From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E3DCBA0503; Fri, 20 May 2022 09:05:48 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5C25042BB0; Fri, 20 May 2022 09:03:54 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id 0ED6542B85 for ; Fri, 20 May 2022 09:03:51 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030232; x=1684566232; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=vqTrINyRK9heX0qwc1kL+T5DUoLplIpXuEsm1xlkZ3g=; b=ZP4hMYSheKMmAIz9WIUjPcwLcs3jPIq9WOgsS0zMC6bLM+M8vZgOPlAo oX5I23Cfnok9E+/m14LcydKApWYs8FDcEU0D+OEqSE1Z3rvnoLgJy368q xwQ8NuG9A5AZwrwo0OyVW/QyxM8hoggyGRKrXVBUsuMoHL4XNV39RfwtE Dn5t86awmizYgrq1CYNi1Ibmd7Kuay4q33OR8PwIWCB8JaYhbG3EWzqkS H8GZ1ZtBvh2JvgGhOuYAsb/TW1lOoxnxYdfqVYAWwx+1IsVnfeURpFAm8 fKYOcrBOfLTabdqtK977QEcoQ1p9W1j58bXeahihierw3ZH0NRUy0V6Ge w==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140464" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140464" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:03:51 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058562" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:03:50 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 32/40] crypto/openssl: reduce rsa struct to only necessary fields Date: Fri, 20 May 2022 06:54:37 +0100 Message-Id: <20220520055445.40063-33-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - reduced rsa struct to only necessary fields. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- drivers/crypto/openssl/rte_openssl_pmd.c | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers/crypto/openssl/rte_openssl_pmd.c index 6b3cf7a6aa..f5eb82ac2a 100644 --- a/drivers/crypto/openssl/rte_openssl_pmd.c +++ b/drivers/crypto/openssl/rte_openssl_pmd.c @@ -1915,47 +1915,47 @@ process_openssl_rsa_op(struct rte_crypto_op *cop, switch (op->rsa.op_type) { case RTE_CRYPTO_ASYM_OP_ENCRYPT: - ret = RSA_public_encrypt(op->rsa.message.length, - op->rsa.message.data, - op->rsa.cipher.data, + ret = RSA_public_encrypt(op->rsa.input.length, + op->rsa.input.data, + op->rsa.output.data, rsa, pad); if (ret > 0) - op->rsa.cipher.length = ret; + op->rsa.output.length = ret; OPENSSL_LOG(DEBUG, "length of encrypted text %d\n", ret); break; case RTE_CRYPTO_ASYM_OP_DECRYPT: - ret = RSA_private_decrypt(op->rsa.cipher.length, - op->rsa.cipher.data, - op->rsa.message.data, + ret = RSA_private_decrypt(op->rsa.input.length, + op->rsa.input.data, + op->rsa.output.data, rsa, pad); if (ret > 0) - op->rsa.message.length = ret; + op->rsa.output.length = ret; break; case RTE_CRYPTO_ASYM_OP_SIGN: - ret = RSA_private_encrypt(op->rsa.message.length, - op->rsa.message.data, - op->rsa.sign.data, + ret = RSA_private_encrypt(op->rsa.input.length, + op->rsa.input.data, + op->rsa.output.data, rsa, pad); if (ret > 0) - op->rsa.sign.length = ret; + op->rsa.output.length = ret; break; case RTE_CRYPTO_ASYM_OP_VERIFY: - tmp = rte_malloc(NULL, op->rsa.sign.length, 0); + tmp = rte_malloc(NULL, op->rsa.input.length, 0); if (tmp == NULL) { OPENSSL_LOG(ERR, "Memory allocation failed"); cop->status = RTE_CRYPTO_OP_STATUS_ERROR; break; } - ret = RSA_public_decrypt(op->rsa.sign.length, - op->rsa.sign.data, + ret = RSA_public_decrypt(op->rsa.input.length, + op->rsa.input.data, tmp, rsa, pad); -- 2.13.6