894418919fSjohnjiang 		test_vector.size++;
5904418919fSjohnjiang 	}
5914418919fSjohnjiang 	/* Load MODINV vector*/
5924418919fSjohnjiang 	v_size = RTE_DIM(modinv_test_case);
5934418919fSjohnjiang 	for (i = 0; i < v_size; i++) {
5944418919fSjohnjiang 		if (test_vector.size >= (TEST_VECTOR_SIZE)) {
5954418919fSjohnjiang 			RTE_LOG(DEBUG, USER1,
5964418919fSjohnjiang 				"TEST_VECTOR_SIZE too small\n");
5974418919fSjohnjiang 			return -1;
5984418919fSjohnjiang 		}
5994418919fSjohnjiang 		test_vector.address[test_vector.size] = &modinv_test_case[i];
6004418919fSjohnjiang 		test_vector.size++;
6014418919fSjohnjiang 	}
6024418919fSjohnjiang 	/* Load RSA vector*/
6034418919fSjohnjiang 	v_size = RTE_DIM(rsa_test_case_list);
6044418919fSjohnjiang 	for (i = 0; i < v_size; i++) {
6054418919fSjohnjiang 		if (test_vector.size >= (TEST_VECTOR_SIZE)) {
6064418919fSjohnjiang 			RTE_LOG(DEBUG, USER1,
6074418919fSjohnjiang 				"TEST_VECTOR_SIZE too small\n");
6084418919fSjohnjiang 			return -1;
6094418919fSjohnjiang 		}
6104418919fSjohnjiang 		test_vector.address[test_vector.size] = &rsa_test_case_list[i];
6114418919fSjohnjiang 		test_vector.size++;
6124418919fSjohnjiang 	}
6134418919fSjohnjiang 	return 0;
6144418919fSjohnjiang }
6154418919fSjohnjiang 
6164418919fSjohnjiang static int
test_one_by_one(void)6174418919fSjohnjiang test_one_by_one(void)
6184418919fSjohnjiang {
6194418919fSjohnjiang 	int status = TEST_SUCCESS;
6204418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
6214418919fSjohnjiang 	uint32_t i = 0;
6224418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
6234418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
6244418919fSjohnjiang 	int sessionless = 0;
6254418919fSjohnjiang 
6264418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
6274418919fSjohnjiang 	if ((dev_info.feature_flags &
6284418919fSjohnjiang 			RTE_CRYPTODEV_FF_ASYM_SESSIONLESS)) {
6294418919fSjohnjiang 		sessionless = 1;
6304418919fSjohnjiang 	}
6314418919fSjohnjiang 
6324418919fSjohnjiang 	/* Go through all test cases */
6334418919fSjohnjiang 	test_index = 0;
6344418919fSjohnjiang 	for (i = 0; i < test_vector.size; i++) {
6354418919fSjohnjiang 		if (test_one_case(test_vector.address[i], 0) != TEST_SUCCESS)
6364418919fSjohnjiang 			status = TEST_FAILED;
6374418919fSjohnjiang 	}
6384418919fSjohnjiang 	if (sessionless) {
6394418919fSjohnjiang 		for (i = 0; i < test_vector.size; i++) {
6404418919fSjohnjiang 			if (test_one_case(test_vector.address[i], 1)
6414418919fSjohnjiang 					!= TEST_SUCCESS)
6424418919fSjohnjiang 				status = TEST_FAILED;
6434418919fSjohnjiang 		}
6444418919fSjohnjiang 	}
6454418919fSjohnjiang 
6464418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
6474418919fSjohnjiang 	return status;
6484418919fSjohnjiang }
6494418919fSjohnjiang 
6504418919fSjohnjiang static int
test_rsa_sign_verify(void)6514418919fSjohnjiang test_rsa_sign_verify(void)
6524418919fSjohnjiang {
6534418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
6544418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
6554418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
6564418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess;
6574418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
6584418919fSjohnjiang 	int status = TEST_SUCCESS;
6594418919fSjohnjiang 
6604418919fSjohnjiang 	/* Test case supports op with exponent key only,
6614418919fSjohnjiang 	 * Check in PMD feature flag for RSA exponent key type support.
6624418919fSjohnjiang 	 */
6634418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
6644418919fSjohnjiang 	if (!(dev_info.feature_flags &
6654418919fSjohnjiang 				RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_EXP)) {
6664418919fSjohnjiang 		RTE_LOG(INFO, USER1, "Device doesn't support sign op with "
6674418919fSjohnjiang 			"exponent key type. Test Skipped\n");
6684418919fSjohnjiang 		return -ENOTSUP;
6694418919fSjohnjiang 	}
6704418919fSjohnjiang 
6714418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
6724418919fSjohnjiang 
6734418919fSjohnjiang 	if (!sess) {
6744418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Session creation failed for "
6754418919fSjohnjiang 			"sign_verify\n");
6764418919fSjohnjiang 		return TEST_FAILED;
6774418919fSjohnjiang 	}
6784418919fSjohnjiang 
6794418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &rsa_xform,
6804418919fSjohnjiang 				sess_mpool) < 0) {
6814418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Unable to config asym session for "
6824418919fSjohnjiang 			"sign_verify\n");
6834418919fSjohnjiang 		status = TEST_FAILED;
6844418919fSjohnjiang 		goto error_exit;
6854418919fSjohnjiang 	}
6864418919fSjohnjiang 
6874418919fSjohnjiang 	status = queue_ops_rsa_sign_verify(sess);
6884418919fSjohnjiang 
6894418919fSjohnjiang error_exit:
6904418919fSjohnjiang 
6914418919fSjohnjiang 	rte_cryptodev_asym_session_clear(dev_id, sess);
6924418919fSjohnjiang 	rte_cryptodev_asym_session_free(sess);
6934418919fSjohnjiang 
6944418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
6954418919fSjohnjiang 
6964418919fSjohnjiang 	return status;
6974418919fSjohnjiang }
6984418919fSjohnjiang 
6994418919fSjohnjiang static int
test_rsa_enc_dec(void)7004418919fSjohnjiang test_rsa_enc_dec(void)
7014418919fSjohnjiang {
7024418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
7034418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
7044418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
7054418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess;
7064418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
7074418919fSjohnjiang 	int status = TEST_SUCCESS;
7084418919fSjohnjiang 
7094418919fSjohnjiang 	/* Test case supports op with exponent key only,
7104418919fSjohnjiang 	 * Check in PMD feature flag for RSA exponent key type support.
7114418919fSjohnjiang 	 */
7124418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
7134418919fSjohnjiang 	if (!(dev_info.feature_flags &
7144418919fSjohnjiang 				RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_EXP)) {
7154418919fSjohnjiang 		RTE_LOG(INFO, USER1, "Device doesn't support decrypt op with "
7164418919fSjohnjiang 			"exponent key type. Test skipped\n");
7174418919fSjohnjiang 		return -ENOTSUP;
7184418919fSjohnjiang 	}
7194418919fSjohnjiang 
7204418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
7214418919fSjohnjiang 
7224418919fSjohnjiang 	if (!sess) {
7234418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Session creation failed for enc_dec\n");
7244418919fSjohnjiang 		return TEST_FAILED;
7254418919fSjohnjiang 	}
7264418919fSjohnjiang 
7274418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &rsa_xform,
7284418919fSjohnjiang 				sess_mpool) < 0) {
7294418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Unable to config asym session for "
7304418919fSjohnjiang 			"enc_dec\n");
7314418919fSjohnjiang 		status = TEST_FAILED;
7324418919fSjohnjiang 		goto error_exit;
7334418919fSjohnjiang 	}
7344418919fSjohnjiang 
7354418919fSjohnjiang 	status = queue_ops_rsa_enc_dec(sess);
7364418919fSjohnjiang 
7374418919fSjohnjiang error_exit:
7384418919fSjohnjiang 
7394418919fSjohnjiang 	rte_cryptodev_asym_session_clear(dev_id, sess);
7404418919fSjohnjiang 	rte_cryptodev_asym_session_free(sess);
7414418919fSjohnjiang 
7424418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
7434418919fSjohnjiang 
7444418919fSjohnjiang 	return status;
7454418919fSjohnjiang }
7464418919fSjohnjiang 
7474418919fSjohnjiang static int
test_rsa_sign_verify_crt(void)7484418919fSjohnjiang test_rsa_sign_verify_crt(void)
7494418919fSjohnjiang {
7504418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
7514418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
7524418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
7534418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess;
7544418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
7554418919fSjohnjiang 	int status = TEST_SUCCESS;
7564418919fSjohnjiang 
7574418919fSjohnjiang 	/* Test case supports op with quintuple format key only,
7584418919fSjohnjiang 	 * Check im PMD feature flag for RSA quintuple key type support.
7594418919fSjohnjiang 	 */
7604418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
7614418919fSjohnjiang 	if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) {
7624418919fSjohnjiang 		RTE_LOG(INFO, USER1, "Device doesn't support sign op with "
7634418919fSjohnjiang 			"quintuple key type. Test skipped\n");
7644418919fSjohnjiang 		return -ENOTSUP;
7654418919fSjohnjiang 	}
7664418919fSjohnjiang 
7674418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
7684418919fSjohnjiang 
7694418919fSjohnjiang 	if (!sess) {
7704418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Session creation failed for "
7714418919fSjohnjiang 			"sign_verify_crt\n");
7724418919fSjohnjiang 		status = TEST_FAILED;
7734418919fSjohnjiang 		return status;
7744418919fSjohnjiang 	}
7754418919fSjohnjiang 
7764418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &rsa_xform_crt,
7774418919fSjohnjiang 				sess_mpool) < 0) {
7784418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Unable to config asym session for "
7794418919fSjohnjiang 			"sign_verify_crt\n");
7804418919fSjohnjiang 		status = TEST_FAILED;
7814418919fSjohnjiang 		goto error_exit;
7824418919fSjohnjiang 	}
7834418919fSjohnjiang 	status = queue_ops_rsa_sign_verify(sess);
7844418919fSjohnjiang 
7854418919fSjohnjiang error_exit:
7864418919fSjohnjiang 
7874418919fSjohnjiang 	rte_cryptodev_asym_session_clear(dev_id, sess);
7884418919fSjohnjiang 	rte_cryptodev_asym_session_free(sess);
7894418919fSjohnjiang 
7904418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
7914418919fSjohnjiang 
7924418919fSjohnjiang 	return status;
7934418919fSjohnjiang }
7944418919fSjohnjiang 
7954418919fSjohnjiang static int
test_rsa_enc_dec_crt(void)7964418919fSjohnjiang test_rsa_enc_dec_crt(void)
7974418919fSjohnjiang {
7984418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
7994418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
8004418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
8014418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess;
8024418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
8034418919fSjohnjiang 	int status = TEST_SUCCESS;
8044418919fSjohnjiang 
8054418919fSjohnjiang 	/* Test case supports op with quintuple format key only,
8064418919fSjohnjiang 	 * Check in PMD feature flag for RSA quintuple key type support.
8074418919fSjohnjiang 	 */
8084418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
8094418919fSjohnjiang 	if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) {
8104418919fSjohnjiang 		RTE_LOG(INFO, USER1, "Device doesn't support decrypt op with "
8114418919fSjohnjiang 			"quintuple key type. Test skipped\n");
8124418919fSjohnjiang 		return -ENOTSUP;
8134418919fSjohnjiang 	}
8144418919fSjohnjiang 
8154418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
8164418919fSjohnjiang 
8174418919fSjohnjiang 	if (!sess) {
8184418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Session creation failed for "
8194418919fSjohnjiang 			"enc_dec_crt\n");
8204418919fSjohnjiang 		return TEST_FAILED;
8214418919fSjohnjiang 	}
8224418919fSjohnjiang 
8234418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &rsa_xform_crt,
8244418919fSjohnjiang 				sess_mpool) < 0) {
8254418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Unable to config asym session for "
8264418919fSjohnjiang 			"enc_dec_crt\n");
8274418919fSjohnjiang 		status = TEST_FAILED;
8284418919fSjohnjiang 		goto error_exit;
8294418919fSjohnjiang 	}
8304418919fSjohnjiang 	status = queue_ops_rsa_enc_dec(sess);
8314418919fSjohnjiang 
8324418919fSjohnjiang error_exit:
8334418919fSjohnjiang 
8344418919fSjohnjiang 	rte_cryptodev_asym_session_clear(dev_id, sess);
8354418919fSjohnjiang 	rte_cryptodev_asym_session_free(sess);
8364418919fSjohnjiang 
8374418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
8384418919fSjohnjiang 
8394418919fSjohnjiang 	return status;
8404418919fSjohnjiang }
8414418919fSjohnjiang 
8424418919fSjohnjiang static int
testsuite_setup(void)8434418919fSjohnjiang testsuite_setup(void)
8444418919fSjohnjiang {
8454418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
8464418919fSjohnjiang 	uint8_t valid_devs[RTE_CRYPTO_MAX_DEVS];
8474418919fSjohnjiang 	struct rte_cryptodev_info info;
8484418919fSjohnjiang 	int ret, dev_id = -1;
8494418919fSjohnjiang 	uint32_t i, nb_devs;
8504418919fSjohnjiang 	uint16_t qp_id;
8514418919fSjohnjiang 
8524418919fSjohnjiang 	memset(ts_params, 0, sizeof(*ts_params));
8534418919fSjohnjiang 
8544418919fSjohnjiang 	test_vector.size = 0;
8554418919fSjohnjiang 	load_test_vectors();
8564418919fSjohnjiang 
8574418919fSjohnjiang 	ts_params->op_mpool = rte_crypto_op_pool_create(
8584418919fSjohnjiang 			"CRYPTO_ASYM_OP_POOL",
8594418919fSjohnjiang 			RTE_CRYPTO_OP_TYPE_ASYMMETRIC,
8604418919fSjohnjiang 			TEST_NUM_BUFS, 0,
8614418919fSjohnjiang 			0,
8624418919fSjohnjiang 			rte_socket_id());
8634418919fSjohnjiang 	if (ts_params->op_mpool == NULL) {
8644418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Can't create ASYM_CRYPTO_OP_POOL\n");
8654418919fSjohnjiang 		return TEST_FAILED;
8664418919fSjohnjiang 	}
8674418919fSjohnjiang 
8684418919fSjohnjiang 	/* Create an OPENSSL device if required */
8694418919fSjohnjiang 	if (gbl_driver_id == rte_cryptodev_driver_id_get(
8704418919fSjohnjiang 			RTE_STR(CRYPTODEV_NAME_OPENSSL_PMD))) {
8714418919fSjohnjiang 		nb_devs = rte_cryptodev_device_count_by_driver(
8724418919fSjohnjiang 				rte_cryptodev_driver_id_get(
8734418919fSjohnjiang 				RTE_STR(CRYPTODEV_NAME_OPENSSL_PMD)));
8744418919fSjohnjiang 		if (nb_devs < 1) {
8754418919fSjohnjiang 			ret = rte_vdev_init(
8764418919fSjohnjiang 				RTE_STR(CRYPTODEV_NAME_OPENSSL_PMD),
8774418919fSjohnjiang 				NULL);
8784418919fSjohnjiang 
8794418919fSjohnjiang 			TEST_ASSERT(ret == 0, "Failed to create "
8804418919fSjohnjiang 				"instance of pmd : %s",
8814418919fSjohnjiang 				RTE_STR(CRYPTODEV_NAME_OPENSSL_PMD));
8824418919fSjohnjiang 		}
8834418919fSjohnjiang 	}
8844418919fSjohnjiang 
8854418919fSjohnjiang 	/* Get list of valid crypto devs */
8864418919fSjohnjiang 	nb_devs = rte_cryptodev_devices_get(
8874418919fSjohnjiang 				rte_cryptodev_driver_name_get(gbl_driver_id),
8884418919fSjohnjiang 				valid_devs, RTE_CRYPTO_MAX_DEVS);
8894418919fSjohnjiang 	if (nb_devs < 1) {
8904418919fSjohnjiang 		RTE_LOG(ERR, USER1, "No crypto devices found?\n");
8914418919fSjohnjiang 		return TEST_FAILED;
8924418919fSjohnjiang 	}
8934418919fSjohnjiang 
8944418919fSjohnjiang 	/*
8954418919fSjohnjiang 	 * Get first valid asymmetric device found in test suite param and
8964418919fSjohnjiang 	 * break
8974418919fSjohnjiang 	 */
8984418919fSjohnjiang 	for (i = 0; i < nb_devs ; i++) {
8994418919fSjohnjiang 		rte_cryptodev_info_get(valid_devs[i], &info);
9004418919fSjohnjiang 		if (info.feature_flags & RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO) {
9014418919fSjohnjiang 			dev_id = ts_params->valid_devs[0] = valid_devs[i];
9024418919fSjohnjiang 			break;
9034418919fSjohnjiang 		}
9044418919fSjohnjiang 	}
9054418919fSjohnjiang 
9064418919fSjohnjiang 	if (dev_id == -1) {
9074418919fSjohnjiang 		RTE_LOG(ERR, USER1, "Device doesn't support asymmetric. "
9084418919fSjohnjiang 			"Test skipped.\n");
9094418919fSjohnjiang 		return TEST_FAILED;
9104418919fSjohnjiang 	}
9114418919fSjohnjiang 
9124418919fSjohnjiang 	/* Set valid device count */
9134418919fSjohnjiang 	ts_params->valid_dev_count = nb_devs;
9144418919fSjohnjiang 
9154418919fSjohnjiang 	/* configure device with num qp */
9164418919fSjohnjiang 	ts_params->conf.nb_queue_pairs = info.max_nb_queue_pairs;
9174418919fSjohnjiang 	ts_params->conf.socket_id = SOCKET_ID_ANY;
9184418919fSjohnjiang 	ts_params->conf.ff_disable = RTE_CRYPTODEV_FF_SECURITY |
9194418919fSjohnjiang 			RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO;
9204418919fSjohnjiang 	TEST_ASSERT_SUCCESS(rte_cryptodev_configure(dev_id,
9214418919fSjohnjiang 			&ts_params->conf),
9224418919fSjohnjiang 			"Failed to configure cryptodev %u with %u qps",
9234418919fSjohnjiang 			dev_id, ts_params->conf.nb_queue_pairs);
9244418919fSjohnjiang 
9254418919fSjohnjiang 	/* configure qp */
9264418919fSjohnjiang 	ts_params->qp_conf.nb_descriptors = DEFAULT_NUM_OPS_INFLIGHT;
9274418919fSjohnjiang 	ts_params->qp_conf.mp_session = ts_params->session_mpool;
9284418919fSjohnjiang 	ts_params->qp_conf.mp_session_private = ts_params->session_mpool;
9294418919fSjohnjiang 	for (qp_id = 0; qp_id < info.max_nb_queue_pairs; qp_id++) {
9304418919fSjohnjiang 		TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
9314418919fSjohnjiang 			dev_id, qp_id, &ts_params->qp_conf,
9324418919fSjohnjiang 			rte_cryptodev_socket_id(dev_id)),
9334418919fSjohnjiang 			"Failed to setup queue pair %u on cryptodev %u ASYM",
9344418919fSjohnjiang 			qp_id, dev_id);
9354418919fSjohnjiang 	}
9364418919fSjohnjiang 
9374418919fSjohnjiang 	/* setup asym session pool */
9380c6bd470Sfengbojiang 	unsigned int session_size = RTE_MAX(
9390c6bd470Sfengbojiang 		rte_cryptodev_asym_get_private_session_size(dev_id),
9400c6bd470Sfengbojiang 		rte_cryptodev_asym_get_header_session_size());
9414418919fSjohnjiang 	/*
9424418919fSjohnjiang 	 * Create mempool with TEST_NUM_SESSIONS * 2,
9434418919fSjohnjiang 	 * to include the session headers
9444418919fSjohnjiang 	 */
9454418919fSjohnjiang 	ts_params->session_mpool = rte_mempool_create(
9464418919fSjohnjiang 				"test_asym_sess_mp",
9474418919fSjohnjiang 				TEST_NUM_SESSIONS * 2,
9484418919fSjohnjiang 				session_size,
9494418919fSjohnjiang 				0, 0, NULL, NULL, NULL,
9504418919fSjohnjiang 				NULL, SOCKET_ID_ANY,
9514418919fSjohnjiang 				0);
9524418919fSjohnjiang 
9534418919fSjohnjiang 	TEST_ASSERT_NOT_NULL(ts_params->session_mpool,
9544418919fSjohnjiang 			"session mempool allocation failed");
9554418919fSjohnjiang 
9564418919fSjohnjiang 	return TEST_SUCCESS;
9574418919fSjohnjiang }
9584418919fSjohnjiang 
9594418919fSjohnjiang static void
testsuite_teardown(void)9604418919fSjohnjiang testsuite_teardown(void)
9614418919fSjohnjiang {
9624418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
9634418919fSjohnjiang 
9644418919fSjohnjiang 	if (ts_params->op_mpool != NULL) {
9654418919fSjohnjiang 		RTE_LOG(DEBUG, USER1, "CRYPTO_OP_POOL count %u\n",
9664418919fSjohnjiang 		rte_mempool_avail_count(ts_params->op_mpool));
9674418919fSjohnjiang 	}
9684418919fSjohnjiang 
9694418919fSjohnjiang 	/* Free session mempools */
9704418919fSjohnjiang 	if (ts_params->session_mpool != NULL) {
9714418919fSjohnjiang 		rte_mempool_free(ts_params->session_mpool);
9724418919fSjohnjiang 		ts_params->session_mpool = NULL;
9734418919fSjohnjiang 	}
9744418919fSjohnjiang }
9754418919fSjohnjiang 
9764418919fSjohnjiang static int
ut_setup(void)9774418919fSjohnjiang ut_setup(void)
9784418919fSjohnjiang {
9794418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
9804418919fSjohnjiang 
9814418919fSjohnjiang 	uint16_t qp_id;
9824418919fSjohnjiang 
9834418919fSjohnjiang 	/* Reconfigure device to default parameters */
9844418919fSjohnjiang 	ts_params->conf.socket_id = SOCKET_ID_ANY;
9854418919fSjohnjiang 
9864418919fSjohnjiang 	TEST_ASSERT_SUCCESS(rte_cryptodev_configure(ts_params->valid_devs[0],
9874418919fSjohnjiang 			&ts_params->conf),
9884418919fSjohnjiang 			"Failed to configure cryptodev %u",
9894418919fSjohnjiang 			ts_params->valid_devs[0]);
9904418919fSjohnjiang 
9914418919fSjohnjiang 	for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs ; qp_id++) {
9924418919fSjohnjiang 		TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
9934418919fSjohnjiang 			ts_params->valid_devs[0], qp_id,
9944418919fSjohnjiang 			&ts_params->qp_conf,
9954418919fSjohnjiang 			rte_cryptodev_socket_id(ts_params->valid_devs[0])),
9964418919fSjohnjiang 			"Failed to setup queue pair %u on cryptodev %u",
9974418919fSjohnjiang 			qp_id, ts_params->valid_devs[0]);
9984418919fSjohnjiang 	}
9994418919fSjohnjiang 
10004418919fSjohnjiang 	rte_cryptodev_stats_reset(ts_params->valid_devs[0]);
10014418919fSjohnjiang 
10024418919fSjohnjiang 	/* Start the device */
10034418919fSjohnjiang 	TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->valid_devs[0]),
10044418919fSjohnjiang 						"Failed to start cryptodev %u",
10054418919fSjohnjiang 						ts_params->valid_devs[0]);
10064418919fSjohnjiang 
10074418919fSjohnjiang 	return TEST_SUCCESS;
10084418919fSjohnjiang }
10094418919fSjohnjiang 
10104418919fSjohnjiang static void
ut_teardown(void)10114418919fSjohnjiang ut_teardown(void)
10124418919fSjohnjiang {
10134418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
10144418919fSjohnjiang 	struct rte_cryptodev_stats stats;
10154418919fSjohnjiang 
10164418919fSjohnjiang 	rte_cryptodev_stats_get(ts_params->valid_devs[0], &stats);
10174418919fSjohnjiang 
10184418919fSjohnjiang 	/* Stop the device */
10194418919fSjohnjiang 	rte_cryptodev_stop(ts_params->valid_devs[0]);
10204418919fSjohnjiang }
10214418919fSjohnjiang 
print_asym_capa(const struct rte_cryptodev_asymmetric_xform_capability * capa)10224418919fSjohnjiang static inline void print_asym_capa(
10234418919fSjohnjiang 		const struct rte_cryptodev_asymmetric_xform_capability *capa)
10244418919fSjohnjiang {
10254418919fSjohnjiang 	int i = 0;
10264418919fSjohnjiang 
10274418919fSjohnjiang 	printf("\nxform type: %s\n===================\n",
10284418919fSjohnjiang 			rte_crypto_asym_xform_strings[capa->xform_type]);
10294418919fSjohnjiang 	printf("operation supported -");
10304418919fSjohnjiang 
10314418919fSjohnjiang 	for (i = 0; i < RTE_CRYPTO_ASYM_OP_LIST_END; i++) {
10324418919fSjohnjiang 		/* check supported operations */
10334418919fSjohnjiang 		if (rte_cryptodev_asym_xform_capability_check_optype(capa, i))
10344418919fSjohnjiang 			printf(" %s",
10354418919fSjohnjiang 					rte_crypto_asym_op_strings[i]);
10364418919fSjohnjiang 		}
10374418919fSjohnjiang 		switch (capa->xform_type) {
