From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B5D88A0503; Fri, 20 May 2022 09:05:42 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7AB0742B9B; Fri, 20 May 2022 09:03:52 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id C8C1642B85 for ; Fri, 20 May 2022 09:03:50 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030231; x=1684566231; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=S78sM5beyUaz7Kd1RX8o9dO3ekJRRD5w5E2T7iyL3M0=; b=hpkt+P9NbqxwEHT8r7iX7PB870QK3XTPLPCVeZuHXi1HDvoi1pULF+3S 8oSxqURc4gcWCUvuEiHMiCvp++hNVCSsgb5A86ZrfuNwPvLWY5/+lhjOn 9Tiz1i1iHAmhsmxviK33CE/hJekra2cqe9ACTA7YWUuazv4EUQQJR1fn9 HWUliFmRLPF68NO0zA0jVzYhAJNy/nDTYgkFCdcBQw8s7oJDGlyjsA9Zt oOoDfX0AaONA7n4z/Zy5BMdqiQ03siHBXXu6nhA5EJ/axl6cvp5tMqzZ3 5AAOffNRTvcdVG/JO8xK3CX/uhP3WOahOQS4a2awRTMNNT6CvYF1hRs4h Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140461" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140461" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:03:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058545" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:03:47 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 31/40] crypto/qat: reduce rsa struct to only necessary fields Date: Fri, 20 May 2022 06:54:36 +0100 Message-Id: <20220520055445.40063-32-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - reduced rsa struct to only necessary fields. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- drivers/crypto/qat/qat_asym.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c index 5dd355d007..cb2b47acbb 100644 --- a/drivers/crypto/qat/qat_asym.c +++ b/drivers/crypto/qat/qat_asym.c @@ -347,7 +347,7 @@ rsa_set_pub_input(struct rte_crypto_asym_op *asym_op, if (asym_op->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) { switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: - SET_PKE_LN(cookie->input_array, asym_op->rsa.message, + SET_PKE_LN(cookie->input_array, asym_op->rsa.input, alg_bytesize, 0); break; default: @@ -360,7 +360,7 @@ rsa_set_pub_input(struct rte_crypto_asym_op *asym_op, } else { switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: - SET_PKE_LN(cookie->input_array, asym_op->rsa.sign, + SET_PKE_LN(cookie->input_array, asym_op->rsa.input, alg_bytesize, 0); break; default: @@ -456,7 +456,7 @@ rsa_set_priv_input(struct rte_crypto_asym_op *asym_op, RTE_CRYPTO_ASYM_OP_DECRYPT) { switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: - SET_PKE_LN(cookie->input_array, asym_op->rsa.cipher, + SET_PKE_LN(cookie->input_array, asym_op->rsa.input, alg_bytesize, 0); HEXDUMP("RSA ciphertext", cookie->input_array[0], alg_bytesize); @@ -471,7 +471,7 @@ rsa_set_priv_input(struct rte_crypto_asym_op *asym_op, RTE_CRYPTO_ASYM_OP_SIGN) { switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: - SET_PKE_LN(cookie->input_array, asym_op->rsa.message, + SET_PKE_LN(cookie->input_array, asym_op->rsa.input, alg_bytesize, 0); HEXDUMP("RSA text to be signed", cookie->input_array[0], alg_bytesize); @@ -519,7 +519,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op, if (asym_op->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) { - uint8_t *rsa_result = asym_op->rsa.cipher.data; + uint8_t *rsa_result = asym_op->rsa.output.data; rte_memcpy(rsa_result, cookie->output_array[0], @@ -527,7 +527,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op, HEXDUMP("RSA Encrypted data", cookie->output_array[0], alg_bytesize); } else { - uint8_t *rsa_result = asym_op->rsa.cipher.data; + uint8_t *rsa_result = asym_op->rsa.output.data; switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: @@ -545,7 +545,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op, } } else { if (asym_op->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) { - uint8_t *rsa_result = asym_op->rsa.message.data; + uint8_t *rsa_result = asym_op->rsa.output.data; switch (asym_op->rsa.padding.type) { case RTE_CRYPTO_RSA_PADDING_NONE: @@ -561,7 +561,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op, return RTE_CRYPTO_OP_STATUS_ERROR; } } else { - uint8_t *rsa_result = asym_op->rsa.sign.data; + uint8_t *rsa_result = asym_op->rsa.output.data; rte_memcpy(rsa_result, cookie->output_array[0], -- 2.13.6