get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/111835/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 111835,
    "url": "http://patches.dpdk.org/api/patches/111835/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20220525155324.9288-12-arkadiuszx.kusztal@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220525155324.9288-12-arkadiuszx.kusztal@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220525155324.9288-12-arkadiuszx.kusztal@intel.com",
    "date": "2022-05-25T15:53:21",
    "name": "[v2,11/14] cryptodev: move RSA padding into separate struct",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "9669b665b310bb61b6b82874d60ea27bed46c640",
    "submitter": {
        "id": 452,
        "url": "http://patches.dpdk.org/api/people/452/?format=api",
        "name": "Arkadiusz Kusztal",
        "email": "arkadiuszx.kusztal@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20220525155324.9288-12-arkadiuszx.kusztal@intel.com/mbox/",
    "series": [
        {
            "id": 23159,
            "url": "http://patches.dpdk.org/api/series/23159/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=23159",
            "date": "2022-05-25T15:53:10",
            "name": "cryptodev: rsa, dh, ecdh changes",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/23159/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/111835/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/111835/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 3A7D0A0555;\n\tWed, 25 May 2022 19:04:45 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 5A3DE4067B;\n\tWed, 25 May 2022 19:04:43 +0200 (CEST)",
            "from mga09.intel.com (mga09.intel.com [134.134.136.24])\n by mails.dpdk.org (Postfix) with ESMTP id 2B23540143\n for <dev@dpdk.org>; Wed, 25 May 2022 19:04:40 +0200 (CEST)",
            "from fmsmga003.fm.intel.com ([10.253.24.29])\n by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 25 May 2022 10:01:28 -0700",
            "from silpixa00399302.ir.intel.com ([10.237.214.136])\n by FMSMGA003.fm.intel.com with ESMTP; 25 May 2022 10:01:27 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1653498281; x=1685034281;\n h=from:to:cc:subject:date:message-id:in-reply-to: references;\n bh=1BrXpXWqaB4hWa/2ISNGOHUl48hTlAXLgfRq51t/bS8=;\n b=DZvFfg+CjJSpgUfkgpKaSpoPNmbYv+XdQzrWZK2p/WLHVRjs1oDFpp64\n OIN4P5r05qiUjo+93AjMWvgGoZrvG7x1iRpOBu8WxfH0OSFvFjKLVQXh7\n GY4gmsu/AxWk2tq6ivHn6gJTW8zVdbNVGg9SsaqdLta78FxKTdoEwZV0c\n i3sgklwhovj5CbcUPxVAZvtk9ZoZgwdNRXYt6YYY3RH+0q945hha/BpTr\n ZLUoaZPoU5ENt16mGTf23fLT26GtS+FxzZ1Lbjtz6yGFBFwjhmS5wJxUj\n P4bKs8DwIFW54dTIcghHl8rMqSsf/HbvA4GNg6sP9cNBSgdpwFtNVJu+J Q==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6400,9594,10358\"; a=\"273596542\"",
            "E=Sophos;i=\"5.91,250,1647327600\"; d=\"scan'208\";a=\"273596542\"",
            "E=Sophos;i=\"5.91,250,1647327600\"; d=\"scan'208\";a=\"664502415\""
        ],
        "X-ExtLoop1": "1",
        "From": "Arek Kusztal <arkadiuszx.kusztal@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "gakhil@marvell.com, roy.fan.zhang@intel.com,\n Arek Kusztal <arkadiuszx.kusztal@intel.com>",
        "Subject": "[PATCH v2 11/14] cryptodev: move RSA padding into separate struct",
        "Date": "Wed, 25 May 2022 16:53:21 +0100",
        "Message-Id": "<20220525155324.9288-12-arkadiuszx.kusztal@intel.com>",
        "X-Mailer": "git-send-email 2.13.6",
        "In-Reply-To": "<20220525155324.9288-1-arkadiuszx.kusztal@intel.com>",
        "References": "<20220525155324.9288-1-arkadiuszx.kusztal@intel.com>",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "- move RSA padding into separate struct.\nMore padding members should be added into padding,\ntherefore having separate struct for padding parameters will\nmake this more readable.\n\nSigned-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>\n---\n app/test/test_cryptodev_asym.c              | 10 ++--\n drivers/common/cpt/cpt_ucode_asym.h         |  4 +-\n drivers/crypto/cnxk/cnxk_ae.h               |  8 +--\n drivers/crypto/octeontx/otx_cryptodev_ops.c |  4 +-\n drivers/crypto/openssl/rte_openssl_pmd.c    |  2 +-\n drivers/crypto/qat/qat_asym.c               | 12 ++---\n lib/cryptodev/rte_crypto_asym.h             | 76 ++++++++++++++++-------------\n 7 files changed, 61 insertions(+), 55 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c\nindex a151051165..072dbb30f4 100644\n--- a/app/test/test_cryptodev_asym.c\n+++ b/app/test/test_cryptodev_asym.c\n@@ -94,7 +94,7 @@ queue_ops_rsa_sign_verify(void *sess)\n \tasym_op->rsa.message.length = rsaplaintext.len;\n \tasym_op->rsa.sign.length = 0;\n \tasym_op->rsa.sign.data = output_buf;\n-\tasym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n+\tasym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n \n \tdebug_hexdump(stdout, \"message\", asym_op->rsa.message.data,\n \t\t      asym_op->rsa.message.length);\n@@ -126,7 +126,7 @@ queue_ops_rsa_sign_verify(void *sess)\n \n \t/* Verify sign */\n \tasym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;\n-\tasym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n+\tasym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n \n \t/* Process crypto operation */\n \tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n@@ -185,7 +185,7 @@ queue_ops_rsa_enc_dec(void *sess)\n \tasym_op->rsa.cipher.data = cipher_buf;\n \tasym_op->rsa.cipher.length = 0;\n \tasym_op->rsa.message.length = rsaplaintext.len;\n-\tasym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n+\tasym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n \n \tdebug_hexdump(stdout, \"message\", asym_op->rsa.message.data,\n \t\t      asym_op->rsa.message.length);\n@@ -217,7 +217,7 @@ queue_ops_rsa_enc_dec(void *sess)\n \tasym_op = result_op->asym;\n \tasym_op->rsa.message.length = 0;\n \tasym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT;\n-\tasym_op->rsa.pad = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n+\tasym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5;\n \n \t/* Process crypto operation */\n \tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n@@ -413,7 +413,7 @@ test_cryptodev_asym_op(struct crypto_testsuite_params_asym *ts_params,\n \t\t}\n \n \t\txform_tc.rsa.key_type = key_type;\n-\t\top->asym->rsa.pad = data_tc->rsa_data.padding;\n+\t\top->asym->rsa.padding.type = data_tc->rsa_data.padding;\n \n \t\tif (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {\n \t\t\tasym_op->rsa.message.data = data_tc->rsa_data.pt.data;\ndiff --git a/drivers/common/cpt/cpt_ucode_asym.h b/drivers/common/cpt/cpt_ucode_asym.h\nindex f5d91f2583..1105a0c125 100644\n--- a/drivers/common/cpt/cpt_ucode_asym.h\n+++ b/drivers/common/cpt/cpt_ucode_asym.h\n@@ -327,7 +327,7 @@ cpt_rsa_prep(struct