10384418919fSjohnjiang 		case RTE_CRYPTO_ASYM_XFORM_RSA:
10394418919fSjohnjiang 		case RTE_CRYPTO_ASYM_XFORM_MODINV:
10404418919fSjohnjiang 		case RTE_CRYPTO_ASYM_XFORM_MODEX:
10414418919fSjohnjiang 		case RTE_CRYPTO_ASYM_XFORM_DH:
10424418919fSjohnjiang 		case RTE_CRYPTO_ASYM_XFORM_DSA:
1043*2d9fd380Sjfb8856606 			printf(" modlen: min %d max %d increment %d",
10444418919fSjohnjiang 					capa->modlen.min,
10454418919fSjohnjiang 					capa->modlen.max,
10464418919fSjohnjiang 					capa->modlen.increment);
10474418919fSjohnjiang 		break;
1048*2d9fd380Sjfb8856606 		case RTE_CRYPTO_ASYM_XFORM_ECDSA:
1049*2d9fd380Sjfb8856606 		case RTE_CRYPTO_ASYM_XFORM_ECPM:
10504418919fSjohnjiang 		default:
10514418919fSjohnjiang 			break;
10524418919fSjohnjiang 		}
1053*2d9fd380Sjfb8856606 		printf("\n");
10544418919fSjohnjiang }
10554418919fSjohnjiang 
10564418919fSjohnjiang static int
test_capability(void)10574418919fSjohnjiang test_capability(void)
10584418919fSjohnjiang {
10594418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
10604418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
10614418919fSjohnjiang 	struct rte_cryptodev_info dev_info;
10624418919fSjohnjiang 	const struct rte_cryptodev_capabilities *dev_capa;
10634418919fSjohnjiang 	int i = 0;
10644418919fSjohnjiang 	struct rte_cryptodev_asym_capability_idx idx;
10654418919fSjohnjiang 	const struct rte_cryptodev_asymmetric_xform_capability *capa;
10664418919fSjohnjiang 
10674418919fSjohnjiang 	rte_cryptodev_info_get(dev_id, &dev_info);
10684418919fSjohnjiang 	if (!(dev_info.feature_flags &
10694418919fSjohnjiang 				RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO)) {
10704418919fSjohnjiang 		RTE_LOG(INFO, USER1,
10714418919fSjohnjiang 				"Device doesn't support asymmetric. Test Skipped\n");
10724418919fSjohnjiang 		return TEST_SUCCESS;
10734418919fSjohnjiang 	}
10744418919fSjohnjiang 
10754418919fSjohnjiang 	/* print xform capability */
10764418919fSjohnjiang 	for (i = 0;
10774418919fSjohnjiang 		dev_info.capabilities[i].op != RTE_CRYPTO_OP_TYPE_UNDEFINED;
10784418919fSjohnjiang 		i++) {
10794418919fSjohnjiang 		dev_capa = &(dev_info.capabilities[i]);
10804418919fSjohnjiang 		if (dev_info.capabilities[i].op ==
10814418919fSjohnjiang 				RTE_CRYPTO_OP_TYPE_ASYMMETRIC) {
10824418919fSjohnjiang 			idx.type = dev_capa->asym.xform_capa.xform_type;
10834418919fSjohnjiang 
10844418919fSjohnjiang 			capa = rte_cryptodev_asym_capability_get(dev_id,
10854418919fSjohnjiang 				(const struct
10864418919fSjohnjiang 				rte_cryptodev_asym_capability_idx *) &idx);
10874418919fSjohnjiang 			print_asym_capa(capa);
10884418919fSjohnjiang 			}
10894418919fSjohnjiang 	}
10904418919fSjohnjiang 	return TEST_SUCCESS;
10914418919fSjohnjiang }
10924418919fSjohnjiang 
10934418919fSjohnjiang static int
test_dh_gen_shared_sec(struct rte_crypto_asym_xform * xfrm)10944418919fSjohnjiang test_dh_gen_shared_sec(struct rte_crypto_asym_xform *xfrm)
10954418919fSjohnjiang {
10964418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
10974418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
10984418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
10994418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
11004418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
11014418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
11024418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
11034418919fSjohnjiang 	int status = TEST_SUCCESS;
11044418919fSjohnjiang 	uint8_t output[TEST_DH_MOD_LEN];
11054418919fSjohnjiang 	struct rte_crypto_asym_xform xform = *xfrm;
11064418919fSjohnjiang 	uint8_t peer[] = "01234567890123456789012345678901234567890123456789";
11074418919fSjohnjiang 
11084418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
11094418919fSjohnjiang 	if (sess == NULL) {
11104418919fSjohnjiang 		RTE_LOG(ERR, USER1,
11114418919fSjohnjiang 				"line %u FAILED: %s", __LINE__,
11124418919fSjohnjiang 				"Session creation failed");
11134418919fSjohnjiang 		status = TEST_FAILED;
11144418919fSjohnjiang 		goto error_exit;
11154418919fSjohnjiang 	}
11164418919fSjohnjiang 	/* set up crypto op data structure */
11174418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
11184418919fSjohnjiang 	if (!op) {
11194418919fSjohnjiang 		RTE_LOG(ERR, USER1,
11204418919fSjohnjiang 			"line %u FAILED: %s",
11214418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
11224418919fSjohnjiang 			"operation struct");
11234418919fSjohnjiang 		status = TEST_FAILED;
11244418919fSjohnjiang 		goto error_exit;
11254418919fSjohnjiang 	}
11264418919fSjohnjiang 	asym_op = op->asym;
11274418919fSjohnjiang 
11284418919fSjohnjiang 	/* Setup a xform and op to generate private key only */
11294418919fSjohnjiang 	xform.dh.type = RTE_CRYPTO_ASYM_OP_SHARED_SECRET_COMPUTE;
11304418919fSjohnjiang 	xform.next = NULL;
11314418919fSjohnjiang 	asym_op->dh.priv_key.data = dh_test_params.priv_key.data;
11324418919fSjohnjiang 	asym_op->dh.priv_key.length = dh_test_params.priv_key.length;
11334418919fSjohnjiang 	asym_op->dh.pub_key.data = (uint8_t *)peer;
11344418919fSjohnjiang 	asym_op->dh.pub_key.length = sizeof(peer);
11354418919fSjohnjiang 	asym_op->dh.shared_secret.data = output;
11364418919fSjohnjiang 	asym_op->dh.shared_secret.length = sizeof(output);
11374418919fSjohnjiang 
11384418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
11394418919fSjohnjiang 			sess_mpool) < 0) {
11404418919fSjohnjiang 		RTE_LOG(ERR, USER1,
11414418919fSjohnjiang 				"line %u FAILED: %s",
11424418919fSjohnjiang 				__LINE__, "unabled to config sym session");
11434418919fSjohnjiang 		status = TEST_FAILED;
11444418919fSjohnjiang 		goto error_exit;
11454418919fSjohnjiang 	}
11464418919fSjohnjiang 
11474418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
11484418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
11494418919fSjohnjiang 
11504418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
11514418919fSjohnjiang 
11524418919fSjohnjiang 	/* Process crypto operation */
11534418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
11544418919fSjohnjiang 		RTE_LOG(ERR, USER1,
11554418919fSjohnjiang 			"line %u FAILED: %s",
11564418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
11574418919fSjohnjiang 		status = TEST_FAILED;
11584418919fSjohnjiang 		goto error_exit;
11594418919fSjohnjiang 	}
11604418919fSjohnjiang 
11614418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
11624418919fSjohnjiang 		rte_pause();
11634418919fSjohnjiang 
11644418919fSjohnjiang 	if (result_op == NULL) {
11654418919fSjohnjiang 		RTE_LOG(ERR, USER1,
11664418919fSjohnjiang 			"line %u FAILED: %s",
11674418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
11684418919fSjohnjiang 		status = TEST_FAILED;
11694418919fSjohnjiang 		goto error_exit;
11704418919fSjohnjiang 	}
11714418919fSjohnjiang 
11724418919fSjohnjiang 	debug_hexdump(stdout, "shared secret:",
11734418919fSjohnjiang 			asym_op->dh.shared_secret.data,
11744418919fSjohnjiang 			asym_op->dh.shared_secret.length);
11754418919fSjohnjiang 
11764418919fSjohnjiang error_exit:
11774418919fSjohnjiang 	if (sess != NULL) {
11784418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
11794418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
11804418919fSjohnjiang 	}
11814418919fSjohnjiang 	if (op != NULL)
11824418919fSjohnjiang 		rte_crypto_op_free(op);
11834418919fSjohnjiang 	return status;
11844418919fSjohnjiang }
11854418919fSjohnjiang 
11864418919fSjohnjiang static int
test_dh_gen_priv_key(struct rte_crypto_asym_xform * xfrm)11874418919fSjohnjiang test_dh_gen_priv_key(struct rte_crypto_asym_xform *xfrm)
11884418919fSjohnjiang {
11894418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
11904418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
11914418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
11924418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
11934418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
11944418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
11954418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
11964418919fSjohnjiang 	int status = TEST_SUCCESS;
11974418919fSjohnjiang 	uint8_t output[TEST_DH_MOD_LEN];
11984418919fSjohnjiang 	struct rte_crypto_asym_xform xform = *xfrm;
11994418919fSjohnjiang 
12004418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
12014418919fSjohnjiang 	if (sess == NULL) {
12024418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12034418919fSjohnjiang 				 "line %u FAILED: %s", __LINE__,
12044418919fSjohnjiang 				"Session creation failed");
12054418919fSjohnjiang 		status = TEST_FAILED;
12064418919fSjohnjiang 		goto error_exit;
12074418919fSjohnjiang 	}
12084418919fSjohnjiang 	/* set up crypto op data structure */
12094418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
12104418919fSjohnjiang 	if (!op) {
12114418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12124418919fSjohnjiang 			"line %u FAILED: %s",
12134418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
12144418919fSjohnjiang 			"operation struct");
12154418919fSjohnjiang 		status = TEST_FAILED;
12164418919fSjohnjiang 		goto error_exit;
12174418919fSjohnjiang 	}
12184418919fSjohnjiang 	asym_op = op->asym;
12194418919fSjohnjiang 
12204418919fSjohnjiang 	/* Setup a xform and op to generate private key only */
12214418919fSjohnjiang 	xform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE;
12224418919fSjohnjiang 	xform.next = NULL;
12234418919fSjohnjiang 	asym_op->dh.priv_key.data = output;
12244418919fSjohnjiang 	asym_op->dh.priv_key.length = sizeof(output);
12254418919fSjohnjiang 
12264418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
12274418919fSjohnjiang 			sess_mpool) < 0) {
12284418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12294418919fSjohnjiang 				"line %u FAILED: %s",
12304418919fSjohnjiang 				__LINE__, "unabled to config sym session");
12314418919fSjohnjiang 		status = TEST_FAILED;
12324418919fSjohnjiang 		goto error_exit;
12334418919fSjohnjiang 	}
12344418919fSjohnjiang 
12354418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
12364418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
12374418919fSjohnjiang 
12384418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
12394418919fSjohnjiang 
12404418919fSjohnjiang 	/* Process crypto operation */
12414418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
12424418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12434418919fSjohnjiang 			"line %u FAILED: %s",
12444418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
12454418919fSjohnjiang 		status = TEST_FAILED;
12464418919fSjohnjiang 		goto error_exit;
12474418919fSjohnjiang 	}
12484418919fSjohnjiang 
12494418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
12504418919fSjohnjiang 		rte_pause();
12514418919fSjohnjiang 
12524418919fSjohnjiang 	if (result_op == NULL) {
12534418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12544418919fSjohnjiang 			"line %u FAILED: %s",
12554418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
12564418919fSjohnjiang 		status = TEST_FAILED;
12574418919fSjohnjiang 		goto error_exit;
12584418919fSjohnjiang 	}
12594418919fSjohnjiang 
12604418919fSjohnjiang 	debug_hexdump(stdout, "private key:",
12614418919fSjohnjiang 			asym_op->dh.priv_key.data,
12624418919fSjohnjiang 			asym_op->dh.priv_key.length);
12634418919fSjohnjiang 
12644418919fSjohnjiang 
12654418919fSjohnjiang error_exit:
12664418919fSjohnjiang 	if (sess != NULL) {
