From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f48.google.com (mail-pg0-f48.google.com [74.125.83.48]) by dpdk.org (Postfix) with ESMTP id 6E4E82B9D for ; Wed, 9 Aug 2017 05:46:36 +0200 (CEST) Received: by mail-pg0-f48.google.com with SMTP id l64so22709705pge.5 for ; Tue, 08 Aug 2017 20:46:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fridaylinux-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=xKb1tvNQu61XG3xq3019NtWmVpcX4mPRI1ZPWb7G4C8=; b=EJ+v29XyvhBmPyJQLoaO5KJb6kqYrD3uuGqcwBYgrf7X3bcimDwDLo9f1G3gnMd4/N 93r19XzdsHLqFRCJJqqwbqfAwfjBCgOMgeFAMPb15QtXsoEBlbeRf4e4GCtlXbhlhIpR KsDo621caVKduyD6vVUPpBOUwy5n4ZwHIoWe5fzDthg3muf7OvwsPMrX3tU/GpVgTxDZ SCSJJ5WmHOwDKu4fh0Jo3NhQKomIWhW9e6FziqgSUGuI7UoV5ulOz6Se74N4w8wRivVQ NFWvVaxk6Hj5uIoV3xQMGJsZBBDf1qO9s2cL7ShjNqNuNXpyRedQ8BfR0um2h5Kr4lju 39RQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=xKb1tvNQu61XG3xq3019NtWmVpcX4mPRI1ZPWb7G4C8=; b=hTAC3FH+vpup7MVAtzSREoytqQahJh84foRMTVzVX4mZelDitsvTUmaKNDHa48d+ae hencI/JLT8J8ToFvtVhqVpft0r5HyzL5WyK7BuYxvLXwGothy/rf3JT1sJinU0Q38ofJ 9ZT0Z9NxXrWN5NdO6In/GFWY3pI28VL1SJRqH8tzC3tdryg1/z42HXAoBg1tv7BqlmkW 7/g6CIc9nUZ7D6o2HMPXsxai9EpXtVP6bh/eEW0haBIHydI/TGiWVntwVy8JUPKsh7pP ULLETZC6Ok1DRNrhn3z3lCDqXl/FpBN+QxhTEgibeG1Bg5e+ft7Due3LoOTO9UHHZ9Uu wtFQ== X-Gm-Message-State: AHYfb5hAVAHp5hbB9NVHixnVc+lwkkzbGB+IaCb8ON7KnlJRWPrHg5nl W7uLVKOyNBHAoDS2 X-Received: by 10.99.2.203 with SMTP id 194mr2928916pgc.22.1502250395334; Tue, 08 Aug 2017 20:46:35 -0700 (PDT) Received: from localhost.localdomain ([45.63.61.64]) by smtp.gmail.com with ESMTPSA id q3sm5093921pfl.89.2017.08.08.20.46.30 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 08 Aug 2017 20:46:34 -0700 (PDT) From: Yuanhan Liu To: Pablo de Lara Cc: Declan Doherty , dpdk stable , Yuanhan Liu Date: Wed, 9 Aug 2017 11:43:44 +0800 Message-Id: <1502250240-6599-2-git-send-email-yliu@fridaylinux.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1502250240-6599-1-git-send-email-yliu@fridaylinux.org> References: <1502250240-6599-1-git-send-email-yliu@fridaylinux.org> Subject: [dpdk-stable] patch 'crypto/openssl: fix HMAC supported key sizes' has been queued to LTS release 16.11.3 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Aug 2017 03:46:37 -0000 Hi, FYI, your patch has been queued to LTS release 16.11.3 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 08/11/17. So please shout if anyone has objections. Thanks. --yliu --- >>From d53f5aaec755a0a957addc482ad1bc72a84664b0 Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Tue, 25 Jul 2017 06:24:56 +0100 Subject: [PATCH] crypto/openssl: fix HMAC supported key sizes [ upstream commit e5e7bc712601f8eefe15997cc46265cdc0ace0ce ] For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported key sizes are not a fixed value, but a range between 1 and the block size. Fixes: d61f70b4c918 ("crypto/libcrypto: add driver for OpenSSL library") Signed-off-by: Pablo de Lara Acked-by: Declan Doherty --- drivers/crypto/openssl/rte_openssl_pmd_ops.c | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c b/drivers/crypto/openssl/rte_openssl_pmd_ops.c index 139fed1..a072e6e 100644 --- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c +++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c @@ -48,9 +48,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_MD5_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 16, @@ -90,9 +90,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA1_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 20, @@ -132,9 +132,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA224_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 28, @@ -174,9 +174,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA256_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 32, @@ -216,9 +216,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA384_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 48, @@ -258,9 +258,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA512_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 64, -- 2.7.4