[v3,08/11] test: remove RSA PKCS1_5 BT0 padding from test cases
Checks
Commit Message
This patch removes RSA PKCS1_5 BT0 padding from test cases
Signed-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>
---
app/test/test_cryptodev_asym.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
Comments
> -----Original Message-----
> From: Arek Kusztal <arkadiuszx.kusztal@intel.com>
> Sent: Wednesday, July 17, 2019 12:23 AM
> To: dev@dpdk.org
> Cc: akhil.goyal@nxp.com; fiona.trahe@intel.com; Shally Verma
> <shallyv@marvell.com>; Arek Kusztal <arkadiuszx.kusztal@intel.com>
> Subject: [EXT] [PATCH v3 08/11] test: remove RSA PKCS1_5 BT0 padding from
> test cases
>
> External Email
>
> ----------------------------------------------------------------------
> This patch removes RSA PKCS1_5 BT0 padding from test cases
>
> Signed-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>
Acked-by : Shally Verma <shallyv@marvell.com>
> ---
> app/test/test_cryptodev_asym.c | 8 ++++----
> 1 file changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/app/test/test_cryptodev_asym.c
> b/app/test/test_cryptodev_asym.c index 8391545..0e1277b 100644
> --- a/app/test/test_cryptodev_asym.c
> +++ b/app/test/test_cryptodev_asym.c
> @@ -93,7 +93,7 @@ queue_ops_rsa_sign_verify(struct
> rte_cryptodev_asym_session *sess)
> asym_op->rsa.message.data = rsaplaintext.data;
> asym_op->rsa.message.length = rsaplaintext.len;
> asym_op->rsa.sign.data = output_buf;
> - asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT1;
> + asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
>
> debug_hexdump(stdout, "message", asym_op->rsa.message.data,
> asym_op->rsa.message.length);
> @@ -125,7 +125,7 @@ queue_ops_rsa_sign_verify(struct
> rte_cryptodev_asym_session *sess)
>
> /* Verify sign */
> asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;
> - asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT1;
> + asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
>
> /* Process crypto operation */
> if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) { @@ -
> 184,7 +184,7 @@ queue_ops_rsa_enc_dec(struct
> rte_cryptodev_asym_session *sess)
> asym_op->rsa.cipher.data = cipher_buf;
> asym_op->rsa.cipher.length = 0;
> asym_op->rsa.message.length = rsaplaintext.len;
> - asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT2;
> + asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
>
> debug_hexdump(stdout, "message", asym_op->rsa.message.data,
> asym_op->rsa.message.length);
> @@ -215,7 +215,7 @@ queue_ops_rsa_enc_dec(struct
> rte_cryptodev_asym_session *sess)
> /* Use the resulted output as decryption Input vector*/
> asym_op = result_op->asym;
> asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT;
> - asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT2;
> + asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
>
> /* Process crypto operation */
> if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
> --
> 2.1.0
@@ -93,7 +93,7 @@ queue_ops_rsa_sign_verify(struct rte_cryptodev_asym_session *sess)
asym_op->rsa.message.data = rsaplaintext.data;
asym_op->rsa.message.length = rsaplaintext.len;
asym_op->rsa.sign.data = output_buf;
- asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT1;
+ asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
debug_hexdump(stdout, "message", asym_op->rsa.message.data,
asym_op->rsa.message.length);
@@ -125,7 +125,7 @@ queue_ops_rsa_sign_verify(struct rte_cryptodev_asym_session *sess)
/* Verify sign */
asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;
- asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT1;
+ asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
/* Process crypto operation */
if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {
@@ -184,7 +184,7 @@ queue_ops_rsa_enc_dec(struct rte_cryptodev_asym_session *sess)
asym_op->rsa.cipher.data = cipher_buf;
asym_op->rsa.cipher.length = 0;
asym_op->rsa.message.length = rsaplaintext.len;
- asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT2;
+ asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
debug_hexdump(stdout, "message", asym_op->rsa.message.data,
asym_op->rsa.message.length);
@@ -215,7 +215,7 @@ queue_ops_rsa_enc_dec(struct rte_cryptodev_asym_session *sess)
/* Use the resulted output as decryption Input vector*/
asym_op = result_op->asym;
asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT;
- asym_op->rsa.pad = RTE_CRYPTO_RSA_PKCS1_V1_5_BT2;
+ asym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
/* Process crypto operation */
if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {