Hi, > -----Original Message----- > From: Gowrishankar Muthukrishnan <gmuthukri...@marvell.com> > Sent: Tuesday, June 28, 2022 2:14 PM > To: dev@dpdk.org > Cc: Zhang, Roy Fan <roy.fan.zh...@intel.com>; Dooley, Brian > <brian.doo...@intel.com>; Anoob Joseph <ano...@marvell.com>; Archana > Muniganti <march...@marvell.com>; Jerin Jacob <jer...@marvell.com>; > Gowrishankar Muthukrishnan <gmuthukri...@marvell.com> > Subject: [PATCH v1] examples/fips_validation: add parsing for sha > > Added function to parse algorithm for SHA test. Verified with SHA 1 and 256 > vectors. SHA 384 and 512 has some issues with the way jansson objects are > created, which could be addressed separately. > > Signed-off-by: Gowrishankar Muthukrishnan <gmuthukri...@marvell.com> > --- <snip>
> +#endif /* USE_JANSSON */ > diff --git a/examples/fips_validation/main.c b/examples/fips_validation/main.c > index 7ccb5f52f4..41347de199 100644 > --- a/examples/fips_validation/main.c > +++ b/examples/fips_validation/main.c > @@ -1693,19 +1693,24 @@ fips_mct_sha_test(void) > #define SHA_EXTERN_ITER 100 > #define SHA_INTERN_ITER 1000 > #define SHA_MD_BLOCK 3 > - struct fips_val val = {NULL, 0}, md[SHA_MD_BLOCK]; > + struct fips_val val[2] = {{NULL, 0},}, md[SHA_MD_BLOCK], msg; I see to get around with the callback function limitation you extend the fips val to an array. Nice move! But if it is not too much trouble for you - please comment the purpose of the change - it will make the future maintenance much easier! > char temp[MAX_DIGEST_SIZE*2]; > int ret; > uint32_t i, j; > > + msg.len = SHA_MD_BLOCK * vec.cipher_auth.digest.len; > + msg.val = calloc(1, msg.len); > + memcpy(vec.cipher_auth.digest.val, vec.pt.val, > vec.cipher_auth.digest.len); > for (i = 0; i < SHA_MD_BLOCK; i++) > md[i].val = rte_malloc(NULL, (MAX_DIGEST_SIZE*2), 0); > > rte_free(vec.pt.val); > vec.pt.val = rte_malloc(NULL, (MAX_DIGEST_SIZE*SHA_MD_BLOCK), 0); > > - fips_test_write_one_case(); > - fprintf(info.fp_wr, "\n"); > + if (info.file_type != FIPS_TYPE_JSON) { > + fips_test_write_one_case(); > + fprintf(info.fp_wr, "\n"); > + } > > for (j = 0; j < SHA_EXTERN_ITER; j++) { > > @@ -1719,6 +1724,9 @@ fips_mct_sha_test(void) > vec.cipher_auth.digest.len); > md[2].len = vec.cipher_auth.digest.len; > > + for (i = 0; i < SHA_MD_BLOCK; i++) > + memcpy(&msg.val[i * md[i].len], md[i].val, md[i].len); > + > for (i = 0; i < (SHA_INTERN_ITER); i++) { > > memcpy(vec.pt.val, md[0].val, > @@ -1742,7 +1750,7 @@ fips_mct_sha_test(void) > return ret; > } > > - ret = get_writeback_data(&val); > + ret = get_writeback_data(&val[0]); > if (ret < 0) > return ret; > > @@ -1751,7 +1759,7 @@ fips_mct_sha_test(void) > memcpy(md[1].val, md[2].val, md[2].len); > md[1].len = md[2].len; > > - memcpy(md[2].val, (val.val + vec.pt.len), > + memcpy(md[2].val, (val[0].val + vec.pt.len), > vec.cipher_auth.digest.len); > md[2].len = vec.cipher_auth.digest.len; > } > @@ -1759,11 +1767,14 @@ fips_mct_sha_test(void) > memcpy(vec.cipher_auth.digest.val, md[2].val, md[2].len); > vec.cipher_auth.digest.len = md[2].len; > > - fprintf(info.fp_wr, "COUNT = %u\n", j); > - > - writeback_hex_str("", temp, &vec.cipher_auth.digest); > - > - fprintf(info.fp_wr, "MD = %s\n\n", temp); > + if (info.file_type != FIPS_TYPE_JSON) { > + fprintf(info.fp_wr, "COUNT = %u\n", j); > + writeback_hex_str("", temp, &vec.cipher_auth.digest); > + fprintf(info.fp_wr, "MD = %s\n\n", temp); > + } > + val[1].val = msg.val; > + val[1].len = msg.len; > + info.parse_writeback(val); > } > > for (i = 0; i < (SHA_MD_BLOCK); i++) > @@ -1771,7 +1782,8 @@ fips_mct_sha_test(void) > > rte_free(vec.pt.val); > > - free(val.val); > + free(val[0].val); It took me a while to understand why you don't free val[1] ??. Nicely done anyway. > + free(msg.val); > > return 0; > } > @@ -1996,6 +2008,9 @@ fips_test_one_test_group(void) > case FIPS_TEST_ALGO_AES: > ret = parse_test_aes_json_init(); > break; > + case FIPS_TEST_ALGO_SHA: > + ret = parse_test_sha_json_init(); > + break; > default: > return -EINVAL; > } > -- > 2.25.1 Other than that Acked-by: Fan Zhang <roy.fan.zh...@intel.com>