From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D4AB245AD2; Mon, 7 Oct 2024 10:29:25 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6B60E40E0B; Mon, 7 Oct 2024 10:29:25 +0200 (CEST) Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) by mails.dpdk.org (Postfix) with ESMTP id 61EB340151 for ; Mon, 7 Oct 2024 10:29:24 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1728289764; x=1759825764; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=k8I2Fy/DUp9iWB1b3l60JA7GxpkBSBEIkzt2tNHPowk=; b=fiPVT7+AA7OIGCNm6nc8MA3WlwccW9qqoMH9x44kUT0PBXMDphRqXuCf hK2opW2FvCRIqMTBd3b5pjC13hQaii5+/Wi3P5EmByZtPjiXqkPXBVKvE MWdCRCE9dFM8bKOw+iAM/zaMbLGOV15iq61izAhiSYGXlXENq7R32wanS G0pB9EbiWzXaSicrnV6OF+UgTDprGqjSbmTz+JncexsUu6A1Tf08O8mu7 kkaosTSGgFhdiMi2H5oHEUMFSdBSmncM/MkP1DiV0QrGKZ/qRjdtjhXr2 Go73Syj6HKmjYDXHBsg1ES7R/2vQ8YpcxwnGcvdgEoWYDDakz6Wis0v/G A==; X-CSE-ConnectionGUID: lc7cBCT0RVqxydgYoLWfWg== X-CSE-MsgGUID: uLX/afCfQtKjWPdFNTMzCA== X-IronPort-AV: E=McAfee;i="6700,10204,11217"; a="15044926" X-IronPort-AV: E=Sophos;i="6.11,183,1725346800"; d="scan'208";a="15044926" Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Oct 2024 01:29:23 -0700 X-CSE-ConnectionGUID: wShhVInoS8SldeVYsuzzsw== X-CSE-MsgGUID: G7vOwFaBSfitEDTsN4iFug== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,183,1725346800"; d="scan'208";a="106152571" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmviesa001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 07 Oct 2024 01:29:23 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 7 Oct 2024 01:29:22 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 7 Oct 2024 01:29:22 -0700 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39 via Frontend Transport; Mon, 7 Oct 2024 01:29:22 -0700 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.100) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Mon, 7 Oct 2024 01:29:21 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Wrp/MV4d9xpfcp876tOfR1ZpuhNL+vCLDW59wZtGYHZTEJGzuf/EMdH3FrmtggnS9gkmZfjlK6SOeUU6Ge141W2KSM54fBFhYlKgNGa8CEKiBH2zOTe1RVIVB3TzaIEsI/EDvI3qpuCHp1HorA7Cs/sXTCqFauFJ6NvuiS824k4fW7O2eZJtpk/iM48SRyLVkl7H1yaXBJPmYDrrv+eBdXe64JF10SPQmJ1uv2sVMQ05QlJuyI920xAw6XwE1n3Sww7sLJkpiyGVpR82Sp4GzSRrf0+0KVVMAv9Auir37azcnFmqEwK0V5xM2eHxIx/AWg2D/ZP5MgRIbGV8gkxGKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Hz49dByHe+/IzdmJ6SjT4pVWs87fOfoe8diBMMN+Txw=; b=JpJ8Djlrlq8MQOJ5cn0ldt0DaHrPMuf8HEyiuAcN1FmwueedBR9VAR9f0y/KZVy7sI8h8afNAzxZZb98We4PYtwJ1KL1TI6DMGBhIUziTxyLc0Cgtdtq4qkhrwbDub1nZ5yCy5kOoDYkLbNc6kZ5ugtbTvvdio91b3b48RU/v+MPUQScfEGWfdRUiMHIAwPV+vWkmL7ZryWK/HxVleA7Rt8/pBcjt4Olmn4kaV6rTrBd5dadImS4gUGCqX8pRvrHubzWqnbJD7f18nWdeDW37e5f4CZhm5AL+DJeBaZH3n4HuOJ7AET7cLiFW6qGCB7MgZsnY9CafuK213rd9ThNgQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH0PR11MB5013.namprd11.prod.outlook.com (2603:10b6:510:30::21) by