Depending on RSA op, the output buffer size could be set
minimal expected memory, rather than 0 as today. This will allow
PMD to do any validation on the size, in case an application
did not create enough memory or even in case of any memory
fault.

Signed-off-by: Gowrishankar Muthukrishnan <gmuthukri...@marvell.com>
---
 app/test/test_cryptodev_asym.c  |  6 +++---
 lib/cryptodev/rte_crypto_asym.h | 15 ++++++++++-----
 2 files changed, 13 insertions(+), 8 deletions(-)

diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c
index 9236817650..bb4c70deba 100644
--- a/app/test/test_cryptodev_asym.c
+++ b/app/test/test_cryptodev_asym.c
@@ -90,7 +90,7 @@ queue_ops_rsa_sign_verify(void *sess)
 
        asym_op->rsa.message.data = rsaplaintext.data;
        asym_op->rsa.message.length = rsaplaintext.len;
-       asym_op->rsa.sign.length = 0;
+       asym_op->rsa.sign.length = RTE_DIM(rsa_n);
        asym_op->rsa.sign.data = output_buf;
        asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
 
@@ -181,7 +181,7 @@ queue_ops_rsa_enc_dec(void *sess)
 
        asym_op->rsa.message.data = rsaplaintext.data;
        asym_op->rsa.cipher.data = cipher_buf;
-       asym_op->rsa.cipher.length = 0;
+       asym_op->rsa.cipher.length = RTE_DIM(rsa_n);
        asym_op->rsa.message.length = rsaplaintext.len;
        asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
 
@@ -213,7 +213,7 @@ queue_ops_rsa_enc_dec(void *sess)
 
        /* Use the resulted output as decryption Input vector*/
        asym_op = result_op->asym;
-       asym_op->rsa.message.length = 0;
+       asym_op->rsa.message.length = RTE_DIM(rsa_n);
        asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT;
        asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;
 
diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_asym.h
index 989f38323f..bdf92d4358 100644
--- a/lib/cryptodev/rte_crypto_asym.h
+++ b/lib/cryptodev/rte_crypto_asym.h
@@ -414,7 +414,8 @@ struct rte_crypto_rsa_op_param {
         * In this case the underlying array should have been
         * allocated with enough memory to hold plaintext output
         * (i.e. must be at least RSA key size). The message.length
-        * field should be 0 and will be overwritten by the PMD
+        * field could be either 0 or minimal length expected from PMD.
+        * This could be validated and overwritten by the PMD
         * with the decrypted length.
         */
 
@@ -427,8 +428,10 @@ struct rte_crypto_rsa_op_param {
         * - for RSA public encrypt.
         * In this case the underlying array should have been allocated
         * with enough memory to hold ciphertext output (i.e. must be
-        * at least RSA key size). The cipher.length field should
-        * be 0 and will be overwritten by the PMD with the encrypted length.
+        * at least RSA key size). The cipher.length field could be
+        * either 0 or minimal length expected from PMD.
+        * This could be validated and overwritten by the PMD
+        * with the encrypted length.
         *
         * When RTE_CRYPTO_RSA_PADDING_NONE and RTE_CRYPTO_ASYM_OP_VERIFY
         * selected, this is an output of decrypted signature.
@@ -443,8 +446,10 @@ struct rte_crypto_rsa_op_param {
         * - for RSA private encrypt.
         * In this case the underlying array should have been allocated
         * with enough memory to hold signature output (i.e. must be
-        * at least RSA key size). The sign.length field should
-        * be 0 and will be overwritten by the PMD with the signature length.
+        * at least RSA key size). The sign.length field could be
+        * either 0 or minimal length expected from PMD.
+        * This could be validated and overwritten by the PMD
+        * with the signature length.
         */
 
        struct rte_crypto_rsa_padding padding;
-- 
2.25.1

Reply via email to