12674418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
12684418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
12694418919fSjohnjiang 	}
12704418919fSjohnjiang 	if (op != NULL)
12714418919fSjohnjiang 		rte_crypto_op_free(op);
12724418919fSjohnjiang 
12734418919fSjohnjiang 	return status;
12744418919fSjohnjiang }
12754418919fSjohnjiang 
12764418919fSjohnjiang 
12774418919fSjohnjiang static int
test_dh_gen_pub_key(struct rte_crypto_asym_xform * xfrm)12784418919fSjohnjiang test_dh_gen_pub_key(struct rte_crypto_asym_xform *xfrm)
12794418919fSjohnjiang {
12804418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
12814418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
12824418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
12834418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
12844418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
12854418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
12864418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
12874418919fSjohnjiang 	int status = TEST_SUCCESS;
12884418919fSjohnjiang 	uint8_t output[TEST_DH_MOD_LEN];
12894418919fSjohnjiang 	struct rte_crypto_asym_xform xform = *xfrm;
12904418919fSjohnjiang 
12914418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
12924418919fSjohnjiang 	if (sess == NULL) {
12934418919fSjohnjiang 		RTE_LOG(ERR, USER1,
12944418919fSjohnjiang 				 "line %u FAILED: %s", __LINE__,
12954418919fSjohnjiang 				"Session creation failed");
12964418919fSjohnjiang 		status = TEST_FAILED;
12974418919fSjohnjiang 		goto error_exit;
12984418919fSjohnjiang 	}
12994418919fSjohnjiang 	/* set up crypto op data structure */
13004418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
13014418919fSjohnjiang 	if (!op) {
13024418919fSjohnjiang 		RTE_LOG(ERR, USER1,
13034418919fSjohnjiang 			"line %u FAILED: %s",
13044418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
13054418919fSjohnjiang 			"operation struct");
13064418919fSjohnjiang 		status = TEST_FAILED;
13074418919fSjohnjiang 		goto error_exit;
13084418919fSjohnjiang 	}
13094418919fSjohnjiang 	asym_op = op->asym;
13104418919fSjohnjiang 	/* Setup a xform chain to generate public key
13114418919fSjohnjiang 	 * using test private key
13124418919fSjohnjiang 	 *
13134418919fSjohnjiang 	 */
13144418919fSjohnjiang 	xform.dh.type = RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE;
13154418919fSjohnjiang 	xform.next = NULL;
13164418919fSjohnjiang 
13174418919fSjohnjiang 	asym_op->dh.pub_key.data = output;
13184418919fSjohnjiang 	asym_op->dh.pub_key.length = sizeof(output);
13194418919fSjohnjiang 	/* load pre-defined private key */
13204418919fSjohnjiang 	asym_op->dh.priv_key.data = rte_malloc(NULL,
13214418919fSjohnjiang 					dh_test_params.priv_key.length,
13224418919fSjohnjiang 					0);
13234418919fSjohnjiang 	asym_op->dh.priv_key = dh_test_params.priv_key;
13244418919fSjohnjiang 
13254418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
13264418919fSjohnjiang 			sess_mpool) < 0) {
13274418919fSjohnjiang 		RTE_LOG(ERR, USER1,
13284418919fSjohnjiang 				"line %u FAILED: %s",
13294418919fSjohnjiang 				__LINE__, "unabled to config sym session");
13304418919fSjohnjiang 		status = TEST_FAILED;
13314418919fSjohnjiang 		goto error_exit;
13324418919fSjohnjiang 	}
13334418919fSjohnjiang 
13344418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
13354418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
13364418919fSjohnjiang 
13374418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
13384418919fSjohnjiang 
13394418919fSjohnjiang 	/* Process crypto operation */
13404418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
13414418919fSjohnjiang 		RTE_LOG(ERR, USER1,
13424418919fSjohnjiang 			"line %u FAILED: %s",
13434418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
13444418919fSjohnjiang 		status = TEST_FAILED;
13454418919fSjohnjiang 		goto error_exit;
13464418919fSjohnjiang 	}
13474418919fSjohnjiang 
13484418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
13494418919fSjohnjiang 		rte_pause();
13504418919fSjohnjiang 
13514418919fSjohnjiang 	if (result_op == NULL) {
13524418919fSjohnjiang 		RTE_LOG(ERR, USER1,
13534418919fSjohnjiang 			"line %u FAILED: %s",
13544418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
13554418919fSjohnjiang 		status = TEST_FAILED;
13564418919fSjohnjiang 		goto error_exit;
13574418919fSjohnjiang 	}
13584418919fSjohnjiang 
13594418919fSjohnjiang 	debug_hexdump(stdout, "pub key:",
13604418919fSjohnjiang 			asym_op->dh.pub_key.data, asym_op->dh.pub_key.length);
13614418919fSjohnjiang 
13624418919fSjohnjiang 	debug_hexdump(stdout, "priv key:",
13634418919fSjohnjiang 			asym_op->dh.priv_key.data, asym_op->dh.priv_key.length);
13644418919fSjohnjiang 
13654418919fSjohnjiang error_exit:
13664418919fSjohnjiang 	if (sess != NULL) {
13674418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
13684418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
13694418919fSjohnjiang 	}
13704418919fSjohnjiang 	if (op != NULL)
13714418919fSjohnjiang 		rte_crypto_op_free(op);
13724418919fSjohnjiang 
13734418919fSjohnjiang 	return status;
13744418919fSjohnjiang }
13754418919fSjohnjiang 
13764418919fSjohnjiang static int
test_dh_gen_kp(struct rte_crypto_asym_xform * xfrm)13774418919fSjohnjiang test_dh_gen_kp(struct rte_crypto_asym_xform *xfrm)
13784418919fSjohnjiang {
13794418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
13804418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
13814418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
13824418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
13834418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
13844418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
13854418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
13864418919fSjohnjiang 	int status = TEST_SUCCESS;
13874418919fSjohnjiang 	uint8_t out_pub_key[TEST_DH_MOD_LEN];
13884418919fSjohnjiang 	uint8_t out_prv_key[TEST_DH_MOD_LEN];
13894418919fSjohnjiang 	struct rte_crypto_asym_xform pub_key_xform;
13904418919fSjohnjiang 	struct rte_crypto_asym_xform xform = *xfrm;
13914418919fSjohnjiang 
13924418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
13934418919fSjohnjiang 	if (sess == NULL) {
13944418919fSjohnjiang 		RTE_LOG(ERR, USER1,
13954418919fSjohnjiang 				 "line %u FAILED: %s", __LINE__,
13964418919fSjohnjiang 				"Session creation failed");
13974418919fSjohnjiang 		status = TEST_FAILED;
13984418919fSjohnjiang 		goto error_exit;
13994418919fSjohnjiang 	}
14004418919fSjohnjiang 
14014418919fSjohnjiang 	/* set up crypto op data structure */
14024418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
14034418919fSjohnjiang 	if (!op) {
14044418919fSjohnjiang 		RTE_LOG(ERR, USER1,
14054418919fSjohnjiang 			"line %u FAILED: %s",
14064418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
14074418919fSjohnjiang 			"operation struct");
14084418919fSjohnjiang 		status = TEST_FAILED;
14094418919fSjohnjiang 		goto error_exit;
14104418919fSjohnjiang 	}
14114418919fSjohnjiang 	asym_op = op->asym;
14124418919fSjohnjiang 	/* Setup a xform chain to generate
14134418919fSjohnjiang 	 * private key first followed by
14144418919fSjohnjiang 	 * public key
14154418919fSjohnjiang 	 */xform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE;
14164418919fSjohnjiang 	pub_key_xform.xform_type = RTE_CRYPTO_ASYM_XFORM_DH;
14174418919fSjohnjiang 	pub_key_xform.dh.type = RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE;
14184418919fSjohnjiang 	xform.next = &pub_key_xform;
14194418919fSjohnjiang 
14204418919fSjohnjiang 	asym_op->dh.pub_key.data = out_pub_key;
14214418919fSjohnjiang 	asym_op->dh.pub_key.length = sizeof(out_pub_key);
14224418919fSjohnjiang 	asym_op->dh.priv_key.data = out_prv_key;
14234418919fSjohnjiang 	asym_op->dh.priv_key.length = sizeof(out_prv_key);
14244418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
14254418919fSjohnjiang 			sess_mpool) < 0) {
14264418919fSjohnjiang 		RTE_LOG(ERR, USER1,
14274418919fSjohnjiang 				"line %u FAILED: %s",
14284418919fSjohnjiang 				__LINE__, "unabled to config sym session");
14294418919fSjohnjiang 		status = TEST_FAILED;
14304418919fSjohnjiang 		goto error_exit;
14314418919fSjohnjiang 	}
14324418919fSjohnjiang 
14334418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
14344418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
14354418919fSjohnjiang 
14364418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
14374418919fSjohnjiang 
14384418919fSjohnjiang 	/* Process crypto operation */
14394418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
14404418919fSjohnjiang 		RTE_LOG(ERR, USER1,
14414418919fSjohnjiang 			"line %u FAILED: %s",
14424418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
14434418919fSjohnjiang 		status = TEST_FAILED;
14444418919fSjohnjiang 		goto error_exit;
14454418919fSjohnjiang 	}
14464418919fSjohnjiang 
14474418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
14484418919fSjohnjiang 		rte_pause();
14494418919fSjohnjiang 
14504418919fSjohnjiang 	if (result_op == NULL) {
14514418919fSjohnjiang 		RTE_LOG(ERR, USER1,
14524418919fSjohnjiang 			"line %u FAILED: %s",
14534418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
14544418919fSjohnjiang 		status = TEST_FAILED;
14554418919fSjohnjiang 		goto error_exit;
14564418919fSjohnjiang 	}
14574418919fSjohnjiang 	debug_hexdump(stdout, "priv key:",
14584418919fSjohnjiang 			out_prv_key, asym_op->dh.priv_key.length);
14594418919fSjohnjiang 	debug_hexdump(stdout, "pub key:",
14604418919fSjohnjiang 			out_pub_key, asym_op->dh.pub_key.length);
14614418919fSjohnjiang 
14624418919fSjohnjiang error_exit:
14634418919fSjohnjiang 	if (sess != NULL) {
14644418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
14654418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
14664418919fSjohnjiang 	}
14674418919fSjohnjiang 	if (op != NULL)
14684418919fSjohnjiang 		rte_crypto_op_free(op);
14694418919fSjohnjiang 
14704418919fSjohnjiang 	return status;
14714418919fSjohnjiang }
14724418919fSjohnjiang 
14734418919fSjohnjiang static int
test_mod_inv(void)14744418919fSjohnjiang test_mod_inv(void)
14754418919fSjohnjiang {
14764418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
14774418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
14784418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
14794418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
14804418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
14814418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
14824418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
14834418919fSjohnjiang 	int status = TEST_SUCCESS;
14844418919fSjohnjiang 	struct rte_cryptodev_asym_capability_idx cap_idx;
14854418919fSjohnjiang 	const struct rte_cryptodev_asymmetric_xform_capability *capability;
14864418919fSjohnjiang 	uint8_t input[TEST_DATA_SIZE] = {0};
14874418919fSjohnjiang 	int ret = 0;
14884418919fSjohnjiang 	uint8_t result[sizeof(mod_p)] = { 0 };
14894418919fSjohnjiang 
14904418919fSjohnjiang 	if (rte_cryptodev_asym_get_xform_enum(
14914418919fSjohnjiang 		&modinv_xform.xform_type, "modinv") < 0) {
14924418919fSjohnjiang 		RTE_LOG(ERR, USER1,
14934418919fSjohnjiang 				 "Invalid ASYM algorithm specified\n");
14944418919fSjohnjiang 		return -1;
14954418919fSjohnjiang 	}
14964418919fSjohnjiang 
14974418919fSjohnjiang 	cap_idx.type = modinv_xform.xform_type;
14984418919fSjohnjiang 	capability = rte_cryptodev_asym_capability_get(dev_id,
14994418919fSjohnjiang 					&cap_idx);