DM4PR11MB5280.namprd11.prod.outlook.com (2603:10b6:5:38b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8026.22; Mon, 7 Oct 2024 08:29:14 +0000 Received: from PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::1c54:1589:8882:d22b]) by PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::1c54:1589:8882:d22b%3]) with mapi id 15.20.8026.020; Mon, 7 Oct 2024 08:29:13 +0000 From: "Kusztal, ArkadiuszX" To: Akhil Goyal , "dev@dpdk.org" CC: "Dooley, Brian" Subject: RE: [EXTERNAL] [PATCH v2] cryptodev: add ec points to sm2 op Thread-Topic: [EXTERNAL] [PATCH v2] cryptodev: add ec points to sm2 op Thread-Index: AQHbEp+hVAbXH6hw2kabh8NMpGDGErJ1HssAgAXbXZA= Date: Mon, 7 Oct 2024 08:29:13 +0000 Message-ID: References: <20240129185950.14346-1-arkadiuszx.kusztal@intel.com> <20240929172912.87859-1-arkadiuszx.kusztal@intel.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5013:EE_|DM4PR11MB5280:EE_ x-ms-office365-filtering-correlation-id: 01dde9c6-2bd8-451c-d05e-08dce6aa2007 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?us-ascii?Q?ABpPnOL0GKl4lGl0BF8u51/Rvv6GtpWOwjGOrfJIGGCt4Pp7Nc7bBeBagSBZ?= =?us-ascii?Q?SZN1JfhRymYyY2NLmVciTlz8thV6IOUhaStDyWgpQcgMWnY5Bzos0b48KiuP?= =?us-ascii?Q?a0Ae3573b1pjCiu6QYuwyMOTA9BiMAiWIq3SlW1/UpxTL69gFDjCfxQJ3jJm?= =?us-ascii?Q?1DDczIHiTTcFezFQxsKKas7LsHHYyaVz5FveNE1IDN/LAxGtzluHv1UKi988?= =?us-ascii?Q?WRHfhEOmfk+KIClfLFc4Z3tQwM+6l2PYkfWPLcSdQHNDY4hhcIgIWBR3tnZY?= =?us-ascii?Q?n3BaDMqTTJl3WjxTE1+lK9RdO5OX9ltYTsIljelwKbrla8zAxU5fCUwrXw1z?= =?us-ascii?Q?EjWEsKHSygqVYrNVHnJxAaULTVoFIChS1jWy/wCF94IV+WVo9XqczCs/38RM?= =?us-ascii?Q?m6vJhu28b/7ALRCF3x5h+m10HicCuMxdqY9EkTqJlWYtqu+2dHzA1E9zXDGL?= =?us-ascii?Q?TGJQFNR/pPfFI7eHBd8PB5U/F66ohF2UmI/9DXA7+gjgrUioT3CJgqK69l9W?= =?us-ascii?Q?ZVI3FcWZCs2pq5ZYWWvlxyXaDNT3Z0mgcxypkid26PvNo5+V7G9hba7iJ2kb?= =?us-ascii?Q?cHfnRadSe8cEPQN/7QDxSbrYDcMDEHqOhNFGD0o+2Si/vAMFvQLWauU8mv1X?= =?us-ascii?Q?29qdFWYP0wUg3f0FChGSlE14nx2qu4CytZoY7K0wGdFfuRhDlLj2UmEJkdt+?= =?us-ascii?Q?Y+dXVmzkKI0YLur+8HY3bQZokPOlra6idjcJ5OpKISCHhBAGpf1C2xXnJIwQ?= =?us-ascii?Q?oWgtfZdMGGsRUQ1gvij2VoK5/dvQNNqwXQeqmdK7WBlkL8CktUerVOjYkVls?= =?us-ascii?Q?sT9VknSrtQMJJ5f0pfTXcngFCWnxaivae+UXgt0kFpgxssgyMxYkIJ5Y2++y?= =?us-ascii?Q?YezcmHw5AuDuom8R56fiaM0d4OjuQsb1QEowLVpdosU9+yQihm2ytPWw2HZh?= =?us-ascii?Q?ioKDGpZWnqz0NK6y50dYKoMTPYrDLi4UK/7ZNkU60mnPVvMT8D6SGlUpkqq6?= =?us-ascii?Q?NP6aVy2GfkOQeW+BSvwD7hj4nDZdoK4tZ8G47/83uXHoYju5JLFbBpnizGwM?= =?us-ascii?Q?k/+u9J2Nb7apoaCNsLKf0QmZS5Jptj2pchIm4ruZuQapduYQTLx0Ia+r6XQY?= =?us-ascii?Q?S4c5ljkqSOGmac4tFASnfyH8+W2hHJGqduYI3aopQ3FXHjDmkTAhXeHW8BKP?= =?us-ascii?Q?TnSkh7UmOgNWpy3XcgtRVMLs8jzxOiBeWme4B5oE7cXAwUOpDYwJSR0jcoVw?= =?us-ascii?Q?Obhg133guMfBoHDrjBh0RfMywXua3RQl2E/+gVNa0Qxu+LudSr3caSRyGUzY?= =?us-ascii?Q?NwzarXhsZTAo5cWAaU6LkHBj/uceIg5xk8VgQ4qqO0K5hQ=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5013.