@@ -380,19 +380,19 @@ cnxk_ae_enqueue_rsa_op(struct rte_crypto_op *op,
switch (rsa->op_type) {
case RTE_CRYPTO_ASYM_OP_VERIFY:
- cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->sign,
+ cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input,
inst);
break;
case RTE_CRYPTO_ASYM_OP_ENCRYPT:
- cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->message,
+ cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input,
inst);
break;
case RTE_CRYPTO_ASYM_OP_SIGN:
cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx,
- &rsa->message, inst);
+ &rsa->input, inst);
break;
case RTE_CRYPTO_ASYM_OP_DECRYPT:
- cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->cipher,
+ cnxk_ae_rsa_crt_prep(op, meta_buf, &sess->rsa_ctx, &rsa->input,
inst);
break;
default:
@@ -671,44 +671,44 @@ cnxk_ae_dequeue_rsa_op(struct rte_crypto_op *cop, uint8_t *rptr,
switch (rsa->op_type) {
case RTE_CRYPTO_ASYM_OP_ENCRYPT:
- rsa->cipher.length = rsa_ctx->n.length;
- memcpy(rsa->cipher.data, rptr, rsa->cipher.length);
+ rsa->output.length = rsa_ctx->n.length;
+ memcpy(rsa->output.data, rptr, rsa->output.length);
break;
case RTE_CRYPTO_ASYM_OP_DECRYPT:
if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {
- rsa->message.length = rsa_ctx->n.length;
- memcpy(rsa->message.data, rptr, rsa->message.length);
+ rsa->output.length = rsa_ctx->n.length;
+ memcpy(rsa->output.data, rptr, rsa->output.length);
} else {
/* Get length of decrypted output */
- rsa->message.length =
+ rsa->output.length =
rte_cpu_to_be_16(*((uint16_t *)rptr));
/*
* Offset output data pointer by length field
* (2 bytes) and copy decrypted data.
*/
- memcpy(rsa->message.data, rptr + 2,
- rsa->message.length);
+ memcpy(rsa->output.data, rptr + 2,
+ rsa->output.length);
}
break;
case RTE_CRYPTO_ASYM_OP_SIGN:
- rsa->sign.length = rsa_ctx->n.length;
- memcpy(rsa->sign.data, rptr, rsa->sign.length);
+ rsa->input.length = rsa_ctx->n.length;
+ memcpy(rsa->output.data, rptr, rsa->output.length);
break;
case RTE_CRYPTO_ASYM_OP_VERIFY:
if (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {
- rsa->sign.length = rsa_ctx->n.length;
- memcpy(rsa->sign.data, rptr, rsa->sign.length);
+ rsa->output.length = rsa_ctx->n.length;
+ memcpy(rsa->output.data, rptr, rsa->output.length);
} else {
/* Get length of signed output */
- rsa->sign.length =
+ rsa->output.length =
rte_cpu_to_be_16(*((uint16_t *)rptr));
/*
* Offset output data pointer by length field
* (2 bytes) and copy signed data.
*/
- memcpy(rsa->sign.data, rptr + 2, rsa->sign.length);
+ memcpy(rsa->output.data, rptr + 2, rsa->output.length);
}
- if (memcmp(rsa->sign.data, rsa->message.data,
+ if (memcmp(rsa->output.data, rsa->message.data,
rsa->message.length)) {
cop->status = RTE_CRYPTO_OP_STATUS_ERROR;
}