15004418919fSjohnjiang 
15014418919fSjohnjiang 	if (capability == NULL) {
15024418919fSjohnjiang 		RTE_LOG(INFO, USER1,
15034418919fSjohnjiang 			"Device doesn't support MOD INV. Test Skipped\n");
15044418919fSjohnjiang 		return -ENOTSUP;
15054418919fSjohnjiang 	}
15064418919fSjohnjiang 
15074418919fSjohnjiang 	if (rte_cryptodev_asym_xform_capability_check_modlen(
15084418919fSjohnjiang 		capability,
15094418919fSjohnjiang 		modinv_xform.modinv.modulus.length)) {
15104418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15114418919fSjohnjiang 				 "Invalid MODULUS length specified\n");
15124418919fSjohnjiang 				return -ENOTSUP;
15134418919fSjohnjiang 		}
15144418919fSjohnjiang 
15154418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
15164418919fSjohnjiang 	if (!sess) {
15174418919fSjohnjiang 		RTE_LOG(ERR, USER1, "line %u "
15184418919fSjohnjiang 				"FAILED: %s", __LINE__,
15194418919fSjohnjiang 				"Session creation failed");
15204418919fSjohnjiang 		status = TEST_FAILED;
15214418919fSjohnjiang 		goto error_exit;
15224418919fSjohnjiang 	}
15234418919fSjohnjiang 
15244418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &modinv_xform,
15254418919fSjohnjiang 			sess_mpool) < 0) {
15264418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15274418919fSjohnjiang 				"line %u FAILED: %s",
15284418919fSjohnjiang 				__LINE__, "unabled to config sym session");
15294418919fSjohnjiang 		status = TEST_FAILED;
15304418919fSjohnjiang 		goto error_exit;
15314418919fSjohnjiang 	}
15324418919fSjohnjiang 
15334418919fSjohnjiang 	/* generate crypto op data structure */
15344418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
15354418919fSjohnjiang 	if (!op) {
15364418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15374418919fSjohnjiang 			"line %u FAILED: %s",
15384418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
15394418919fSjohnjiang 			"operation struct");
15404418919fSjohnjiang 		status = TEST_FAILED;
15414418919fSjohnjiang 		goto error_exit;
15424418919fSjohnjiang 	}
15434418919fSjohnjiang 
15444418919fSjohnjiang 	asym_op = op->asym;
15454418919fSjohnjiang 	memcpy(input, base, sizeof(base));
15464418919fSjohnjiang 	asym_op->modinv.base.data = input;
15474418919fSjohnjiang 	asym_op->modinv.base.length = sizeof(base);
15484418919fSjohnjiang 	asym_op->modinv.result.data = result;
15494418919fSjohnjiang 	asym_op->modinv.result.length = sizeof(result);
15504418919fSjohnjiang 
15514418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
15524418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
15534418919fSjohnjiang 
15544418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
15554418919fSjohnjiang 
15564418919fSjohnjiang 	/* Process crypto operation */
15574418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
15584418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15594418919fSjohnjiang 			"line %u FAILED: %s",
15604418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
15614418919fSjohnjiang 		status = TEST_FAILED;
15624418919fSjohnjiang 		goto error_exit;
15634418919fSjohnjiang 	}
15644418919fSjohnjiang 
15654418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
15664418919fSjohnjiang 		rte_pause();
15674418919fSjohnjiang 
15684418919fSjohnjiang 	if (result_op == NULL) {
15694418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15704418919fSjohnjiang 				"line %u FAILED: %s",
15714418919fSjohnjiang 				__LINE__, "Failed to process asym crypto op");
15724418919fSjohnjiang 		status = TEST_FAILED;
15734418919fSjohnjiang 		goto error_exit;
15744418919fSjohnjiang 	}
15754418919fSjohnjiang 
15764418919fSjohnjiang 	ret = verify_modinv(mod_inv, result_op);
15774418919fSjohnjiang 	if (ret) {
15784418919fSjohnjiang 		RTE_LOG(ERR, USER1,
15794418919fSjohnjiang 			 "operation verification failed\n");
15804418919fSjohnjiang 		status = TEST_FAILED;
15814418919fSjohnjiang 	}
15824418919fSjohnjiang 
15834418919fSjohnjiang error_exit:
15844418919fSjohnjiang 	if (sess) {
15854418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
15864418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
15874418919fSjohnjiang 	}
15884418919fSjohnjiang 
15894418919fSjohnjiang 	if (op)
15904418919fSjohnjiang 		rte_crypto_op_free(op);
15914418919fSjohnjiang 
15924418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
15934418919fSjohnjiang 
15944418919fSjohnjiang 	return status;
15954418919fSjohnjiang }
15964418919fSjohnjiang 
15974418919fSjohnjiang static int
test_mod_exp(void)15984418919fSjohnjiang test_mod_exp(void)
15994418919fSjohnjiang {
16004418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
16014418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
16024418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
16034418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
16044418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
16054418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
16064418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
16074418919fSjohnjiang 	int status = TEST_SUCCESS;
16084418919fSjohnjiang 	struct rte_cryptodev_asym_capability_idx cap_idx;
16094418919fSjohnjiang 	const struct rte_cryptodev_asymmetric_xform_capability *capability;
16104418919fSjohnjiang 	uint8_t input[TEST_DATA_SIZE] = {0};
16114418919fSjohnjiang 	int ret = 0;
16124418919fSjohnjiang 	uint8_t result[sizeof(mod_p)] = { 0 };
16134418919fSjohnjiang 
16144418919fSjohnjiang 	if (rte_cryptodev_asym_get_xform_enum(&modex_xform.xform_type,
16154418919fSjohnjiang 		"modexp")
16164418919fSjohnjiang 		< 0) {
16174418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16184418919fSjohnjiang 				"Invalid ASYM algorithm specified\n");
16194418919fSjohnjiang 		return -1;
16204418919fSjohnjiang 	}
16214418919fSjohnjiang 
16224418919fSjohnjiang 	/* check for modlen capability */
16234418919fSjohnjiang 	cap_idx.type = modex_xform.xform_type;
16244418919fSjohnjiang 	capability = rte_cryptodev_asym_capability_get(dev_id, &cap_idx);
16254418919fSjohnjiang 
16264418919fSjohnjiang 	if (capability == NULL) {
16274418919fSjohnjiang 		RTE_LOG(INFO, USER1,
16284418919fSjohnjiang 			"Device doesn't support MOD EXP. Test Skipped\n");
16294418919fSjohnjiang 		return -ENOTSUP;
16304418919fSjohnjiang 	}
16314418919fSjohnjiang 
16324418919fSjohnjiang 	if (rte_cryptodev_asym_xform_capability_check_modlen(
16334418919fSjohnjiang 			capability, modex_xform.modex.modulus.length)) {
16344418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16354418919fSjohnjiang 				"Invalid MODULUS length specified\n");
16364418919fSjohnjiang 				return -ENOTSUP;
16374418919fSjohnjiang 		}
16384418919fSjohnjiang 
16394418919fSjohnjiang 	/* generate crypto op data structure */
16404418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
16414418919fSjohnjiang 	if (!op) {
16424418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16434418919fSjohnjiang 			"line %u FAILED: %s",
16444418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
16454418919fSjohnjiang 			"operation struct");
16464418919fSjohnjiang 		status = TEST_FAILED;
16474418919fSjohnjiang 		goto error_exit;
16484418919fSjohnjiang 	}
16494418919fSjohnjiang 
16504418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
16514418919fSjohnjiang 	if (!sess) {
16524418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16534418919fSjohnjiang 				 "line %u "
16544418919fSjohnjiang 				"FAILED: %s", __LINE__,
16554418919fSjohnjiang 				"Session creation failed");
16564418919fSjohnjiang 		status = TEST_FAILED;
16574418919fSjohnjiang 		goto error_exit;
16584418919fSjohnjiang 	}
16594418919fSjohnjiang 
16604418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &modex_xform,
16614418919fSjohnjiang 			sess_mpool) < 0) {
16624418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16634418919fSjohnjiang 				"line %u FAILED: %s",
16644418919fSjohnjiang 				__LINE__, "unabled to config sym session");
16654418919fSjohnjiang 		status = TEST_FAILED;
16664418919fSjohnjiang 		goto error_exit;
16674418919fSjohnjiang 	}
16684418919fSjohnjiang 
16694418919fSjohnjiang 	asym_op = op->asym;
16704418919fSjohnjiang 	memcpy(input, base, sizeof(base));
16714418919fSjohnjiang 	asym_op->modex.base.data = input;
16724418919fSjohnjiang 	asym_op->modex.base.length = sizeof(base);
16734418919fSjohnjiang 	asym_op->modex.result.data = result;
16744418919fSjohnjiang 	asym_op->modex.result.length = sizeof(result);
16754418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
16764418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
16774418919fSjohnjiang 
16784418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
16794418919fSjohnjiang 	/* Process crypto operation */
16804418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
16814418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16824418919fSjohnjiang 				"line %u FAILED: %s",
16834418919fSjohnjiang 				__LINE__, "Error sending packet for operation");
16844418919fSjohnjiang 		status = TEST_FAILED;
16854418919fSjohnjiang 		goto error_exit;
16864418919fSjohnjiang 	}
16874418919fSjohnjiang 
16884418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
16894418919fSjohnjiang 		rte_pause();
16904418919fSjohnjiang 
16914418919fSjohnjiang 	if (result_op == NULL) {
16924418919fSjohnjiang 		RTE_LOG(ERR, USER1,
16934418919fSjohnjiang 				"line %u FAILED: %s",
16944418919fSjohnjiang 				__LINE__, "Failed to process asym crypto op");
16954418919fSjohnjiang 		status = TEST_FAILED;
16964418919fSjohnjiang 		goto error_exit;
16974418919fSjohnjiang 	}
16984418919fSjohnjiang 
16994418919fSjohnjiang 	ret = verify_modexp(mod_exp, result_op);
17004418919fSjohnjiang 	if (ret) {
17014418919fSjohnjiang 		RTE_LOG(ERR, USER1,
17024418919fSjohnjiang 			 "operation verification failed\n");
17034418919fSjohnjiang 		status = TEST_FAILED;
17044418919fSjohnjiang 	}
17054418919fSjohnjiang 
17064418919fSjohnjiang error_exit:
17074418919fSjohnjiang 	if (sess != NULL) {
17084418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
17094418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
17104418919fSjohnjiang 	}
17114418919fSjohnjiang 
17124418919fSjohnjiang 	if (op != NULL)
17134418919fSjohnjiang 		rte_crypto_op_free(op);
17144418919fSjohnjiang 
17154418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
17164418919fSjohnjiang 
17174418919fSjohnjiang 	return status;
17184418919fSjohnjiang }
17194418919fSjohnjiang 
17204418919fSjohnjiang static int
test_dh_keygenration(void)17214418919fSjohnjiang test_dh_keygenration(void)
17224418919fSjohnjiang {
17234418919fSjohnjiang 	int status;
17244418919fSjohnjiang 
17254418919fSjohnjiang 	debug_hexdump(stdout, "p:", dh_xform.dh.p.data, dh_xform.dh.p.length);
17264418919fSjohnjiang 	debug_hexdump(stdout, "g:", dh_xform.dh.g.data, dh_xform.dh.g.length);
17274418919fSjohnjiang 	debug_hexdump(stdout, "priv_key:", dh_test_params.priv_key.data,
17284418919fSjohnjiang 			dh_test_params.priv_key.length);
17294418919fSjohnjiang 
17304418919fSjohnjiang 	RTE_LOG(INFO, USER1,
17314418919fSjohnjiang 		"Test Public and Private key pair generation\n");
17324418919fSjohnjiang 
17334418919fSjohnjiang 	status = test_dh_gen_kp(&dh_xform);
17344418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
17354418919fSjohnjiang 
17364418919fSjohnjiang 	RTE_LOG(INFO, USER1,
17374418919fSjohnjiang 		"Test Public Key Generation using pre-defined priv key\n");
17384418919fSjohnjiang 
17394418919fSjohnjiang 	status = test_dh_gen_pub_key(&dh_xform);
17404418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
