> - Key exchange is now separate enum. > This commit reflects changes to the asymmetric crypto API > > Signed-off-by: Arek Kusztal <arkadiuszx.kusz...@intel.com> > ---
Individual patches must compile. There are multiple patches which needs to be combined. 6,7,8 should be a single patch or else compilation will be broken 2,3 should also be combined. > app/test/test_cryptodev_asym.c | 15 ++++++++------- > 1 file changed, 8 insertions(+), 7 deletions(-) > > diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c > index 62d710b0a0..0098b6bf65 100644 > --- a/app/test/test_cryptodev_asym.c > +++ b/app/test/test_cryptodev_asym.c > @@ -530,7 +530,7 @@ test_one_case(const void *test_case, int sessionless) > printf(" %u) TestCase %s %s\n", test_index++, > tc.modex.description, test_msg); > } else { > - for (i = 0; i <= > RTE_CRYPTO_ASYM_OP_SHARED_SECRET_COMPUTE; i++) { > + for (i = 0; i <= > RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE; i++) { > if (tc.modex.xform_type == > RTE_CRYPTO_ASYM_XFORM_RSA) { > if (tc.rsa_data.op_type_flags & (1 << i)) { > if (tc.rsa_data.key_exp) { > @@ -972,7 +972,7 @@ static inline void print_asym_capa( > rte_crypto_asym_xform_strings[capa->xform_type]); > printf("operation supported -"); > > - for (i = 0; i <= RTE_CRYPTO_ASYM_OP_SHARED_SECRET_COMPUTE; > i++) { > + for (i = 0; i <= RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE; i++) > { > /* check supported operations */ > if (rte_cryptodev_asym_xform_capability_check_optype(capa, > i)) > printf(" %s", > @@ -1062,7 +1062,7 @@ test_dh_gen_shared_sec(struct > rte_crypto_asym_xform *xfrm) > asym_op = op->asym; > > /* Setup a xform and op to generate private key only */ > - xform.dh.type = RTE_CRYPTO_ASYM_OP_SHARED_SECRET_COMPUTE; > + xform.dh.type = RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE; > xform.next = NULL; > asym_op->dh.priv_key.data = dh_test_params.priv_key.data; > asym_op->dh.priv_key.length = dh_test_params.priv_key.length; > @@ -1144,7 +1144,7 @@ test_dh_gen_priv_key(struct rte_crypto_asym_xform > *xfrm) > asym_op = op->asym; > > /* Setup a xform and op to generate private key only */ > - xform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE; > + xform.dh.type = RTE_CRYPTO_ASYM_KE_PRIVATE_KEY_GENERATE; > xform.next = NULL; > asym_op->dh.priv_key.data = output; > asym_op->dh.priv_key.length = sizeof(output); > @@ -1227,7 +1227,7 @@ test_dh_gen_pub_key(struct rte_crypto_asym_xform > *xfrm) > * using test private key > * > */ > - xform.dh.type = RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE; > + xform.dh.type = RTE_CRYPTO_ASYM_KE_PUBLIC_KEY_GENERATE; > xform.next = NULL; > > asym_op->dh.pub_key.data = output; > @@ -1317,9 +1317,10 @@ test_dh_gen_kp(struct rte_crypto_asym_xform > *xfrm) > /* Setup a xform chain to generate > * private key first followed by > * public key > - */xform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE; > + */ > + xform.dh.type = RTE_CRYPTO_ASYM_KE_PRIVATE_KEY_GENERATE; > pub_key_xform.xform_type = RTE_CRYPTO_ASYM_XFORM_DH; > - pub_key_xform.dh.type = > RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE; > + pub_key_xform.dh.type = > RTE_CRYPTO_ASYM_KE_PUBLIC_KEY_GENERATE; > xform.next = &pub_key_xform; > > asym_op->dh.pub_key.data = out_pub_key; > -- > 2.13.6