From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f49.google.com (mail-pg0-f49.google.com [74.125.83.49]) by dpdk.org (Postfix) with ESMTP id 6744D7D9E for ; Mon, 21 Aug 2017 11:35:41 +0200 (CEST) Received: by mail-pg0-f49.google.com with SMTP id m133so14720863pga.5 for ; Mon, 21 Aug 2017 02:35:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fridaylinux-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=5ebORCZC6EUgjaCjoW/QKMle7vCwZl/8Z/FZh3QI99Y=; b=owbQIND32tx857GalwtpS2Mq8uC7Y+YU+GokEMgsDCdzoSc6cqSPkFC1TzOVog6T6c nYvaFYf2GJ2kPE3AifzCw/tZ5sJ9dFNn6hlEVNz+QVRo2oNswEW2EXyTFvxN4SccAzcU qXdbGOyWJlyr0KoUXT6W2Vzqedu2VxuMiBGfFNk5xNg+Fvf53bIvzx0ql5otv5fSi/fS Kx/UIuTwKGxzF15i0qv6tltSIfeRQbUagQ8daUEFU9vGZx2e2JjecMs/tqRUP5+o69pH yM1zADFC0Jh7iBhLxrbDch1Ab/yT2COCJoSacBtNYjLJT1auOw0EsUKDE2B6VJC9Dsio uNIQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=5ebORCZC6EUgjaCjoW/QKMle7vCwZl/8Z/FZh3QI99Y=; b=RrB9s5OcQnc+X9eA9l0GHhdnACcttKH7JwE0grAxOPEqZ09jRh6Qz0j+LZkzQZ+F+2 N6Duy1g6ByY6bE2U/InvEb7iEymRza8mL4c8f/HDvXBpaKVyx3a5TJWt+TyBBw6mYCnp iVTwMNs1h8+dHwB8Xg5bS7U5RyBypSnRccsH/xnJKP/QeH06F0dLPrZen+Gk/anmrUa5 EmRi2miIt7n4KbxCJ9S0hyqIOxay/OxzwmDIF9GAmojftV3bMKK02GU36rof/eOutZxR 5h86Z56kWdO0wKvjhkM/iY/b6USVsktt8BJWW81xlO9eg2RvuOGf/BZ6VOL6KccVrZYm Pvrw== X-Gm-Message-State: AHYfb5jif05lUEeAdhv03GcPK+K/Fb/zTIzkwPZV3g5Vl4UNFn4X2bTf nMZQMYWh04HkuBVS X-Received: by 10.99.47.199 with SMTP id v190mr16393074pgv.303.1503308140439; Mon, 21 Aug 2017 02:35:40 -0700 (PDT) Received: from localhost.localdomain ([45.63.61.64]) by smtp.gmail.com with ESMTPSA id 69sm23355087pfh.186.2017.08.21.02.35.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 21 Aug 2017 02:35:39 -0700 (PDT) From: Yuanhan Liu To: Akhil Goyal Cc: Hemant Agrawal , dpdk stable , Yuanhan Liu Date: Mon, 21 Aug 2017 17:30:44 +0800 Message-Id: <1503307878-16728-30-git-send-email-yliu@fridaylinux.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> References: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> Subject: [dpdk-stable] patch 'crypto/dpaa2_sec: fix HMAC supported key sizes' has been queued to stable release 17.05.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Aug 2017 09:35:41 -0000 Hi, FYI, your patch has been queued to stable release 17.05.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 08/24/17. So please shout if anyone has objections. Thanks. --yliu --- >>From a197e599bc72625ea03dd0356c6643f5db5074dd Mon Sep 17 00:00:00 2001 From: Akhil Goyal Date: Thu, 27 Jul 2017 17:24:08 +0530 Subject: [PATCH] crypto/dpaa2_sec: fix HMAC supported key sizes [ upstream commit f947fd77185fef15e6c8471c11c9beb2f1c3a018 ] For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported key sizes are not a fixed value, but a range between 1 and the block size. Fixes: 623326dded3a ("crypto/dpaa2_sec: introduce poll mode driver") Signed-off-by: Akhil Goyal Acked-by: Hemant Agrawal --- drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h index f5c6169..e02bf72 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h @@ -204,9 +204,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_MD5_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 16, @@ -225,9 +225,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA1_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 20, @@ -246,9 +246,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA224_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 28, @@ -267,9 +267,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA256_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 32, @@ -288,9 +288,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA384_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 48, @@ -309,9 +309,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA512_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 64, -- 2.7.4