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(376014)(366016)(38070700018); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?wKdJjFrBeJKmrFjXwCUY5rFYcr0x33BCOGcpt8N39ZoU0VBmoSKXuhQORX1A?= =?us-ascii?Q?OCyvR9PsT1MM6nycKVIbn8H70f+R33QON/AQJnu3bWUZY5g/fPNU6FHl4RCf?= =?us-ascii?Q?eakyfT/BRroaMrPMq2k1b7n1v0may5GQXpNBk29FRxpkJ7DHzoOSRSQ66x+U?= =?us-ascii?Q?sUUQrWx8w4iCaGJNKDNi/OqZ7kHSBjaKTI4QQP3MOtnUMHn3HaogKHKTG3v2?= =?us-ascii?Q?0X1/noBOZHAP2LBU8T1OTIjQKaYHy83Q4a1IzBNrSpaIrCXGgkUw7UF8ZDz1?= =?us-ascii?Q?U1ISoBaqQwuqNtOja/vDNCpgLNAbEFWra/K5fzlMbwVn3uyZ0pMG1QFh7BKV?= =?us-ascii?Q?b/5qTD0Wmn89+oBWA9H5tafatqn2/xJYNVR3Coaj4HARfrXkFihcLA4/lGYn?= =?us-ascii?Q?oDbPAcLo3NPGVV5bARwiVO3uhewPVTQ8ZMTF0ogzmatTvsvGNj7sYGGHgV9Y?= =?us-ascii?Q?4qpptahyMYunxYyw5xHYMwygSQjTexcPpQ/sVOmKl4kihqI6jBzOPPZ+ucDl?= =?us-ascii?Q?y2pClCXH1s21nyJRqM6FNDQuhHZ0y7H/d0zSpVtNEGn7h6Gryvd14fn6WouW?= =?us-ascii?Q?AoImoVKRX8ajAuoA7Nq0SDTZ2HZvwCyymrTqk+Z4OB9yb0pLUDOpr/sr2hBP?= =?us-ascii?Q?fs+JCNzFpE/vG0evK6AdEl/sPPr/fyf/ebXEOAEf+FizfqsfQ9DUQxZtFlz1?= =?us-ascii?Q?45PKdvVOgPXZMzL5ciUNTEdfX/jGvoR98DT8a8NnOJGJAD9OLyKAPxTpXiGM?= =?us-ascii?Q?Fq3dy16b6guLREdOdpODFrVLT4lky8pDoMCY9RsZZS2JwY6Kr0h9cR7v2jMj?= =?us-ascii?Q?5MsySVXhbopZgGc0ga0TvLJHtwCxJbuRuuMrM0E7S+Zg0H1YKKvkKTwg/Lv3?= =?us-ascii?Q?o44GpITr9UVG7FhrZctuuVxCEDSr60ZhzTN3zOf/iCNHMaWSqM+N9OjcOtfV?= =?us-ascii?Q?65Fzq+54iqapr4EYPSUGTtZnlqR+gcgsa8DctlPAbdPHuYBfArr2dF8lQNU9?= =?us-ascii?Q?G6i6AHPehqZSzhHTh19GOwVRsvWbVM639/EVcDsoclAh90/DXEa+UGqaNd4C?= =?us-ascii?Q?4KC4p/M4MTMSdx835nhuxAao/hgWuv3E2+z1nRpUVubJkl1s8NkvBZAgYYXZ?= =?us-ascii?Q?cWvTjUHy+FS61YsiPARwYcRu1nITCo110TEBGetNJqwizMME6HJHtctkcw8Y?= =?us-ascii?Q?VAocFsuXeUUDGLPir356kH6LfqnP9H5HF9XWJFAHQWmZ6pi3mak4aO1V7rdw?= =?us-ascii?Q?mFDWciMxBFCBSrK2uD+2lC6PdUTfCDZto1zqriT78BLFo8SFXGz9ggrrlkVW?= =?us-ascii?Q?+ThTAbvTsJv7pQCUauWn5b7RMwhWyOvvzq3vt/A/cyHV0AuZOmqEqKxTo18v?= =?us-ascii?Q?VMc6um/iMLtbf+cS2LXAYR+vZukYUz/MZrOwpdbc7Fi0hyR9MLjtA2QZHa3k?= =?us-ascii?Q?92/b94MZjZ3Z4mQx/KpttLenmGo50icTTmzdZetPMFxWSk1VPGBeVIUAlbdQ?= =?us-ascii?Q?THkjeIC+jCg54Au4q8MBPxXrTvzJqHrgLyySbHjE5eDnaqGsylmTfrp99t4B?= =?us-ascii?Q?4Hk/efCkKPK0k73AUWEvjWFrRj5Ebx0YbmBmStPbkAdOMxRmk3N/1Um0yG73?= =?us-ascii?Q?bA=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5013.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 01dde9c6-2bd8-451c-d05e-08dce6aa2007 X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2024 08:29:13.5459 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: T7O4eLiy3G0kbtr9M3lncu2kWM/ndwmD+gpRaJeurj0ZWVwkLQwFJiV5gN01SP23EhUG9+c1IcB0fE++N25m0OL9by1IO7UqJL6AHpiVHzk= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5280 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > -----Original Message----- > From: Akhil Goyal > Sent: Thursday, October 3, 2024 4:39 PM > To: Kusztal, ArkadiuszX ; dev@dpdk.org > Cc: Dooley, Brian > Subject: RE: [EXTERNAL] [PATCH v2] cryptodev: add ec points to sm2 op >=20 > > In the case when PMD cannot support the full process of the SM2, but > > elliptic curve computation only, additional fields are needed to > > handle such a case. > > > > Points C1, kP therefore were added to the SM2 crypto operation struct. > > > > Signed-off-by: Arkadiusz Kusztal > > --- > > lib/cryptodev/rte_crypto_asym.h | 119 > > ++++++++++++++++++++++++------------- > > --- > > 1 file changed, 71 insertions(+), 48 deletions(-) > > > > diff --git a/lib/cryptodev/rte_crypto_asym.h > > b/lib/cryptodev/rte_crypto_asym.h index 39d3da3952..f59759062f 100644 > > --- a/lib/cryptodev/rte_crypto_asym.h > > +++ b/lib/cryptodev/rte_crypto_asym.h > > @@ -600,40 +600,6 @@ struct rte_crypto_ecpm_op_param { }; > > > > /** > > - * Asymmetric crypto transform data > > - * > > - * Structure describing asym xforms. > > - */ > > -struct rte_crypto_asym_xform { > > - struct rte_crypto_asym_xform *next; > > - /**< Pointer to next xform to set up xform chain.*/ > > - enum rte_crypto_asym_xform_type xform_type; > > - /**< Asymmetric crypto transform */ > > - > > - union { > > - struct rte_crypto_rsa_xform rsa; > > - /**< RSA xform parameters */ > > - > > - struct rte_crypto_modex_xform modex; > > - /**< Modular Exponentiation xform parameters */ > > - > > - struct rte_crypto_modinv_xform modinv; > > - /**< Modular Multiplicative Inverse xform parameters */ > > - > > - struct rte_crypto_dh_xform dh; > > - /**< DH xform parameters */ > > - > > - struct rte_crypto_dsa_xform dsa; > > - /**< DSA xform parameters */ > > - > > - struct rte_crypto_ec_xform ec; > > - /**< EC xform parameters, used by elliptic curve based > > - * operations. > > - */ > > - }; > > -}; > > - > > -/** > > * SM2 operation params. > > */ > > struct rte_crypto_sm2_op_param { > > @@ -658,20 +624,43 @@ struct rte_crypto_sm2_op_param { > > * will be overwritten by the PMD with the decrypted length. > > */ > > > > - rte_crypto_param cipher; > > - /**< > > - * Pointer to input data > > - * - to be decrypted for SM2 private decrypt. > > - * > > - * Pointer to output data > > - * - for SM2 public encrypt. > > - * In this case the underlying array should have been allocated > > - * with enough memory to hold ciphertext output (at least X bytes > > - * for prime field curve of N bytes and for message M bytes, > > - * where X =3D (C1 || C2 || C3) and computed based on SM2 RFC as > > - * C1 (1 + N + N), C2 =3D M, C3 =3D N. The cipher.length field will > > - * be overwritten by the PMD with the encrypted length. > > - */ > > + union { > > + rte_crypto_param cipher; > > + /**< > > + * Pointer to input data > > + * - to be decrypted for SM2 private decrypt. > > + * > > + * Pointer to output data > > + * - for SM2 public encrypt. > > + * In this