asym_op_params *rsa_params,\n \t/* Result buffer */\n \trlen = mod_len;\n \n-\tif (rsa_op.pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\tif (rsa_op.padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t/* Use mod_exp operation for no_padding type */\n \t\tvq_cmd_w0.s.opcode.minor = CPT_MINOR_OP_MODEX;\n \t\tvq_cmd_w0.s.param2 = exp_len;\n@@ -412,7 +412,7 @@ cpt_rsa_crt_prep(struct asym_op_params *rsa_params,\n \t/* Result buffer */\n \trlen = mod_len;\n \n-\tif (rsa_op.pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\tif (rsa_op.padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t/*Use mod_exp operation for no_padding type */\n \t\tvq_cmd_w0.s.opcode.minor = CPT_MINOR_OP_MODEX_CRT;\n \t} else {\ndiff --git a/drivers/crypto/cnxk/cnxk_ae.h b/drivers/crypto/cnxk/cnxk_ae.h\nindex 10854c79c8..0562f72270 100644\n--- a/drivers/crypto/cnxk/cnxk_ae.h\n+++ b/drivers/crypto/cnxk/cnxk_ae.h\n@@ -288,7 +288,7 @@ cnxk_ae_rsa_prep(struct rte_crypto_op *op, struct roc_ae_buf_ptr *meta_buf,\n \tdptr += in_size;\n \tdlen = total_key_len + in_size;\n \n-\tif (rsa_op.pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\tif (rsa_op.padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t/* Use mod_exp operation for no_padding type */\n \t\tw4.s.opcode_minor = ROC_AE_MINOR_OP_MODEX;\n \t\tw4.s.param2 = exp_len;\n@@ -347,7 +347,7 @@ cnxk_ae_rsa_crt_prep(struct rte_crypto_op *op, struct roc_ae_buf_ptr *meta_buf,\n \tdptr += in_size;\n \tdlen = total_key_len + in_size;\n \n-\tif (rsa_op.pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\tif (rsa_op.padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t/*Use mod_exp operation for no_padding type */\n \t\tw4.s.opcode_minor = ROC_AE_MINOR_OP_MODEX_CRT;\n \t} else {\n@@ -675,7 +675,7 @@ cnxk_ae_dequeue_rsa_op(struct rte_crypto_op *cop, uint8_t *rptr,\n \t\tmemcpy(rsa->cipher.data, rptr, rsa->cipher.length);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_OP_DECRYPT:\n-\t\tif (rsa->pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\t\tif (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t\trsa->message.length = rsa_ctx->n.length;\n \t\t\tmemcpy(rsa->message.data, rptr, rsa->message.length);\n \t\t} else {\n@@ -695,7 +695,7 @@ cnxk_ae_dequeue_rsa_op(struct rte_crypto_op *cop, uint8_t *rptr,\n \t\tmemcpy(rsa->sign.data, rptr, rsa->sign.length);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_OP_VERIFY:\n-\t\tif (rsa->pad == RTE_CRYPTO_RSA_PADDING_NONE) {\n+\t\tif (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE) {\n \t\t\trsa->sign.length = rsa_ctx->n.length;\n \t\t\tmemcpy(rsa->sign.data, rptr, rsa->sign.length);\n \t\t} else {\ndiff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.c b/drivers/crypto/octeontx/otx_cryptodev_ops.c\nindex d5851d9987..914b17decf 100644\n--- a/drivers/crypto/octeontx/otx_cryptodev_ops.c\n+++ b/drivers/crypto/octeontx/otx_cryptodev_ops.c\n@@ -736,7 +736,7 @@ otx_cpt_asym_rsa_op(struct rte_crypto_op *cop, struct cpt_request_info *req,\n \t\tmemcpy(rsa->cipher.data, req->rptr, rsa->cipher.length);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_OP_DECRYPT:\n-\t\tif (rsa->pad == RTE_CRYPTO_RSA_PADDING_NONE)\n+\t\tif (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE)\n \t\t\trsa->message.length = rsa_ctx->n.length;\n \t\telse {\n \t\t\t/* Get length of decrypted output */\n@@ -753,7 +753,7 @@ otx_cpt_asym_rsa_op(struct rte_crypto_op *cop, struct cpt_request_info *req,\n \t\tmemcpy(rsa->sign.data, req->rptr, rsa->sign.length);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_OP_VERIFY:\n-\t\tif (rsa->pad == RTE_CRYPTO_RSA_PADDING_NONE)\n+\t\tif (rsa->padding.type == RTE_CRYPTO_RSA_PADDING_NONE)\n \t\t\trsa->sign.length = rsa_ctx->n.length;\n \t\telse {\n \t\t\t/* Get length of decrypted output */\ndiff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers/crypto/openssl/rte_openssl_pmd.c\nindex 4e11770864..0aa988d167 100644\n--- a/drivers/crypto/openssl/rte_openssl_pmd.c\n+++ b/drivers/crypto/openssl/rte_openssl_pmd.c\n@@ -1894,7 +1894,7 @@ process_openssl_rsa_op(struct rte_crypto_op *cop,\n \tint ret = 0;\n \tstruct rte_crypto_asym_op *op = cop->asym;\n \tRSA *rsa = sess->u.r.rsa;\n-\tuint32_t pad = (op->rsa.pad);\n+\tuint32_t pad = (op->rsa.padding.type);\n \tuint8_t *tmp;\n \n \tcop->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\ndiff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c\nindex 479d5308cf..5dd355d007 100644\n--- a/drivers/crypto/qat/qat_asym.c\n+++ b/drivers/crypto/qat/qat_asym.c\n@@ -345,7 +345,7 @@ rsa_set_pub_input(struct rte_crypto_asym_op *asym_op,\n \talg_bytesize = qat_function.bytesize;\n \n \tif (asym_op->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) {\n-\t\tswitch (asym_op->rsa.pad) {\n+\t\tswitch (asym_op->rsa.padding.type) {\n \t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\tSET_PKE_LN(cookie->input_array, asym_op->rsa.message,\n \t\t\t\t\talg_bytesize, 0);\n@@ -358,7 +358,7 @@ rsa_set_pub_input(struct rte_crypto_asym_op *asym_op,\n \t\t}\n \t\tHEXDUMP(\"RSA Message\", cookie->input_array[0], alg_bytesize);\n \t} else {\n-\t\tswitch (asym_op->rsa.pad) {\n+\t\tswitch (asym_op->rsa.padding.type) {\n \t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\tSET_PKE_LN(cookie->input_array, asym_op->rsa.sign,\n \t\t\t\t\talg_bytesize, 0);\n@@ -454,7 +454,7 @@ rsa_set_priv_input(struct rte_crypto_asym_op *asym_op,\n \n \tif (asym_op->rsa.op_type ==\n \t\t\tRTE_CRYPTO_ASYM_OP_DECRYPT) {\n-\t\tswitch (asym_op->rsa.pad) {\n+\t\tswitch (asym_op->rsa.padding.type) {\n \t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\tSET_PKE_LN(cookie->input_array, asym_op->rsa.cipher,\n \t\t\t\talg_bytesize, 0);\n@@ -469,7 +469,7 @@ rsa_set_priv_input(struct rte_crypto_asym_op *asym_op,\n \n \t} else if (asym_op->rsa.op_type ==\n \t\t\tRTE_CRYPTO_ASYM_OP_SIGN) {\n-\t\tswitch (asym_op->rsa.pad) {\n+\t\tswitch (asym_op->rsa.padding.type) {\n \t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\tSET_PKE_LN(cookie->input_array, asym_op->rsa.message,\n \t\t\t\talg_bytesize, 0);\n@@ -529,7 +529,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op,\n \t\t} else {\n \t\t\tuint8_t *rsa_result = asym_op->rsa.cipher.data;\n \n-\t\t\tswitch (asym_op->rsa.pad) {\n+\t\t\tswitch (asym_op->rsa.padding.type) {\n \t\t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\t\trte_memcpy(rsa_result,\n \t\t\t\t\t\tcookie->output_array[0],\n@@ -547,7 +547,7 @@ rsa_collect(struct rte_crypto_asym_op *asym_op,\n \t\tif (asym_op->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) {\n \t\t\tuint8_t *rsa_result = asym_op->rsa.message.data;\n \n-\t\t\tswitch (asym_op->rsa.pad) {\n+\t\t\tswitch (asym_op->rsa.padding.type) {\n \t\t\tcase RTE_CRYPTO_RSA_PADDING_NONE:\n \t\t\t\trte_memcpy(rsa_result,\n \t\t\t\t\tcookie->output_array[0],\ndiff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_asym.h\nindex 1758aaa875..ee0988d3cf 100644\n--- a/lib/cryptodev/rte_crypto_asym.h\n+++ b/lib/cryptodev/rte_crypto_asym.h\n@@ -212,6 +212,45 @@ struct rte_crypto_rsa_priv_key_qt {\n };\n \n /**\n+ * RSA padding type\n+ */\n+struct rte_crypto_rsa_padding {\n+\tenum rte_crypto_rsa_padding_type type;\n+\t/**< RSA padding scheme to be used for transform */\n+\tenum rte_crypto_auth_algorithm md;\n+\t/**<\n+\t * RSA padding hash function\n+\t *\n+\t * When a specific padding type is selected, the following rule apply:\n+\t * - RTE_CRYPTO_RSA_PADDING_NONE:\n+\t * This field is ignored by the PMD\n+\t *\n+\t * - RTE_CRYPTO_RSA_PADDING_PKCS1_5:\n+\t * When signing operation this field is used to determine value\n+\t * of the DigestInfo structure, therefore specifying which algorithm\n+\t * was used to create the message digest.\n+\t * When doing encryption/decryption this field is ignored for this\n+\t * padding type.\n+\t *\n+\t * - RTE_CRYPTO_RSA_PADDING_OAEP\n+\t * This field shall be set with the hash algorithm used\n+\t * in the padding scheme\n+\t *\n+\t * - RTE_CRYPTO_RSA_PADDING_PSS\n+\t * This field shall be set with the hash algorithm used\n+\t * in the padding scheme (and to create the input message digest)\n+\t */\n+\tenum rte_crypto_auth_algorithm mgf1md;\n+\t/**<\n+\t * Hash algorithm to be used for mask generation if\n+\t * padding scheme is either OAEP or PSS. If padding\n+\t * scheme is unspecified data hash algorithm is used\n+\t * for mask generation. Valid hash algorithms are:\n+\t * MD5, SHA1, SHA224, SHA256, SHA384, SHA512\n+\t */\n+};\n+\n+/**\n  * Asymmetric RSA transform data\n  *\n  * Structure describing RSA xform params\n@@ -367,41 +406,8 @@ struct rte_crypto_rsa_op_param {\n \t * All data is in Octet-string network byte order format.\n \t */\n \n-\tenum rte_crypto_rsa_padding_type pad;\n-\t/**< RSA padding scheme to be used for transform */\n-\n-\tenum rte_crypto_auth_algorithm md;\n-\t/**<\n-\t * RSA padding hash function\n-\t *\n-\t * When a specific padding type is selected, the following rule apply:\n-\t * - RTE_CRYPTO_RSA_PADDING_NONE:\n-\t * This field is ignored by the PMD\n-\t *\n-\t * - RTE_CRYPTO_RSA_PADDING_PKCS1_5:\n-\t * When signing operation this field is used to determine value\n-\t * of the DigestInfo structure, therefore specifying which algorithm\n-\t * was used to create the message digest.\n-\t * When doing encryption/decryption this field is ignored for this\n-\t * padding type.\n-\t *\n-\t * - RTE_CRYPTO_RSA_PADDING_OAEP\n-\t * This field shall be set with the hash algorithm used\n-\t * in the padding scheme\n-\t *\n-\t * - RTE_CRYPTO_RSA_PADDING_PSS\n-\t * This field shall be set with the hash algorithm used\n-\t * in the padding scheme (and to create the input message digest)\n-\t */\n-\n-\tenum rte_crypto_auth_algorithm mgf1md;\n-\t/**<\n-\t * Hash algorithm to be used for mask generation if\n-\t * padding scheme is either OAEP or PSS. If padding\n-\t * scheme is unspecified data hash algorithm is used\n-\t * for mask generation. Valid hash algorithms are:\n-\t * MD5, SHA1, SHA224, SHA256, SHA384, SHA512\n-\t */\n+\tstruct rte_crypto_rsa_padding padding;\n+\t/**< RSA padding information */\n };\n \n /**\n",
    "prefixes": [
        "v2",
        "11/14"
    ]
}