From patchwork Fri Feb 8 08:19:05 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arkadiusz Kusztal X-Patchwork-Id: 50252 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 905461B7D9; Fri, 8 Feb 2019 09:19:58 +0100 (CET) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by dpdk.org (Postfix) with ESMTP id 60EEA1B7C4 for ; Fri, 8 Feb 2019 09:19:57 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Feb 2019 00:19:56 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,347,1544515200"; d="scan'208";a="145183451" Received: from akusztax-mobl.ger.corp.intel.com ([10.104.14.178]) by fmsmga001.fm.intel.com with ESMTP; 08 Feb 2019 00:19:55 -0800 From: Arek Kusztal To: dev@dpdk.org Cc: akhil.goyal@nxp.com, fiona.trahe@intel.com, shally.verma@caviumnetworks.com, Arek Kusztal Date: Fri, 8 Feb 2019 09:19:05 +0100 Message-Id: <20190208081907.3248-2-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.19.1.windows.1 In-Reply-To: <20190208081907.3248-1-arkadiuszx.kusztal@intel.com> References: <20190208081907.3248-1-arkadiuszx.kusztal@intel.com> MIME-Version: 1.0 Subject: [dpdk-dev] [PATCH 1/3] cryptodev: add result field to mod exp and inverse operations X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This commit adds result field to be used when modular exponentiation or modular multiplicative inverse operation is used This patch depends on "cryptodev: rework mod exp and mod inv comments" (http://patchwork.dpdk.org/patch/50132/) Signed-off-by: Arek Kusztal --- lib/librte_cryptodev/rte_crypto_asym.h | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/lib/librte_cryptodev/rte_crypto_asym.h b/lib/librte_cryptodev/rte_crypto_asym.h index 0a50cd5..f5375bd 100644 --- a/lib/librte_cryptodev/rte_crypto_asym.h +++ b/lib/librte_cryptodev/rte_crypto_asym.h @@ -339,6 +339,16 @@ struct rte_crypto_mod_op_param { * be relatively prime to modulus in corresponding Modular * Multiplicative Inverse rte_crypto_modinv_xform */ + + rte_crypto_param result; + /**< + * Pointer to the result of modular exponentiation/multiplicative inverse + * data in octet-string network byte order format. + * + * This field shall be big enough to hold the result of Modular + * Exponentiation or Modular Multplicative Inverse + * (bigger or equal to length of modulus) + */ }; /**