From patchwork Fri May 20 05:54:39 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arkadiusz Kusztal X-Patchwork-Id: 111518 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D9185A0503; Fri, 20 May 2022 09:06:02 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 73C3442BB7; Fri, 20 May 2022 09:03:59 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id 474C942BB7 for ; Fri, 20 May 2022 09:03:57 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030237; x=1684566237; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=nayuCYs73MpvIci/iJTsBqfQPH/oM40oPPfsr2bqZzc=; b=n+BV19Tr2crt/lD8YLxlk3JP01UR3Lr4gmAnqSqH0wLvnB+2KdPfL5Q0 EQEuEzGuynUhRmx1Tr19wl1ZZ3KYe7h7eOWrP6eXkp+8JABn0O9aECeZJ LK/27mcUKnDUasnY7qyieKqYIM9XA/cp4hjXIotfLDmMqEikTopwYSN8b 5y3jbKLo5RpT+TfoqGQe36Omi2SA6IrH/Dy4olV+FxIZx8XqkN+Wx5H1H MB4eeEYkxGo+BciFudumSHb88OlwURg5vWVCoiJdxKSTlNXL8OGp0Yn9M LFZd0sTMBNVZH+Pl6fFjk/sHJLL/QyQMB7esfRIQ6ANksLuc37AfRmuUn g==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140486" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140486" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:03:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058608" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:03:55 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 34/40] crypto/cnxk: reduce rsa struct to only necessary fields Date: Fri, 20 May 2022 06:54:39 +0100 Message-Id: <20220520055445.40063-35-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - reduced rsa struct to only necessary fields. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- drivers/crypto/cnxk/cnxk_ae.h | 36 ++++++++++++++++++------------------ 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_ae.h b/drivers/crypto/cnxk/cnxk_ae.h index 0562f72270..ea6964dd37 100644 --- a/drivers/crypto/cnxk/cnxk_ae.h +++ b/drivers/crypto/cnxk/cnxk_ae.h @@ -380,19 +380,19 @@ cnxk_ae_enqueue_rsa_op(struct rte_crypto_op *op, switch (rsa->op_type) { case RTE_CRYPTO_ASYM_OP_VERIFY: - cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->sign, + cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_ENCRYPT: - cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->message, + cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_SIGN: cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, - &rsa->message, inst); + &rsa->input, inst); break; case RTE_CRYPTO_ASYM_OP_DECRYPT: - cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->cipher, + cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input, inst); break; default: @@ -671,44 +671,44 @@ cnxk_ae_dequeue_rsa_op(struct rte_crypto_op *cop, uint8_t *rptr, switch (rsa->op_type) { case RTE_CRYPTO_ASYM_OP_ENCRYPT: - rsa->cipher.length = rsa_ctx->n.length; - memcpy(rsa->cipher.data, rptr, rsa->cipher.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); break; case RTE_CRYPTO_ASYM_OP_DECRYPT: if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) { - rsa->message.length = rsa_ctx->n.length; - memcpy(rsa->message.data, rptr, rsa->message.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); } else { /* Get length of decrypted output */ - rsa->message.length = + rsa->output.length = rte_cpu_to_be_16(*((uint16_t *)rptr)); /* * Offset output data pointer by length field * (2 bytes) and copy decrypted data. */ - memcpy(rsa->message.data, rptr + 2, - rsa->message.length); + memcpy(rsa->output.data, rptr + 2, + rsa->output.length); } break; case RTE_CRYPTO_ASYM_OP_SIGN: - rsa->sign.length = rsa_ctx->n.length; - memcpy(rsa->sign.data, rptr, rsa->sign.length); + rsa->input.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); break; case RTE_CRYPTO_ASYM_OP_VERIFY: if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) { - rsa->sign.length = rsa_ctx->n.length; - memcpy(rsa->sign.data, rptr, rsa->sign.length); + rsa->output.length = rsa_ctx->n.length; + memcpy(rsa->output.data, rptr, rsa->output.length); } else { /* Get length of signed output */ - rsa->sign.length = + rsa->output.length = rte_cpu_to_be_16(*((uint16_t *)rptr)); /* * Offset output data pointer by length field * (2 bytes) and copy signed data. */ - memcpy(rsa->sign.data, rptr + 2, rsa->sign.length); + memcpy(rsa->output.data, rptr + 2, rsa->output.length); } - if (memcmp(rsa->sign.data, rsa->message.data, + if (memcmp(rsa->output.data, rsa->message.data, rsa->message.length)) { cop->status = RTE_CRYPTO_OP_STATUS_ERROR; }