17414418919fSjohnjiang 
17424418919fSjohnjiang 	RTE_LOG(INFO, USER1,
17434418919fSjohnjiang 		"Test Private Key Generation only\n");
17444418919fSjohnjiang 
17454418919fSjohnjiang 	status = test_dh_gen_priv_key(&dh_xform);
17464418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
17474418919fSjohnjiang 
17484418919fSjohnjiang 	RTE_LOG(INFO, USER1,
17494418919fSjohnjiang 		"Test shared secret compute\n");
17504418919fSjohnjiang 
17514418919fSjohnjiang 	status = test_dh_gen_shared_sec(&dh_xform);
17524418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
17534418919fSjohnjiang 
17544418919fSjohnjiang 	return status;
17554418919fSjohnjiang }
17564418919fSjohnjiang 
17574418919fSjohnjiang static int
test_dsa_sign(void)17584418919fSjohnjiang test_dsa_sign(void)
17594418919fSjohnjiang {
17604418919fSjohnjiang 	struct crypto_testsuite_params *ts_params = &testsuite_params;
17614418919fSjohnjiang 	struct rte_mempool *op_mpool = ts_params->op_mpool;
17624418919fSjohnjiang 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
17634418919fSjohnjiang 	uint8_t dev_id = ts_params->valid_devs[0];
17644418919fSjohnjiang 	struct rte_crypto_asym_op *asym_op = NULL;
17654418919fSjohnjiang 	struct rte_crypto_op *op = NULL, *result_op = NULL;
17664418919fSjohnjiang 	struct rte_cryptodev_asym_session *sess = NULL;
17674418919fSjohnjiang 	int status = TEST_SUCCESS;
17684418919fSjohnjiang 	uint8_t r[TEST_DH_MOD_LEN];
17694418919fSjohnjiang 	uint8_t s[TEST_DH_MOD_LEN];
17704418919fSjohnjiang 	uint8_t dgst[] = "35d81554afaad2cf18f3a1770d5fedc4ea5be344";
17714418919fSjohnjiang 
17724418919fSjohnjiang 	sess = rte_cryptodev_asym_session_create(sess_mpool);
17734418919fSjohnjiang 	if (sess == NULL) {
17744418919fSjohnjiang 		RTE_LOG(ERR, USER1,
17754418919fSjohnjiang 				 "line %u FAILED: %s", __LINE__,
17764418919fSjohnjiang 				"Session creation failed");
17774418919fSjohnjiang 		status = TEST_FAILED;
17784418919fSjohnjiang 		goto error_exit;
17794418919fSjohnjiang 	}
17804418919fSjohnjiang 	/* set up crypto op data structure */
17814418919fSjohnjiang 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
17824418919fSjohnjiang 	if (!op) {
17834418919fSjohnjiang 		RTE_LOG(ERR, USER1,
17844418919fSjohnjiang 			"line %u FAILED: %s",
17854418919fSjohnjiang 			__LINE__, "Failed to allocate asymmetric crypto "
17864418919fSjohnjiang 			"operation struct");
17874418919fSjohnjiang 		status = TEST_FAILED;
17884418919fSjohnjiang 		goto error_exit;
17894418919fSjohnjiang 	}
17904418919fSjohnjiang 	asym_op = op->asym;
17914418919fSjohnjiang 
17924418919fSjohnjiang 	debug_hexdump(stdout, "p: ", dsa_xform.dsa.p.data,
17934418919fSjohnjiang 			dsa_xform.dsa.p.length);
17944418919fSjohnjiang 	debug_hexdump(stdout, "q: ", dsa_xform.dsa.q.data,
17954418919fSjohnjiang 			dsa_xform.dsa.q.length);
17964418919fSjohnjiang 	debug_hexdump(stdout, "g: ", dsa_xform.dsa.g.data,
17974418919fSjohnjiang 			dsa_xform.dsa.g.length);
17984418919fSjohnjiang 	debug_hexdump(stdout, "priv_key: ", dsa_xform.dsa.x.data,
17994418919fSjohnjiang 			dsa_xform.dsa.x.length);
18004418919fSjohnjiang 
18014418919fSjohnjiang 	if (rte_cryptodev_asym_session_init(dev_id, sess, &dsa_xform,
18024418919fSjohnjiang 				sess_mpool) < 0) {
18034418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18044418919fSjohnjiang 				"line %u FAILED: %s",
18054418919fSjohnjiang 				__LINE__, "unabled to config sym session");
18064418919fSjohnjiang 		status = TEST_FAILED;
18074418919fSjohnjiang 		goto error_exit;
18084418919fSjohnjiang 	}
18094418919fSjohnjiang 
18104418919fSjohnjiang 	/* attach asymmetric crypto session to crypto operations */
18114418919fSjohnjiang 	rte_crypto_op_attach_asym_session(op, sess);
18124418919fSjohnjiang 	asym_op->dsa.op_type = RTE_CRYPTO_ASYM_OP_SIGN;
18134418919fSjohnjiang 	asym_op->dsa.message.data = dgst;
18144418919fSjohnjiang 	asym_op->dsa.message.length = sizeof(dgst);
18154418919fSjohnjiang 	asym_op->dsa.r.length = sizeof(r);
18164418919fSjohnjiang 	asym_op->dsa.r.data = r;
18174418919fSjohnjiang 	asym_op->dsa.s.length = sizeof(s);
18184418919fSjohnjiang 	asym_op->dsa.s.data = s;
18194418919fSjohnjiang 
18204418919fSjohnjiang 	RTE_LOG(DEBUG, USER1, "Process ASYM operation");
18214418919fSjohnjiang 
18224418919fSjohnjiang 	/* Process crypto operation */
18234418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
18244418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18254418919fSjohnjiang 			"line %u FAILED: %s",
18264418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
18274418919fSjohnjiang 		status = TEST_FAILED;
18284418919fSjohnjiang 		goto error_exit;
18294418919fSjohnjiang 	}
18304418919fSjohnjiang 
18314418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
18324418919fSjohnjiang 		rte_pause();
18334418919fSjohnjiang 
18344418919fSjohnjiang 	if (result_op == NULL) {
18354418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18364418919fSjohnjiang 			"line %u FAILED: %s",
18374418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
18384418919fSjohnjiang 		status = TEST_FAILED;
18394418919fSjohnjiang 		goto error_exit;
18404418919fSjohnjiang 	}
18414418919fSjohnjiang 
18424418919fSjohnjiang 	asym_op = result_op->asym;
18434418919fSjohnjiang 
18444418919fSjohnjiang 	debug_hexdump(stdout, "r:",
18454418919fSjohnjiang 			asym_op->dsa.r.data, asym_op->dsa.r.length);
18464418919fSjohnjiang 	debug_hexdump(stdout, "s:",
18474418919fSjohnjiang 			asym_op->dsa.s.data, asym_op->dsa.s.length);
18484418919fSjohnjiang 
18494418919fSjohnjiang 	/* Test PMD DSA sign verification using signer public key */
18504418919fSjohnjiang 	asym_op->dsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;
18514418919fSjohnjiang 
18524418919fSjohnjiang 	/* copy signer public key */
18534418919fSjohnjiang 	asym_op->dsa.y.data = dsa_test_params.y.data;
18544418919fSjohnjiang 	asym_op->dsa.y.length = dsa_test_params.y.length;
18554418919fSjohnjiang 
18564418919fSjohnjiang 	/* Process crypto operation */
18574418919fSjohnjiang 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
18584418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18594418919fSjohnjiang 			"line %u FAILED: %s",
18604418919fSjohnjiang 			__LINE__, "Error sending packet for operation");
18614418919fSjohnjiang 		status = TEST_FAILED;
18624418919fSjohnjiang 		goto error_exit;
18634418919fSjohnjiang 	}
18644418919fSjohnjiang 
18654418919fSjohnjiang 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
18664418919fSjohnjiang 		rte_pause();
18674418919fSjohnjiang 
18684418919fSjohnjiang 	if (result_op == NULL) {
18694418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18704418919fSjohnjiang 			"line %u FAILED: %s",
18714418919fSjohnjiang 			__LINE__, "Failed to process asym crypto op");
18724418919fSjohnjiang 		status = TEST_FAILED;
18734418919fSjohnjiang 		goto error_exit;
18744418919fSjohnjiang 	}
18754418919fSjohnjiang 
18764418919fSjohnjiang 	if (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {
18774418919fSjohnjiang 		RTE_LOG(ERR, USER1,
18784418919fSjohnjiang 				"line %u FAILED: %s",
18794418919fSjohnjiang 				__LINE__, "Failed to process asym crypto op");
18804418919fSjohnjiang 		status = TEST_FAILED;
18814418919fSjohnjiang 	}
18824418919fSjohnjiang error_exit:
18834418919fSjohnjiang 	if (sess != NULL) {
18844418919fSjohnjiang 		rte_cryptodev_asym_session_clear(dev_id, sess);
18854418919fSjohnjiang 		rte_cryptodev_asym_session_free(sess);
18864418919fSjohnjiang 	}
18874418919fSjohnjiang 	if (op != NULL)
18884418919fSjohnjiang 		rte_crypto_op_free(op);
18894418919fSjohnjiang 	return status;
18904418919fSjohnjiang }
18914418919fSjohnjiang 
18924418919fSjohnjiang static int
test_dsa(void)18934418919fSjohnjiang test_dsa(void)
18944418919fSjohnjiang {
18954418919fSjohnjiang 	int status;
18964418919fSjohnjiang 	status = test_dsa_sign();
18974418919fSjohnjiang 	TEST_ASSERT_EQUAL(status, 0, "Test failed");
18984418919fSjohnjiang 	return status;
18994418919fSjohnjiang }
19004418919fSjohnjiang 
1901*2d9fd380Sjfb8856606 static int
test_ecdsa_sign_verify(enum curve curve_id)1902*2d9fd380Sjfb8856606 test_ecdsa_sign_verify(enum curve curve_id)
1903*2d9fd380Sjfb8856606 {
1904*2d9fd380Sjfb8856606 	struct crypto_testsuite_params *ts_params = &testsuite_params;
1905*2d9fd380Sjfb8856606 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
1906*2d9fd380Sjfb8856606 	struct rte_mempool *op_mpool = ts_params->op_mpool;
1907*2d9fd380Sjfb8856606 	struct crypto_testsuite_ecdsa_params input_params;
1908*2d9fd380Sjfb8856606 	struct rte_cryptodev_asym_session *sess = NULL;
1909*2d9fd380Sjfb8856606 	uint8_t dev_id = ts_params->valid_devs[0];
1910*2d9fd380Sjfb8856606 	struct rte_crypto_op *result_op = NULL;
1911*2d9fd380Sjfb8856606 	uint8_t output_buf_r[TEST_DATA_SIZE];
1912*2d9fd380Sjfb8856606 	uint8_t output_buf_s[TEST_DATA_SIZE];
1913*2d9fd380Sjfb8856606 	struct rte_crypto_asym_xform xform;
1914*2d9fd380Sjfb8856606 	struct rte_crypto_asym_op *asym_op;
1915*2d9fd380Sjfb8856606 	struct rte_cryptodev_info dev_info;
1916*2d9fd380Sjfb8856606 	struct rte_crypto_op *op = NULL;
1917*2d9fd380Sjfb8856606 	int status = TEST_SUCCESS, ret;
1918*2d9fd380Sjfb8856606 
1919*2d9fd380Sjfb8856606 	switch (curve_id) {
1920*2d9fd380Sjfb8856606 	case SECP192R1:
1921*2d9fd380Sjfb8856606 		input_params = ecdsa_param_secp192r1;
1922*2d9fd380Sjfb8856606 		break;
1923*2d9fd380Sjfb8856606 	case SECP224R1:
1924*2d9fd380Sjfb8856606 		input_params = ecdsa_param_secp224r1;
1925*2d9fd380Sjfb8856606 		break;
1926*2d9fd380Sjfb8856606 	case SECP256R1:
1927*2d9fd380Sjfb8856606 		input_params = ecdsa_param_secp256r1;
1928*2d9fd380Sjfb8856606 		break;
1929*2d9fd380Sjfb8856606 	case SECP384R1:
1930*2d9fd380Sjfb8856606 		input_params = ecdsa_param_secp384r1;
1931*2d9fd380Sjfb8856606 		break;
1932*2d9fd380Sjfb8856606 	case SECP521R1:
1933*2d9fd380Sjfb8856606 		input_params = ecdsa_param_secp521r1;
1934*2d9fd380Sjfb8856606 		break;
1935*2d9fd380Sjfb8856606 	default:
1936*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
1937*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
1938*2d9fd380Sjfb8856606 				"Unsupported curve id\n");
1939*2d9fd380Sjfb8856606 		status = TEST_FAILED;
1940*2d9fd380Sjfb8856606 		goto exit;
1941*2d9fd380Sjfb8856606 	}
1942*2d9fd380Sjfb8856606 
1943*2d9fd380Sjfb8856606 	rte_cryptodev_info_get(dev_id, &dev_info);
1944*2d9fd380Sjfb8856606 
1945*2d9fd380Sjfb8856606 	sess = rte_cryptodev_asym_session_create(sess_mpool);
1946*2d9fd380Sjfb8856606 	if (sess == NULL) {
1947*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
1948*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
1949*2d9fd380Sjfb8856606 				"Session creation failed\n");
1950*2d9fd380Sjfb8856606 		status = TEST_FAILED;
1951*2d9fd380Sjfb8856606 		goto exit;
1952*2d9fd380Sjfb8856606 	}
1953*2d9fd380Sjfb8856606 
1954*2d9fd380Sjfb8856606 	/* Setup crypto op data structure */
1955*2d9fd380Sjfb8856606 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
1956*2d9fd380Sjfb8856606 	if (op == NULL) {
1957*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
1958*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
1959*2d9fd380Sjfb8856606 				"Failed to allocate asymmetric crypto "
1960*2d9fd380Sjfb8856606 				"operation struct\n");
1961*2d9fd380Sjfb8856606 		status = TEST_FAILED;
1962*2d9fd380Sjfb8856606 		goto exit;
1963*2d9fd380Sjfb8856606 	}
1964*2d9fd380Sjfb8856606 	asym_op = op->asym;
1965*2d9fd380Sjfb8856606 
1966*2d9fd380Sjfb8856606 	/* Setup asym xform */
1967*2d9fd380Sjfb8856606 	xform.next = NULL;
