From: Didier Pallard <didier.pallard@6wind.com>
To: dev@dpdk.org
Cc: stable@dpdk.org, Kai Ji <kai.ji@intel.com>,
Daniel Mrzyglod <danielx.t.mrzyglod@intel.com>,
Tomasz Kulasek <tomaszx.kulasek@intel.com>,
Michal Kobylinski <michalx.kobylinski@intel.com>,
Pablo de Lara <pablo.de.lara.guarch@intel.com>,
Slawomir Mrozowicz <slawomirx.mrozowicz@intel.com>
Subject: [PATCH] crypto/openssl: do not build useless workaround
Date: Tue, 18 Apr 2023 16:56:19 +0200 [thread overview]
Message-ID: <20230418145619.2648068-1-didier.pallard@6wind.com> (raw)
This workaround was needed before version 1.0.1f. Do not build it for
versions >= 1.1.
Fixes: d61f70b4c918 ("crypto/libcrypto: add driver for OpenSSL library")
Signed-off-by: Didier Pallard <didier.pallard@6wind.com>
Cc: stable@dpdk.org
---
drivers/crypto/openssl/rte_openssl_pmd.c | 14 ++++++++++++--
1 file changed, 12 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers/crypto/openssl/rte_openssl_pmd.c
index e00db0facba5..a11885df8255 100644
--- a/drivers/crypto/openssl/rte_openssl_pmd.c
+++ b/drivers/crypto/openssl/rte_openssl_pmd.c
@@ -1195,8 +1195,11 @@ process_openssl_auth_encryption_gcm(struct rte_mbuf *mbuf_src, int offset,
int srclen, uint8_t *aad, int aadlen, uint8_t *iv,
uint8_t *dst, uint8_t *tag, EVP_CIPHER_CTX *ctx)
{
- int len = 0, unused = 0;
+ int len = 0;
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ int unused = 0;
uint8_t empty[] = {};
+#endif
if (EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, iv) <= 0)
goto process_auth_encryption_gcm_err;
@@ -1210,9 +1213,11 @@ process_openssl_auth_encryption_gcm(struct rte_mbuf *mbuf_src, int offset,
srclen, ctx, 0))
goto process_auth_encryption_gcm_err;
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
/* Workaround open ssl bug in version less then 1.0.1f */
if (EVP_EncryptUpdate(ctx, empty, &unused, empty, 0) <= 0)
goto process_auth_encryption_gcm_err;
+#endif
if (EVP_EncryptFinal_ex(ctx, dst, &len) <= 0)
goto process_auth_encryption_gcm_err;
@@ -1274,8 +1279,11 @@ process_openssl_auth_decryption_gcm(struct rte_mbuf *mbuf_src, int offset,
int srclen, uint8_t *aad, int aadlen, uint8_t *iv,
uint8_t *dst, uint8_t *tag, EVP_CIPHER_CTX *ctx)
{
- int len = 0, unused = 0;
+ int len = 0;
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
+ int unused = 0;
uint8_t empty[] = {};
+#endif
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, 16, tag) <= 0)
goto process_auth_decryption_gcm_err;
@@ -1292,9 +1300,11 @@ process_openssl_auth_decryption_gcm(struct rte_mbuf *mbuf_src, int offset,
srclen, ctx, 0))
goto process_auth_decryption_gcm_err;
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
/* Workaround open ssl bug in version less then 1.0.1f */
if (EVP_DecryptUpdate(ctx, empty, &unused, empty, 0) <= 0)
goto process_auth_decryption_gcm_err;
+#endif
if (EVP_DecryptFinal_ex(ctx, dst, &len) <= 0)
return -EFAULT;
--
2.30.2
next reply other threads:[~2023-04-18 14:56 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-04-18 14:56 Didier Pallard [this message]
2023-06-20 9:29 ` Ji, Kai
2023-06-20 11:00 ` Akhil Goyal
2023-06-25 19:22 ` Thomas Monjalon
2023-06-26 9:13 ` Didier Pallard
2023-06-26 10:04 ` Thomas Monjalon
2023-06-26 10:39 ` Didier Pallard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230418145619.2648068-1-didier.pallard@6wind.com \
--to=didier.pallard@6wind.com \
--cc=danielx.t.mrzyglod@intel.com \
--cc=dev@dpdk.org \
--cc=kai.ji@intel.com \
--cc=michalx.kobylinski@intel.com \
--cc=pablo.de.lara.guarch@intel.com \
--cc=slawomirx.mrozowicz@intel.com \
--cc=stable@dpdk.org \
--cc=tomaszx.kulasek@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).