Hi Shally, Thanks for your feedback.
> -----Original Message----- > From: Shally Verma [mailto:shal...@marvell.com] > Sent: Wednesday, February 6, 2019 6:08 AM > To: Kusztal, ArkadiuszX <arkadiuszx.kusz...@intel.com>; dev@dpdk.org > Cc: akhil.go...@nxp.com; Trahe, Fiona <fiona.tr...@intel.com>; > sunila.s...@caviumnetworks.com; ashish.gu...@caviumnetworks.com; > umesh.kar...@caviumnetworks.com > Subject: RE: [PATCH v2] cryptodev: rework mod exp and mod inv comments > > HI Arek, > > Acked with minor feedback. > > >-----Original Message----- > >From: Arek Kusztal <arkadiuszx.kusz...@intel.com> > >Sent: 05 February 2019 23:50 > >To: dev@dpdk.org > >Cc: akhil.go...@nxp.com; fiona.tr...@intel.com; > >shally.ve...@caviumnetworks.com; sunila.s...@caviumnetworks.com; > >ashish.gu...@caviumnetworks.com; umesh.kar...@caviumnetworks.com; > Arek > >Kusztal <arkadiuszx.kusz...@intel.com> > >Subject: [PATCH v2] cryptodev: rework mod exp and mod inv comments > > > >External Email > > > >This patch changes modular exponentiation and modular multiplicative > >inverse API comments to make it more precise. > > > >Signed-off-by: Arek Kusztal <arkadiuszx.kusz...@intel.com> > >--- > >v2: > >- grammar fixes > > > > lib/librte_cryptodev/rte_crypto_asym.h | 44 > > ++++++++++++++++++++++------------ > > 1 file changed, 29 insertions(+), 15 deletions(-) > > > Acked-by: Shally Verma <shally.ve...@marvell.com> > > >diff --git a/lib/librte_cryptodev/rte_crypto_asym.h > >b/lib/librte_cryptodev/rte_crypto_asym.h > >index 5e185b2..9582ee3 100644 > >--- a/lib/librte_cryptodev/rte_crypto_asym.h > >+++ b/lib/librte_cryptodev/rte_crypto_asym.h > >@@ -72,8 +72,8 @@ enum rte_crypto_asym_xform_type { > > * Refer to rte_crypto_asym_op_type > > */ > > RTE_CRYPTO_ASYM_XFORM_MODINV, > >- /**< Modular Inverse > >- * Perform Modulus inverse b^(-1) mod n > >+ /**< Modular Multiplicative Inverse > >+ * Perform Modular Multiplicative Inverse b^(-1) mod n > > */ > > RTE_CRYPTO_ASYM_XFORM_MODEX, > > /**< Modular Exponentiation > >@@ -233,29 +233,39 @@ struct rte_crypto_rsa_xform { struct > >rte_crypto_modex_xform { > > rte_crypto_param modulus; > > /**< modulus > >- * Prime modulus of the modexp transform operation in octet-string > >- * network byte order format. > >+ * Pointer to the modulus data for modexp transform operation > >+ * in octet-string network byte order format, any positive integer > >+ * > This statement looks incomplete. You can write it "it should be positive > integer " but is it required to be mentioned? Coz input is array of uint8_t so > assumption is it will be positive. > Actually by this we meant that there is no constraint (if should be prime, co-prime, semi-prime, multi-prime, less than... etc), But yes this is only informational and probably could even be omitted > ... > > struct rte_crypto_modinv_xform { > > rte_crypto_param modulus; > > /**< > >- * Pointer to the prime modulus data for modular > >- * inverse operation in octet-string network byte > >- * order format. > >+ * Pointer to the modulus data for modular multiplicative inverse > >+ * operation in octet-string network byte order format, > >+ * positive integer > Same comment as above. > > >+ * > >+ * In case this number is equal to zero the driver shall set > >+ * the crypto op status field to RTE_CRYPTO_OP_STATUS_ERROR > >+ * > >+ * This number shall be relatively prime to base > >+ * in corresponding Modular Multiplicative Inverse > >+ * rte_crypto_mod_op_param > > */ > > }; > > > >@@ -317,14 +327,18 @@ struct rte_crypto_dsa_xform { > > > ... > > >2.1.0