1968*2d9fd380Sjfb8856606 	xform.xform_type = RTE_CRYPTO_ASYM_XFORM_ECDSA;
1969*2d9fd380Sjfb8856606 	xform.ec.curve_id = input_params.curve;
1970*2d9fd380Sjfb8856606 
1971*2d9fd380Sjfb8856606 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
1972*2d9fd380Sjfb8856606 				sess_mpool) < 0) {
1973*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
1974*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
1975*2d9fd380Sjfb8856606 				"Unable to config asym session\n");
1976*2d9fd380Sjfb8856606 		status = TEST_FAILED;
1977*2d9fd380Sjfb8856606 		goto exit;
1978*2d9fd380Sjfb8856606 	}
1979*2d9fd380Sjfb8856606 
1980*2d9fd380Sjfb8856606 	/* Attach asymmetric crypto session to crypto operations */
1981*2d9fd380Sjfb8856606 	rte_crypto_op_attach_asym_session(op, sess);
1982*2d9fd380Sjfb8856606 
1983*2d9fd380Sjfb8856606 	/* Compute sign */
1984*2d9fd380Sjfb8856606 
1985*2d9fd380Sjfb8856606 	/* Populate op with operational details */
1986*2d9fd380Sjfb8856606 	op->asym->ecdsa.op_type = RTE_CRYPTO_ASYM_OP_SIGN;
1987*2d9fd380Sjfb8856606 	op->asym->ecdsa.message.data = input_params.digest.data;
1988*2d9fd380Sjfb8856606 	op->asym->ecdsa.message.length = input_params.digest.length;
1989*2d9fd380Sjfb8856606 	op->asym->ecdsa.k.data = input_params.scalar.data;
1990*2d9fd380Sjfb8856606 	op->asym->ecdsa.k.length = input_params.scalar.length;
1991*2d9fd380Sjfb8856606 	op->asym->ecdsa.pkey.data = input_params.pkey.data;
1992*2d9fd380Sjfb8856606 	op->asym->ecdsa.pkey.length = input_params.pkey.length;
1993*2d9fd380Sjfb8856606 
1994*2d9fd380Sjfb8856606 	/* Init out buf */
1995*2d9fd380Sjfb8856606 	op->asym->ecdsa.r.data = output_buf_r;
1996*2d9fd380Sjfb8856606 	op->asym->ecdsa.s.data = output_buf_s;
1997*2d9fd380Sjfb8856606 
1998*2d9fd380Sjfb8856606 	RTE_LOG(DEBUG, USER1, "Process ASYM operation\n");
1999*2d9fd380Sjfb8856606 
2000*2d9fd380Sjfb8856606 	/* Process crypto operation */
2001*2d9fd380Sjfb8856606 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
2002*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2003*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2004*2d9fd380Sjfb8856606 				"Error sending packet for operation\n");
2005*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2006*2d9fd380Sjfb8856606 		goto exit;
2007*2d9fd380Sjfb8856606 	}
2008*2d9fd380Sjfb8856606 
2009*2d9fd380Sjfb8856606 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
2010*2d9fd380Sjfb8856606 		rte_pause();
2011*2d9fd380Sjfb8856606 
2012*2d9fd380Sjfb8856606 	if (result_op == NULL) {
2013*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2014*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2015*2d9fd380Sjfb8856606 				"Failed to process asym crypto op\n");
2016*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2017*2d9fd380Sjfb8856606 		goto exit;
2018*2d9fd380Sjfb8856606 	}
2019*2d9fd380Sjfb8856606 
2020*2d9fd380Sjfb8856606 	if (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {
2021*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2022*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2023*2d9fd380Sjfb8856606 				"Failed to process asym crypto op\n");
2024*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2025*2d9fd380Sjfb8856606 		goto exit;
2026*2d9fd380Sjfb8856606 	}
2027*2d9fd380Sjfb8856606 
2028*2d9fd380Sjfb8856606 	asym_op = result_op->asym;
2029*2d9fd380Sjfb8856606 
2030*2d9fd380Sjfb8856606 	debug_hexdump(stdout, "r:",
2031*2d9fd380Sjfb8856606 			asym_op->ecdsa.r.data, asym_op->ecdsa.r.length);
2032*2d9fd380Sjfb8856606 	debug_hexdump(stdout, "s:",
2033*2d9fd380Sjfb8856606 			asym_op->ecdsa.s.data, asym_op->ecdsa.s.length);
2034*2d9fd380Sjfb8856606 
2035*2d9fd380Sjfb8856606 	ret = verify_ecdsa_sign(input_params.sign_r.data,
2036*2d9fd380Sjfb8856606 				input_params.sign_s.data, result_op);
2037*2d9fd380Sjfb8856606 	if (ret) {
2038*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2039*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2040*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2041*2d9fd380Sjfb8856606 				"ECDSA sign failed.\n");
2042*2d9fd380Sjfb8856606 		goto exit;
2043*2d9fd380Sjfb8856606 	}
2044*2d9fd380Sjfb8856606 
2045*2d9fd380Sjfb8856606 	/* Verify sign */
2046*2d9fd380Sjfb8856606 
2047*2d9fd380Sjfb8856606 	/* Populate op with operational details */
2048*2d9fd380Sjfb8856606 	op->asym->ecdsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;
2049*2d9fd380Sjfb8856606 	op->asym->ecdsa.q.x.data = input_params.pubkey_qx.data;
2050*2d9fd380Sjfb8856606 	op->asym->ecdsa.q.x.length = input_params.pubkey_qx.length;
2051*2d9fd380Sjfb8856606 	op->asym->ecdsa.q.y.data = input_params.pubkey_qy.data;
2052*2d9fd380Sjfb8856606 	op->asym->ecdsa.q.y.length = input_params.pubkey_qx.length;
2053*2d9fd380Sjfb8856606 	op->asym->ecdsa.r.data = asym_op->ecdsa.r.data;
2054*2d9fd380Sjfb8856606 	op->asym->ecdsa.r.length = asym_op->ecdsa.r.length;
2055*2d9fd380Sjfb8856606 	op->asym->ecdsa.s.data = asym_op->ecdsa.s.data;
2056*2d9fd380Sjfb8856606 	op->asym->ecdsa.s.length = asym_op->ecdsa.s.length;
2057*2d9fd380Sjfb8856606 
2058*2d9fd380Sjfb8856606 	/* Enqueue sign result for verify */
2059*2d9fd380Sjfb8856606 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
2060*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2061*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2062*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2063*2d9fd380Sjfb8856606 				"Error sending packet for operation\n");
2064*2d9fd380Sjfb8856606 		goto exit;
2065*2d9fd380Sjfb8856606 	}
2066*2d9fd380Sjfb8856606 
2067*2d9fd380Sjfb8856606 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
2068*2d9fd380Sjfb8856606 		rte_pause();
2069*2d9fd380Sjfb8856606 
2070*2d9fd380Sjfb8856606 	if (result_op == NULL) {
2071*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2072*2d9fd380Sjfb8856606 		goto exit;
2073*2d9fd380Sjfb8856606 	}
2074*2d9fd380Sjfb8856606 	if (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {
2075*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2076*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2077*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2078*2d9fd380Sjfb8856606 				"ECDSA verify failed.\n");
2079*2d9fd380Sjfb8856606 		goto exit;
2080*2d9fd380Sjfb8856606 	}
2081*2d9fd380Sjfb8856606 
2082*2d9fd380Sjfb8856606 exit:
2083*2d9fd380Sjfb8856606 	if (sess != NULL) {
2084*2d9fd380Sjfb8856606 		rte_cryptodev_asym_session_clear(dev_id, sess);
2085*2d9fd380Sjfb8856606 		rte_cryptodev_asym_session_free(sess);
2086*2d9fd380Sjfb8856606 	}
2087*2d9fd380Sjfb8856606 	if (op != NULL)
2088*2d9fd380Sjfb8856606 		rte_crypto_op_free(op);
2089*2d9fd380Sjfb8856606 	return status;
2090*2d9fd380Sjfb8856606 };
2091*2d9fd380Sjfb8856606 
2092*2d9fd380Sjfb8856606 static int
test_ecdsa_sign_verify_all_curve(void)2093*2d9fd380Sjfb8856606 test_ecdsa_sign_verify_all_curve(void)
2094*2d9fd380Sjfb8856606 {
2095*2d9fd380Sjfb8856606 	int status, overall_status = TEST_SUCCESS;
2096*2d9fd380Sjfb8856606 	enum curve curve_id;
2097*2d9fd380Sjfb8856606 	int test_index = 0;
2098*2d9fd380Sjfb8856606 	const char *msg;
2099*2d9fd380Sjfb8856606 
2100*2d9fd380Sjfb8856606 	for (curve_id = SECP192R1; curve_id < END_OF_CURVE_LIST; curve_id++) {
2101*2d9fd380Sjfb8856606 		status = test_ecdsa_sign_verify(curve_id);
2102*2d9fd380Sjfb8856606 		if (status == TEST_SUCCESS) {
2103*2d9fd380Sjfb8856606 			msg = "succeeded";
2104*2d9fd380Sjfb8856606 		} else {
2105*2d9fd380Sjfb8856606 			msg = "failed";
2106*2d9fd380Sjfb8856606 			overall_status = status;
2107*2d9fd380Sjfb8856606 		}
2108*2d9fd380Sjfb8856606 		printf("  %u) TestCase Sign/Veriy Curve %s  %s\n",
2109*2d9fd380Sjfb8856606 		       test_index ++, curve[curve_id], msg);
2110*2d9fd380Sjfb8856606 	}
2111*2d9fd380Sjfb8856606 	return overall_status;
2112*2d9fd380Sjfb8856606 }
2113*2d9fd380Sjfb8856606 
2114*2d9fd380Sjfb8856606 static int
test_ecpm(enum curve curve_id)2115*2d9fd380Sjfb8856606 test_ecpm(enum curve curve_id)
2116*2d9fd380Sjfb8856606 {
2117*2d9fd380Sjfb8856606 	struct crypto_testsuite_params *ts_params = &testsuite_params;
2118*2d9fd380Sjfb8856606 	struct rte_mempool *sess_mpool = ts_params->session_mpool;
2119*2d9fd380Sjfb8856606 	struct rte_mempool *op_mpool = ts_params->op_mpool;
2120*2d9fd380Sjfb8856606 	struct crypto_testsuite_ecpm_params input_params;
2121*2d9fd380Sjfb8856606 	struct rte_cryptodev_asym_session *sess = NULL;
2122*2d9fd380Sjfb8856606 	uint8_t dev_id = ts_params->valid_devs[0];
2123*2d9fd380Sjfb8856606 	struct rte_crypto_op *result_op = NULL;
2124*2d9fd380Sjfb8856606 	uint8_t output_buf_x[TEST_DATA_SIZE];
2125*2d9fd380Sjfb8856606 	uint8_t output_buf_y[TEST_DATA_SIZE];
2126*2d9fd380Sjfb8856606 	struct rte_crypto_asym_xform xform;
2127*2d9fd380Sjfb8856606 	struct rte_crypto_asym_op *asym_op;
2128*2d9fd380Sjfb8856606 	struct rte_cryptodev_info dev_info;
2129*2d9fd380Sjfb8856606 	struct rte_crypto_op *op = NULL;
2130*2d9fd380Sjfb8856606 	int status = TEST_SUCCESS, ret;
2131*2d9fd380Sjfb8856606 
2132*2d9fd380Sjfb8856606 	switch (curve_id) {
2133*2d9fd380Sjfb8856606 	case SECP192R1:
2134*2d9fd380Sjfb8856606 		input_params = ecpm_param_secp192r1;
2135*2d9fd380Sjfb8856606 		break;
2136*2d9fd380Sjfb8856606 	case SECP224R1:
2137*2d9fd380Sjfb8856606 		input_params = ecpm_param_secp224r1;
2138*2d9fd380Sjfb8856606 		break;
2139*2d9fd380Sjfb8856606 	case SECP256R1:
2140*2d9fd380Sjfb8856606 		input_params = ecpm_param_secp256r1;
2141*2d9fd380Sjfb8856606 		break;
2142*2d9fd380Sjfb8856606 	case SECP384R1:
2143*2d9fd380Sjfb8856606 		input_params = ecpm_param_secp384r1;
2144*2d9fd380Sjfb8856606 		break;
2145*2d9fd380Sjfb8856606 	case SECP521R1:
2146*2d9fd380Sjfb8856606 		input_params = ecpm_param_secp521r1;
2147*2d9fd380Sjfb8856606 		break;
2148*2d9fd380Sjfb8856606 	default:
2149*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2150*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2151*2d9fd380Sjfb8856606 				"Unsupported curve id\n");
2152*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2153*2d9fd380Sjfb8856606 		goto exit;
2154*2d9fd380Sjfb8856606 	}
2155*2d9fd380Sjfb8856606 
2156*2d9fd380Sjfb8856606 	rte_cryptodev_info_get(dev_id, &dev_info);
2157*2d9fd380Sjfb8856606 
2158*2d9fd380Sjfb8856606 	sess = rte_cryptodev_asym_session_create(sess_mpool);
2159*2d9fd380Sjfb8856606 	if (sess == NULL) {
2160*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2161*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2162*2d9fd380Sjfb8856606 				"Session creation failed\n");
2163*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2164*2d9fd380Sjfb8856606 		goto exit;
2165*2d9fd380Sjfb8856606 	}
2166*2d9fd380Sjfb8856606 
2167*2d9fd380Sjfb8856606 	/* Setup crypto op data structure */
2168*2d9fd380Sjfb8856606 	op = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);
2169*2d9fd380Sjfb8856606 	if (op == NULL) {
2170*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2171*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2172*2d9fd380Sjfb8856606 				"Failed to allocate asymmetric crypto "
2173*2d9fd380Sjfb8856606 				"operation struct\n");
2174*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2175*2d9fd380Sjfb8856606 		goto exit;
2176*2d9fd380Sjfb8856606 	}
2177*2d9fd380Sjfb8856606 	asym_op = op->asym;
2178*2d9fd380Sjfb8856606 
2179*2d9fd380Sjfb8856606 	/* Setup asym xform */
2180*2d9fd380Sjfb8856606 	xform.next = NULL;
2181*2d9fd380Sjfb8856606 	xform.xform_type = RTE_CRYPTO_ASYM_XFORM_ECPM;
2182*2d9fd380Sjfb8856606 	xform.ec.curve_id = input_params.curve;
2183*2d9fd380Sjfb8856606 
