- reduced rsa struct to only necessary fields. This commit reflects changes to the asymmetric crypto API.
Signed-off-by: Arek Kusztal <arkadiuszx.kusz...@intel.com> --- drivers/crypto/cnxk/cnxk_ae.h | 36 ++++++++++++++++++------------------ 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_ae.h b/drivers/crypto/cnxk/cnxk_ae.h index 0562f72270..ea6964dd37 100644 --- a/drivers/crypto/cnxk/cnxk_ae.h +++ b/drivers/crypto/cnxk/cnxk_ae.h @@ -380,19 +380,19 @@ cnxk_ae_enqueue_rsa_op(struct rte_crypto_op *op, switch (rsa->op_type) { case RTE_CRYPTO_ASYM_OP_VERIFY: - cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->sign, + cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_ENCRYPT: - cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->message, + cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_SIGN: cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, - &rsa->message, inst); + &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_DECRYPT: - cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->cipher, + cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; default: @@ -671,44 +671,44 @@ cnxk_ae_dequeue_rsa_op(struct rte_crypto_op *cop, uint8_t *rptr, switch (rsa->op_type) { case RTE_CRYPTO_ASYM_OP_ENCRYPT: - rsa->cipher.length = rsa_ctx->n.length; - memcpy(rsa->cipher.data, rptr, rsa->cipher.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); break; case RTE_CRYPTO_ASYM_OP_DECRYPT: if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) { - rsa->message.length = rsa_ctx->n.length; - memcpy(rsa->message.data, rptr, rsa->message.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); } else { /* Get length of decrypted output */ - rsa->message.length = + rsa->output.length = rte_cpu_to_be_16(*((uint16_t *)rptr)); /* * Offset output data pointer by length field * (2 bytes) and copy decrypted data. */ - memcpy(rsa->message.data, rptr + 2, - rsa->message.length); + memcpy(rsa->output.data, rptr + 2, + rsa->output.length); } break; case RTE_CRYPTO_ASYM_OP_SIGN: - rsa->sign.length = rsa_ctx->n.length; - memcpy(rsa->sign.data, rptr, rsa->sign.length); + rsa->input.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); break; case RTE_CRYPTO_ASYM_OP_VERIFY: if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) { - rsa->sign.length = rsa_ctx->n.length; - memcpy(rsa->sign.data, rptr, rsa->sign.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); } else { /* Get length of signed output */ - rsa->sign.length = + rsa->output.length = rte_cpu_to_be_16(*((uint16_t *)rptr)); /* * Offset output data pointer by length field * (2 bytes) and copy signed data. */ - memcpy(rsa->sign.data, rptr + 2, rsa->sign.length); + memcpy(rsa->output.data, rptr + 2, rsa->output.length); } - if (memcmp(rsa->sign.data, rsa->message.data, + if (memcmp(rsa->output.data, rsa->message.data, rsa->message.length)) { cop->status = RTE_CRYPTO_OP_STATUS_ERROR; } -- 2.13.6