From patchwork Fri May 20 05:54:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arkadiusz Kusztal X-Patchwork-Id: 111502 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 7D22FA0503; Fri, 20 May 2022 09:04:25 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D245042BD2; Fri, 20 May 2022 09:03:18 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id D139342B71 for ; Fri, 20 May 2022 09:03:16 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030197; x=1684566197; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=BWflpECs7G89HVRoD7VrwG7ZZk7EMwKtR6goUEKhLsk=; b=iH2rrxGjsoSHuHDyyW103uRADMG+dLcGTTrpBGSZak7ekzXFoskVv0Rw 1t0CQI3QLzICAcoUat/IqRRlINd/WNUbsZ/qj0/p0ShCW+F6lpi6OOql4 Uiz/f6K2lY31Ad/amgER3pUmHYZjV/hCUtzNMwsH1HtarmOtDJEqlCxZ5 qMcWvtCwrLbC1vV4BH3SQw6VlI23udaGlWRtr9rXJTXSwCCT/YY5A4Mid gbyeNJd1J10kflKqow6IzrJDNcTBxAGvdNs2rUbyXQaMtSJcFlC4dN/fR 19xTLVnzBVaQ1jMlThXTKHysRIXsiAaI22MfDniRYZhwd8+Yp/AGJqVgW A==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140375" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140375" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:03:16 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058354" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:03:15 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 18/40] test/crypto: move dh type from xform to dh op Date: Fri, 20 May 2022 06:54:23 +0100 Message-Id: <20220520055445.40063-19-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - Moved dh operation type to dh operation struct. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- app/test/test_cryptodev_asym.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index 9e5d5e4f27..892b5553f8 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -1061,8 +1061,8 @@ test_dh_gen_shared_sec(struct rte_crypto_asym_xform *xfrm) asym_op = op->asym; /* Setup a xform and op to generate private key only */ - xform.dh.type = RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE; asym_op->dh.priv_key.data = dh_test_params.priv_key.data; + asym_op->dh.op_type = RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE; asym_op->dh.priv_key.length = dh_test_params.priv_key.length; asym_op->dh.pub_key.data = (uint8_t *)peer; asym_op->dh.pub_key.length = sizeof(peer); @@ -1142,8 +1142,8 @@ test_dh_gen_priv_key(struct rte_crypto_asym_xform *xfrm) asym_op = op->asym; /* Setup a xform and op to generate private key only */ - xform.dh.type = RTE_CRYPTO_ASYM_KE_PRIVATE_KEY_GENERATE; asym_op->dh.priv_key.data = output; + asym_op->dh.op_type = RTE_CRYPTO_ASYM_KE_PRIVATE_KEY_GENERATE; asym_op->dh.priv_key.length = sizeof(output); ret = rte_cryptodev_asym_session_create(dev_id, &xform, sess_mpool, &sess); @@ -1224,9 +1224,9 @@ test_dh_gen_pub_key(struct rte_crypto_asym_xform *xfrm) * using test private key * */ - xform.dh.type = RTE_CRYPTO_ASYM_KE_PUBLIC_KEY_GENERATE; asym_op->dh.pub_key.data = output; + asym_op->dh.op_type = RTE_CRYPTO_ASYM_KE_PUBLIC_KEY_GENERATE; asym_op->dh.pub_key.length = sizeof(output); /* load pre-defined private key */ asym_op->dh.priv_key.data = rte_malloc(NULL,