case the underlying array should have been allocated > > + * with enough memory to hold ciphertext output (at least X > > bytes > > + * for prime field curve of N bytes and for message M bytes, > > + * where X =3D (C1 || C2 || C3) and computed based on SM2 RFC > > as > > + * C1 (1 + N + N), C2 =3D M, C3 =3D N. The cipher.length field will > > + * be overwritten by the PMD with the encrypted length. > > + */ > > + struct { > > + struct rte_crypto_ec_point C1; > > + /**< > > + * This field is used only when PMD does not support > the > > full > > + * process of the SM2 encryption/decryption, but the > > elliptic > > + * curve part only. > > + * > > + * In the case of encryption, it is an output - point C1 =3D > > (x1,y1). > > + * In the case of decryption, if is an input - point C1 =3D > > (x1,y1) > > + * > > + */ > > + struct rte_crypto_ec_point kP; > > + /**< > > + * This field is used only when PMD does not support > the > > full > > + * process of the SM2 encryption/decryption, but the > > elliptic > > + * curve part only. > > + * > > + * It is an output in the encryption case, it is a point > > + * [k]P =3D (x2,y2) > > + */ > > + }; > > + }; > > > > rte_crypto_uint id; > > /**< The SM2 id used by signer and verifier. */ @@ -698,6 +687,40 @@ > > struct rte_crypto_sm2_op_param { }; > > >=20 > How is the application supposed to know, it need to fill these parameters= and > PMD does not support full operation? > Can we add some capability checks? Initially I though it should be based on the .rst file PMD information, lik= e with the key generation random number. Otherwise, it could rather be a feature flag than a capability? >=20 > Also send the patches for test case and PMD support. Sure, I will send. >=20 > > /** > > + * Asymmetric crypto transform data > > + * > > + * Structure describing asym xforms. > > + */ > > +struct rte_crypto_asym_xform { > > + struct rte_crypto_asym_xform *next; > > + /**< Pointer to next xform to set up xform chain.*/ > > + enum rte_crypto_asym_xform_type xform_type; > > + /**< Asymmetric crypto transform */ > > + > > + union { > > + struct rte_crypto_rsa_xform rsa; > > + /**< RSA xform parameters */ > > + > > + struct rte_crypto_modex_xform modex; > > + /**< Modular Exponentiation xform parameters */ > > + > > + struct rte_crypto_modinv_xform modinv; > > + /**< Modular Multiplicative Inverse xform parameters */ > > + > > + struct rte_crypto_dh_xform dh; > > + /**< DH xform parameters */ > > + > > + struct rte_crypto_dsa_xform dsa; > > + /**< DSA xform parameters */ > > + > > + struct rte_crypto_ec_xform ec; > > + /**< EC xform parameters, used by elliptic curve based > > + * operations. > > + */ > > + }; > > +}; > > + > > +/** > > * Asymmetric Cryptographic Operation. > > * > > * Structure describing asymmetric crypto operation params. > > -- > > 2.13.6