@@ -81,7 +81,6 @@ queue_ops_rsa_sign_verify(void *sess)
8181 asym_op -> rsa .message .length = rsaplaintext .len ;
8282 asym_op -> rsa .sign .length = RTE_DIM (rsa_n );
8383 asym_op -> rsa .sign .data = output_buf ;
84- asym_op -> rsa .padding .type = RTE_CRYPTO_RSA_PADDING_PKCS1_5 ;
8584
8685 debug_hexdump (stdout , "message" , asym_op -> rsa .message .data ,
8786 asym_op -> rsa .message .length );
@@ -113,7 +112,6 @@ queue_ops_rsa_sign_verify(void *sess)
113112
114113 /* Verify sign */
115114 asym_op -> rsa .op_type = RTE_CRYPTO_ASYM_OP_VERIFY ;
116- asym_op -> rsa .padding .type = RTE_CRYPTO_RSA_PADDING_PKCS1_5 ;
117115
118116 /* Process crypto operation */
119117 if (rte_cryptodev_enqueue_burst (dev_id , 0 , & op , 1 ) != 1 ) {
@@ -172,7 +170,6 @@ queue_ops_rsa_enc_dec(void *sess)
172170 asym_op -> rsa .cipher .data = cipher_buf ;
173171 asym_op -> rsa .cipher .length = RTE_DIM (rsa_n );
174172 asym_op -> rsa .message .length = rsaplaintext .len ;
175- asym_op -> rsa .padding .type = RTE_CRYPTO_RSA_PADDING_PKCS1_5 ;
176173
177174 debug_hexdump (stdout , "message" , asym_op -> rsa .message .data ,
178175 asym_op -> rsa .message .length );
@@ -204,7 +201,6 @@ queue_ops_rsa_enc_dec(void *sess)
204201 asym_op = result_op -> asym ;
205202 asym_op -> rsa .message .length = RTE_DIM (rsa_n );
206203 asym_op -> rsa .op_type = RTE_CRYPTO_ASYM_OP_DECRYPT ;
207- asym_op -> rsa .padding .type = RTE_CRYPTO_RSA_PADDING_PKCS1_5 ;
208204
209205 /* Process crypto operation */
210206 if (rte_cryptodev_enqueue_burst (dev_id , 0 , & op , 1 ) != 1 ) {
@@ -3650,7 +3646,6 @@ rsa_encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf)
36503646 self -> op -> asym -> rsa .cipher .data = cipher_buf ;
36513647 self -> op -> asym -> rsa .cipher .length = 0 ;
36523648 SET_RSA_PARAM (self -> op -> asym -> rsa , vector , message );
3653- self -> op -> asym -> rsa .padding .type = vector -> padding ;
36543649
36553650 rte_crypto_op_attach_asym_session (self -> op , self -> sess );
36563651 TEST_ASSERT_SUCCESS (send_one (),
@@ -3674,7 +3669,6 @@ rsa_decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext,
36743669 self -> op -> asym -> rsa .message .data = plaintext ;
36753670 self -> op -> asym -> rsa .message .length = 0 ;
36763671 self -> op -> asym -> rsa .op_type = RTE_CRYPTO_ASYM_OP_DECRYPT ;
3677- self -> op -> asym -> rsa .padding .type = vector -> padding ;
36783672 rte_crypto_op_attach_asym_session (self -> op , self -> sess );
36793673 TEST_ASSERT_SUCCESS (send_one (),
36803674 "Failed to process crypto op (Decryption)" );
@@ -3716,6 +3710,7 @@ kat_rsa_encrypt(const void *data)
37163710 SET_RSA_PARAM (xform .rsa , vector , n );
37173711 SET_RSA_PARAM (xform .rsa , vector , e );
37183712 SET_RSA_PARAM (xform .rsa , vector , d );
3713+ xform .rsa .padding .type = vector -> padding ;
37193714 xform .rsa .key_type = RTE_RSA_KEY_TYPE_EXP ;
37203715 int ret = rsa_init_session (& xform );
37213716
@@ -3746,6 +3741,7 @@ kat_rsa_encrypt_crt(const void *data)
37463741 SET_RSA_PARAM_QT (xform .rsa , vector , dP );
37473742 SET_RSA_PARAM_QT (xform .rsa , vector , dQ );
37483743 SET_RSA_PARAM_QT (xform .rsa , vector , qInv );
3744+ xform .rsa .padding .type = vector -> padding ;
37493745 xform .rsa .key_type = RTE_RSA_KEY_TYPE_QT ;
37503746 int ret = rsa_init_session (& xform );
37513747 if (ret ) {
@@ -3771,6 +3767,7 @@ kat_rsa_decrypt(const void *data)
37713767 SET_RSA_PARAM (xform .rsa , vector , n );
37723768 SET_RSA_PARAM (xform .rsa , vector , e );
37733769 SET_RSA_PARAM (xform .rsa , vector , d );
3770+ xform .rsa .padding .type = vector -> padding ;
37743771 xform .rsa .key_type = RTE_RSA_KEY_TYPE_EXP ;
37753772 int ret = rsa_init_session (& xform );
37763773
@@ -3801,6 +3798,7 @@ kat_rsa_decrypt_crt(const void *data)
38013798 SET_RSA_PARAM_QT (xform .rsa , vector , dP );
38023799 SET_RSA_PARAM_QT (xform .rsa , vector , dQ );
38033800 SET_RSA_PARAM_QT (xform .rsa , vector , qInv );
3801+ xform .rsa .padding .type = vector -> padding ;
38043802 xform .rsa .key_type = RTE_RSA_KEY_TYPE_QT ;
38053803 int ret = rsa_init_session (& xform );
38063804 if (ret ) {
0 commit comments