2184*2d9fd380Sjfb8856606 	if (rte_cryptodev_asym_session_init(dev_id, sess, &xform,
2185*2d9fd380Sjfb8856606 				sess_mpool) < 0) {
2186*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2187*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2188*2d9fd380Sjfb8856606 				"Unable to config asym session\n");
2189*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2190*2d9fd380Sjfb8856606 		goto exit;
2191*2d9fd380Sjfb8856606 	}
2192*2d9fd380Sjfb8856606 
2193*2d9fd380Sjfb8856606 	/* Attach asymmetric crypto session to crypto operations */
2194*2d9fd380Sjfb8856606 	rte_crypto_op_attach_asym_session(op, sess);
2195*2d9fd380Sjfb8856606 
2196*2d9fd380Sjfb8856606 	/* Populate op with operational details */
2197*2d9fd380Sjfb8856606 	op->asym->ecpm.p.x.data = input_params.gen_x.data;
2198*2d9fd380Sjfb8856606 	op->asym->ecpm.p.x.length = input_params.gen_x.length;
2199*2d9fd380Sjfb8856606 	op->asym->ecpm.p.y.data = input_params.gen_y.data;
2200*2d9fd380Sjfb8856606 	op->asym->ecpm.p.y.length = input_params.gen_y.length;
2201*2d9fd380Sjfb8856606 	op->asym->ecpm.scalar.data = input_params.privkey.data;
2202*2d9fd380Sjfb8856606 	op->asym->ecpm.scalar.length = input_params.privkey.length;
2203*2d9fd380Sjfb8856606 
2204*2d9fd380Sjfb8856606 	/* Init out buf */
2205*2d9fd380Sjfb8856606 	op->asym->ecpm.r.x.data = output_buf_x;
2206*2d9fd380Sjfb8856606 	op->asym->ecpm.r.y.data = output_buf_y;
2207*2d9fd380Sjfb8856606 
2208*2d9fd380Sjfb8856606 	RTE_LOG(DEBUG, USER1, "Process ASYM operation\n");
2209*2d9fd380Sjfb8856606 
2210*2d9fd380Sjfb8856606 	/* Process crypto operation */
2211*2d9fd380Sjfb8856606 	if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
2212*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2213*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2214*2d9fd380Sjfb8856606 				"Error sending packet for operation\n");
2215*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2216*2d9fd380Sjfb8856606 		goto exit;
2217*2d9fd380Sjfb8856606 	}
2218*2d9fd380Sjfb8856606 
2219*2d9fd380Sjfb8856606 	while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)
2220*2d9fd380Sjfb8856606 		rte_pause();
2221*2d9fd380Sjfb8856606 
2222*2d9fd380Sjfb8856606 	if (result_op == NULL) {
2223*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2224*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2225*2d9fd380Sjfb8856606 				"Failed to process asym crypto op\n");
2226*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2227*2d9fd380Sjfb8856606 		goto exit;
2228*2d9fd380Sjfb8856606 	}
2229*2d9fd380Sjfb8856606 
2230*2d9fd380Sjfb8856606 	if (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {
2231*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2232*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2233*2d9fd380Sjfb8856606 				"Failed to process asym crypto op\n");
2234*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2235*2d9fd380Sjfb8856606 		goto exit;
2236*2d9fd380Sjfb8856606 	}
2237*2d9fd380Sjfb8856606 
2238*2d9fd380Sjfb8856606 	asym_op = result_op->asym;
2239*2d9fd380Sjfb8856606 
2240*2d9fd380Sjfb8856606 	debug_hexdump(stdout, "r x:",
2241*2d9fd380Sjfb8856606 			asym_op->ecpm.r.x.data, asym_op->ecpm.r.x.length);
2242*2d9fd380Sjfb8856606 	debug_hexdump(stdout, "r y:",
2243*2d9fd380Sjfb8856606 			asym_op->ecpm.r.y.data, asym_op->ecpm.r.y.length);
2244*2d9fd380Sjfb8856606 
2245*2d9fd380Sjfb8856606 	ret = verify_ecpm(input_params.pubkey_x.data,
2246*2d9fd380Sjfb8856606 				input_params.pubkey_y.data, result_op);
2247*2d9fd380Sjfb8856606 	if (ret) {
2248*2d9fd380Sjfb8856606 		status = TEST_FAILED;
2249*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1,
2250*2d9fd380Sjfb8856606 				"line %u FAILED: %s", __LINE__,
2251*2d9fd380Sjfb8856606 				"EC Point Multiplication failed.\n");
2252*2d9fd380Sjfb8856606 		goto exit;
2253*2d9fd380Sjfb8856606 	}
2254*2d9fd380Sjfb8856606 
2255*2d9fd380Sjfb8856606 exit:
2256*2d9fd380Sjfb8856606 	if (sess != NULL) {
2257*2d9fd380Sjfb8856606 		rte_cryptodev_asym_session_clear(dev_id, sess);
2258*2d9fd380Sjfb8856606 		rte_cryptodev_asym_session_free(sess);
2259*2d9fd380Sjfb8856606 	}
2260*2d9fd380Sjfb8856606 	if (op != NULL)
2261*2d9fd380Sjfb8856606 		rte_crypto_op_free(op);
2262*2d9fd380Sjfb8856606 	return status;
2263*2d9fd380Sjfb8856606 }
2264*2d9fd380Sjfb8856606 
2265*2d9fd380Sjfb8856606 static int
test_ecpm_all_curve(void)2266*2d9fd380Sjfb8856606 test_ecpm_all_curve(void)
2267*2d9fd380Sjfb8856606 {
2268*2d9fd380Sjfb8856606 	int status, overall_status = TEST_SUCCESS;
2269*2d9fd380Sjfb8856606 	enum curve curve_id;
2270*2d9fd380Sjfb8856606 	int test_index = 0;
2271*2d9fd380Sjfb8856606 	const char *msg;
2272*2d9fd380Sjfb8856606 
2273*2d9fd380Sjfb8856606 	for (curve_id = SECP192R1; curve_id < END_OF_CURVE_LIST; curve_id++) {
2274*2d9fd380Sjfb8856606 		status = test_ecpm(curve_id);
2275*2d9fd380Sjfb8856606 		if (status == TEST_SUCCESS) {
2276*2d9fd380Sjfb8856606 			msg = "succeeded";
2277*2d9fd380Sjfb8856606 		} else {
2278*2d9fd380Sjfb8856606 			msg = "failed";
2279*2d9fd380Sjfb8856606 			overall_status = status;
2280*2d9fd380Sjfb8856606 		}
2281*2d9fd380Sjfb8856606 		printf("  %u) TestCase EC Point Mul Curve %s  %s\n",
2282*2d9fd380Sjfb8856606 		       test_index ++, curve[curve_id], msg);
2283*2d9fd380Sjfb8856606 	}
2284*2d9fd380Sjfb8856606 	return overall_status;
2285*2d9fd380Sjfb8856606 }
22864418919fSjohnjiang 
22874418919fSjohnjiang static struct unit_test_suite cryptodev_openssl_asym_testsuite  = {
22884418919fSjohnjiang 	.suite_name = "Crypto Device OPENSSL ASYM Unit Test Suite",
22894418919fSjohnjiang 	.setup = testsuite_setup,
22904418919fSjohnjiang 	.teardown = testsuite_teardown,
22914418919fSjohnjiang 	.unit_test_cases = {
22924418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_capability),
22934418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_dsa),
22944418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_dh_keygenration),
22954418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_enc_dec),
22964418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_sign_verify),
22974418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_enc_dec_crt),
22984418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_sign_verify_crt),
22994418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_mod_inv),
23004418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_mod_exp),
23014418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_one_by_one),
23024418919fSjohnjiang 		TEST_CASES_END() /**< NULL terminate unit test array */
23034418919fSjohnjiang 	}
23044418919fSjohnjiang };
23054418919fSjohnjiang 
23064418919fSjohnjiang static struct unit_test_suite cryptodev_qat_asym_testsuite  = {
23074418919fSjohnjiang 	.suite_name = "Crypto Device QAT ASYM Unit Test Suite",
23084418919fSjohnjiang 	.setup = testsuite_setup,
23094418919fSjohnjiang 	.teardown = testsuite_teardown,
23104418919fSjohnjiang 	.unit_test_cases = {
23114418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_one_by_one),
23124418919fSjohnjiang 		TEST_CASES_END() /**< NULL terminate unit test array */
23134418919fSjohnjiang 	}
23144418919fSjohnjiang };
23154418919fSjohnjiang 
23164418919fSjohnjiang static struct unit_test_suite cryptodev_octeontx_asym_testsuite  = {
23174418919fSjohnjiang 	.suite_name = "Crypto Device OCTEONTX ASYM Unit Test Suite",
23184418919fSjohnjiang 	.setup = testsuite_setup,
23194418919fSjohnjiang 	.teardown = testsuite_teardown,
23204418919fSjohnjiang 	.unit_test_cases = {
23214418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_capability),
23224418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_enc_dec_crt),
23234418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_rsa_sign_verify_crt),
23244418919fSjohnjiang 		TEST_CASE_ST(ut_setup, ut_teardown, test_mod_exp),
2325*2d9fd380Sjfb8856606 		TEST_CASE_ST(ut_setup, ut_teardown,
2326*2d9fd380Sjfb8856606 			     test_ecdsa_sign_verify_all_curve),
2327*2d9fd380Sjfb8856606 		TEST_CASE_ST(ut_setup, ut_teardown, test_ecpm_all_curve),
23284418919fSjohnjiang 		TEST_CASES_END() /**< NULL terminate unit test array */
23294418919fSjohnjiang 	}
23304418919fSjohnjiang };
23314418919fSjohnjiang 
23324418919fSjohnjiang static int
test_cryptodev_openssl_asym(void)23334418919fSjohnjiang test_cryptodev_openssl_asym(void)
23344418919fSjohnjiang {
23354418919fSjohnjiang 	gbl_driver_id = rte_cryptodev_driver_id_get(
23364418919fSjohnjiang 			RTE_STR(CRYPTODEV_NAME_OPENSSL_PMD));
23374418919fSjohnjiang 
23384418919fSjohnjiang 	if (gbl_driver_id == -1) {
2339*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1, "OPENSSL PMD must be loaded.\n");
23404418919fSjohnjiang 		return TEST_FAILED;
23414418919fSjohnjiang 	}
23424418919fSjohnjiang 
23434418919fSjohnjiang 	return unit_test_suite_runner(&cryptodev_openssl_asym_testsuite);
23444418919fSjohnjiang }
23454418919fSjohnjiang 
23464418919fSjohnjiang static int
test_cryptodev_qat_asym(void)23474418919fSjohnjiang test_cryptodev_qat_asym(void)
23484418919fSjohnjiang {
23494418919fSjohnjiang 	gbl_driver_id = rte_cryptodev_driver_id_get(
23504418919fSjohnjiang 			RTE_STR(CRYPTODEV_NAME_QAT_ASYM_PMD));
23514418919fSjohnjiang 
23524418919fSjohnjiang 	if (gbl_driver_id == -1) {
2353*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1, "QAT PMD must be loaded.\n");
23544418919fSjohnjiang 		return TEST_FAILED;
23554418919fSjohnjiang 	}
23564418919fSjohnjiang 
23574418919fSjohnjiang 	return unit_test_suite_runner(&cryptodev_qat_asym_testsuite);
23584418919fSjohnjiang }
23594418919fSjohnjiang 
23604418919fSjohnjiang static int
test_cryptodev_octeontx_asym(void)23614418919fSjohnjiang test_cryptodev_octeontx_asym(void)
23624418919fSjohnjiang {
23634418919fSjohnjiang 	gbl_driver_id = rte_cryptodev_driver_id_get(
23644418919fSjohnjiang 			RTE_STR(CRYPTODEV_NAME_OCTEONTX_SYM_PMD));
23654418919fSjohnjiang 	if (gbl_driver_id == -1) {
2366*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1, "OCTEONTX PMD must be loaded.\n");
23674418919fSjohnjiang 		return TEST_FAILED;
23684418919fSjohnjiang 	}
23694418919fSjohnjiang 	return unit_test_suite_runner(&cryptodev_octeontx_asym_testsuite);
23704418919fSjohnjiang }
23714418919fSjohnjiang 
23724418919fSjohnjiang static int
test_cryptodev_octeontx2_asym(void)23734418919fSjohnjiang test_cryptodev_octeontx2_asym(void)
23744418919fSjohnjiang {
23754418919fSjohnjiang 	gbl_driver_id = rte_cryptodev_driver_id_get(
23764418919fSjohnjiang 			RTE_STR(CRYPTODEV_NAME_OCTEONTX2_PMD));
23774418919fSjohnjiang 	if (gbl_driver_id == -1) {
2378*2d9fd380Sjfb8856606 		RTE_LOG(ERR, USER1, "OCTEONTX2 PMD must be loaded.\n");
23794418919fSjohnjiang 		return TEST_FAILED;
23804418919fSjohnjiang 	}
23814418919fSjohnjiang 
23824418919fSjohnjiang 	/* Use test suite registered for crypto_octeontx PMD */
23834418919fSjohnjiang 	return unit_test_suite_runner(&cryptodev_octeontx_asym_testsuite);
23844418919fSjohnjiang }
23854418919fSjohnjiang 
23864418919fSjohnjiang REGISTER_TEST_COMMAND(cryptodev_openssl_asym_autotest,
23874418919fSjohnjiang 					  test_cryptodev_openssl_asym);
23884418919fSjohnjiang 
23894418919fSjohnjiang REGISTER_TEST_COMMAND(cryptodev_qat_asym_autotest, test_cryptodev_qat_asym);
23904418919fSjohnjiang 
23914418919fSjohnjiang REGISTER_TEST_COMMAND(cryptodev_octeontx_asym_autotest,
23924418919fSjohnjiang 					  test_cryptodev_octeontx_asym);
23934418919fSjohnjiang 
23944418919fSjohnjiang REGISTER_TEST_COMMAND(cryptodev_octeontx2_asym_autotest,
23954418919fSjohnjiang 					  test_cryptodev_octeontx2_asym);
2396