The mixed test cases can have keys with different key lengths. The
routine which prepares the session parameters uses same key length for
both cipher & auth keys. Instead allow the caller to use same keys as
required.

Signed-off-by: Anoob Joseph <ano...@marvell.com>
---
 app/test/test_cryptodev.c | 48 +++++++++++++++++++++++----------------
 1 file changed, 28 insertions(+), 20 deletions(-)

diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 31f4cb2cd5..5fdbe11094 100644
--- a/app/test/test_cryptodev.c
+++ b/app/test/test_cryptodev.c
@@ -2554,27 +2554,23 @@ create_wireless_algo_cipher_auth_session(uint8_t dev_id,
                enum rte_crypto_auth_operation auth_op,
                enum rte_crypto_auth_algorithm auth_algo,
                enum rte_crypto_cipher_algorithm cipher_algo,
-               const uint8_t *key, uint8_t key_len,
+               const uint8_t *a_key, uint8_t a_key_len,
+               const uint8_t *c_key, uint8_t c_key_len,
                uint8_t auth_iv_len, uint8_t auth_len,
                uint8_t cipher_iv_len)
 
 {
-       uint8_t cipher_auth_key[key_len];
-
        struct crypto_testsuite_params *ts_params = &testsuite_params;
        struct crypto_unittest_params *ut_params = &unittest_params;
 
-       memcpy(cipher_auth_key, key, key_len);
-
        /* Setup Authentication Parameters */
        ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
        ut_params->auth_xform.next = NULL;
 
        ut_params->auth_xform.auth.op = auth_op;
        ut_params->auth_xform.auth.algo = auth_algo;
-       ut_params->auth_xform.auth.key.length = key_len;
-       /* Hash key = cipher key */
-       ut_params->auth_xform.auth.key.data = cipher_auth_key;
+       ut_params->auth_xform.auth.key.length = a_key_len;
+       ut_params->auth_xform.auth.key.data = a_key;
        ut_params->auth_xform.auth.digest_length = auth_len;
        /* Auth IV will be after cipher IV */
        ut_params->auth_xform.auth.iv.offset = IV_OFFSET + cipher_iv_len;
@@ -2586,12 +2582,13 @@ create_wireless_algo_cipher_auth_session(uint8_t dev_id,
 
        ut_params->cipher_xform.cipher.algo = cipher_algo;
        ut_params->cipher_xform.cipher.op = cipher_op;
-       ut_params->cipher_xform.cipher.key.data = cipher_auth_key;
-       ut_params->cipher_xform.cipher.key.length = key_len;
+       ut_params->cipher_xform.cipher.key.data = c_key;
+       ut_params->cipher_xform.cipher.key.length = c_key_len;
        ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET;
        ut_params->cipher_xform.cipher.iv.length = cipher_iv_len;
 
-       debug_hexdump(stdout, "key:", key, key_len);
+       debug_hexdump(stdout, "Auth key:", a_key, c_key_len);
+       debug_hexdump(stdout, "Cipher key:", c_key, c_key_len);
 
        /* Create Crypto session*/
        ut_params->sess = rte_cryptodev_sym_session_create(dev_id,
@@ -2677,23 +2674,21 @@ create_wireless_algo_auth_cipher_session(uint8_t dev_id,
                enum rte_crypto_auth_operation auth_op,
                enum rte_crypto_auth_algorithm auth_algo,
                enum rte_crypto_cipher_algorithm cipher_algo,
-               const uint8_t *key, const uint8_t key_len,
+               const uint8_t *a_key, const uint8_t a_key_len,
+               const uint8_t *c_key, const uint8_t c_key_len,
                uint8_t auth_iv_len, uint8_t auth_len,
                uint8_t cipher_iv_len)
 {
-       uint8_t auth_cipher_key[key_len];
        struct crypto_testsuite_params *ts_params = &testsuite_params;
        struct crypto_unittest_params *ut_params = &unittest_params;
 
-       memcpy(auth_cipher_key, key, key_len);
-
        /* Setup Authentication Parameters */
        ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
        ut_params->auth_xform.auth.op = auth_op;
        ut_params->auth_xform.next = &ut_params->cipher_xform;
        ut_params->auth_xform.auth.algo = auth_algo;
-       ut_params->auth_xform.auth.key.length = key_len;
-       ut_params->auth_xform.auth.key.data = auth_cipher_key;
+       ut_params->auth_xform.auth.key.length = a_key_len;
+       ut_params->auth_xform.auth.key.data = a_key;
        ut_params->auth_xform.auth.digest_length = auth_len;
        /* Auth IV will be after cipher IV */
        ut_params->auth_xform.auth.iv.offset = IV_OFFSET + cipher_iv_len;
@@ -2704,12 +2699,13 @@ create_wireless_algo_auth_cipher_session(uint8_t dev_id,
        ut_params->cipher_xform.next = NULL;
        ut_params->cipher_xform.cipher.algo = cipher_algo;
        ut_params->cipher_xform.cipher.op = cipher_op;
-       ut_params->cipher_xform.cipher.key.data = auth_cipher_key;
-       ut_params->cipher_xform.cipher.key.length = key_len;
+       ut_params->cipher_xform.cipher.key.data = c_key;
+       ut_params->cipher_xform.cipher.key.length = c_key_len;
        ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET;
        ut_params->cipher_xform.cipher.iv.length = cipher_iv_len;
 
