@@ -853,6 +853,35 @@ static uint8_t secp256r1_message[] = {
853853 0xdb , 0xc4 , 0xe7 , 0xa6 , 0xa1 , 0x33 , 0xec , 0x56
854854};
855855
856+ static uint8_t ed25519_pkey [] = {
857+ 0x4c , 0xcd , 0x08 , 0x9b , 0x28 , 0xff , 0x96 , 0xda ,
858+ 0x9d , 0xb6 , 0xc3 , 0x46 , 0xec , 0x11 , 0x4e , 0x0f ,
859+ 0x5b , 0x8a , 0x31 , 0x9f , 0x35 , 0xab , 0xa6 , 0x24 ,
860+ 0xda , 0x8c , 0xf6 , 0xed , 0x4f , 0xb8 , 0xa6 , 0xfb ,
861+ };
862+
863+ static uint8_t ed25519_pubkey [] = {
864+ 0x3d , 0x40 , 0x17 , 0xc3 , 0xe8 , 0x43 , 0x89 , 0x5a ,
865+ 0x92 , 0xb7 , 0x0a , 0xa7 , 0x4d , 0x1b , 0x7e , 0xbc ,
866+ 0x9c , 0x98 , 0x2c , 0xcf , 0x2e , 0xc4 , 0x96 , 0x8c ,
867+ 0xc0 , 0xcd , 0x55 , 0xf1 , 0x2a , 0xf4 , 0x66 , 0x0c ,
868+ };
869+
870+ static uint8_t ed25519_sign [] = {
871+ 0x92 , 0xa0 , 0x09 , 0xa9 , 0xf0 , 0xd4 , 0xca , 0xb8 ,
872+ 0x72 , 0x0e , 0x82 , 0x0b , 0x5f , 0x64 , 0x25 , 0x40 ,
873+ 0xa2 , 0xb2 , 0x7b , 0x54 , 0x16 , 0x50 , 0x3f , 0x8f ,
874+ 0xb3 , 0x76 , 0x22 , 0x23 , 0xeb , 0xdb , 0x69 , 0xda ,
875+ 0x08 , 0x5a , 0xc1 , 0xe4 , 0x3e , 0x15 , 0x99 , 0x6e ,
876+ 0x45 , 0x8f , 0x36 , 0x13 , 0xd0 , 0xf1 , 0x1d , 0x8c ,
877+ 0x38 , 0x7b , 0x2e , 0xae , 0xb4 , 0x30 , 0x2a , 0xee ,
878+ 0xb0 , 0x0d , 0x29 , 0x16 , 0x12 , 0xbb , 0x0c , 0x00 ,
879+ };
880+
881+ static uint8_t ed25519_message [] = {
882+ 0x72
883+ };
884+
856885static uint8_t fp256_pkey [] = {
857886 0x77 , 0x84 , 0x35 , 0x65 , 0x4c , 0x7a , 0x6d , 0xb1 ,
858887 0x1e , 0x63 , 0x0b , 0x41 , 0x97 , 0x36 , 0x04 , 0xf4 ,
@@ -1365,6 +1394,29 @@ cperf_ecdsa_test_data secp256r1_perf_data = {
13651394 .curve = RTE_CRYPTO_EC_GROUP_SECP256R1
13661395};
13671396
1397+ /** EDDSA 25519 elliptic curve test params */
1398+ struct
1399+ cperf_eddsa_test_data ed25519_perf_data = {
1400+ .pubkey = {
1401+ .data = ed25519_pubkey ,
1402+ .length = sizeof (ed25519_pubkey ),
1403+ },
1404+ .pkey = {
1405+ .data = ed25519_pkey ,
1406+ .length = sizeof (ed25519_pkey ),
1407+ },
1408+ .sign = {
1409+ .data = ed25519_sign ,
1410+ .length = sizeof (ed25519_sign ),
1411+ },
1412+ .message = {
1413+ .data = ed25519_message ,
1414+ .length = sizeof (ed25519_message ),
1415+ },
1416+ .curve = RTE_CRYPTO_EC_GROUP_ED25519 ,
1417+ .instance = RTE_CRYPTO_EDCURVE_25519
1418+ };
1419+
13681420/** SM2 Fp256 elliptic curve test params */
13691421struct
13701422cperf_sm2_test_data sm2_perf_data = {
0 commit comments