-       debug_hexdump(stdout, "key:", key, key_len);
+       debug_hexdump(stdout, "Auth key:", a_key, a_key_len);
+       debug_hexdump(stdout, "Cipher key:", c_key, c_key_len);
 
        /* Create Crypto session*/
        if (cipher_op == RTE_CRYPTO_CIPHER_OP_DECRYPT) {
@@ -4908,6 +4904,7 @@ test_snow3g_cipher_auth(const struct snow3g_test_data 
*tdata)
                        RTE_CRYPTO_AUTH_SNOW3G_UIA2,
                        RTE_CRYPTO_CIPHER_SNOW3G_UEA2,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        tdata->auth_iv.len, tdata->digest.len,
                        tdata->cipher_iv.len);
        if (retval != 0)
@@ -5037,6 +5034,7 @@ test_snow3g_auth_cipher(const struct snow3g_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_SNOW3G_UIA2,
                        RTE_CRYPTO_CIPHER_SNOW3G_UEA2,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        tdata->auth_iv.len, tdata->digest.len,
                        tdata->cipher_iv.len);
        if (retval != 0)
@@ -5242,6 +5240,7 @@ test_snow3g_auth_cipher_sgl(const struct snow3g_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_SNOW3G_UIA2,
                        RTE_CRYPTO_CIPHER_SNOW3G_UEA2,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        tdata->auth_iv.len, tdata->digest.len,
                        tdata->cipher_iv.len);
 
@@ -5443,6 +5442,7 @@ test_kasumi_auth_cipher(const struct kasumi_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_KASUMI_F9,
                        RTE_CRYPTO_CIPHER_KASUMI_F8,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        0, tdata->digest.len,
                        tdata->cipher_iv.len);
 
@@ -5647,6 +5647,7 @@ test_kasumi_auth_cipher_sgl(const struct kasumi_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_KASUMI_F9,
                        RTE_CRYPTO_CIPHER_KASUMI_F8,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        0, tdata->digest.len,
                        tdata->cipher_iv.len);
 
@@ -5828,6 +5829,7 @@ test_kasumi_cipher_auth(const struct kasumi_test_data 
*tdata)
                        RTE_CRYPTO_AUTH_KASUMI_F9,
                        RTE_CRYPTO_CIPHER_KASUMI_F8,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        0, tdata->digest.len,
                        tdata->cipher_iv.len);
        if (retval != 0)
@@ -6382,6 +6384,7 @@ test_zuc_auth_cipher(const struct wireless_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_ZUC_EIA3,
                        RTE_CRYPTO_CIPHER_ZUC_EEA3,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        tdata->auth_iv.len, tdata->digest.len,
                        tdata->cipher_iv.len);
 
@@ -6585,6 +6588,7 @@ test_zuc_auth_cipher_sgl(const struct wireless_test_data 
*tdata,
                        RTE_CRYPTO_AUTH_ZUC_EIA3,
                        RTE_CRYPTO_CIPHER_ZUC_EEA3,
                        tdata->key.data, tdata->key.len,
+                       tdata->key.data, tdata->key.len,
                        tdata->auth_iv.len, tdata->digest.len,
                        tdata->cipher_iv.len);
 
@@ -7858,6 +7862,7 @@ test_mixed_auth_cipher(const struct 
mixed_cipher_auth_test_data *tdata,
                                tdata->auth_algo,
                                tdata->cipher_algo,
                                tdata->auth_key.data, tdata->auth_key.len,
+                               tdata->cipher_key.data, tdata->cipher_key.len,
                                tdata->auth_iv.len, tdata->digest_enc.len,
                                tdata->cipher_iv.len);
        else
@@ -7868,6 +7873,7 @@ test_mixed_auth_cipher(const struct 
mixed_cipher_auth_test_data *tdata,
                                tdata->auth_algo,
                                tdata->cipher_algo,
                                tdata->auth_key.data, tdata->auth_key.len,
+                               tdata->cipher_key.data, tdata->cipher_key.len,
                                tdata->auth_iv.len, tdata->digest_enc.len,
                                tdata->cipher_iv.len);
        if (retval != 0)
@@ -8071,6 +8077,7 @@ test_mixed_auth_cipher_sgl(const struct 
mixed_cipher_auth_test_data *tdata,
                                tdata->auth_algo,
                                tdata->cipher_algo,
                                tdata->auth_key.data, tdata->auth_key.len,
+                               tdata->cipher_key.data, tdata->cipher_key.len,
                                tdata->auth_iv.len, tdata->digest_enc.len,
                                tdata->cipher_iv.len);
        else
@@ -8081,6 +8088,7 @@ test_mixed_auth_cipher_sgl(const struct 
mixed_cipher_auth_test_data *tdata,
                                tdata->auth_algo,
                                tdata->cipher_algo,
                                tdata->auth_key.data, tdata->auth_key.len,
+                               tdata->cipher_key.data, tdata->cipher_key.len,
                                tdata->auth_iv.len, tdata->digest_enc.len,
                                tdata->cipher_iv.len);
        if (retval != 0)
-- 
2.25.1

Reply via email to