From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f48.google.com (mail-pg0-f48.google.com [74.125.83.48]) by dpdk.org (Postfix) with ESMTP id 4B5329145 for ; Mon, 21 Aug 2017 11:35:46 +0200 (CEST) Received: by mail-pg0-f48.google.com with SMTP id m133so14722078pga.5 for ; Mon, 21 Aug 2017 02:35:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fridaylinux-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=earmHgBhfDqIBH0AQX7UXBHUqa5mZyOTuJg5D2N++Mk=; b=yanmnDyn/VOo51tcHrJe7tYymM2sFwzgbutpYMIXt1cuUHZtwmfor3STROjP0WvaxT +yytNLrb7zCyf5a5R3YE7jchhzNX4WLH7XbSYQG9dMDkv/G8qGCDL232Pe2cZuhSCX64 x+52EGMe4S9BhnDFsUwBEmeG6lsugOSJX2jUtANv5Y6MFfsp/eOdo4b+igwdQR38bu9F Ggc13CXEeoCUFYeUb7LBocI1l50/iHxMu5bLbLvDLv9qXCqIYhyyBaFrHFQEVK3r8iV/ y+3cFm154bQziTPdtdcCySMyPt9WoU7hoZ/838ZY/KLScNKAQdPCgF262r5GZmbef1od 6tSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=earmHgBhfDqIBH0AQX7UXBHUqa5mZyOTuJg5D2N++Mk=; b=Gqmo6LmGhC94Qcg6Wrwph7eWjRBfusdWdmTmcwciGjz3A4qZ65wzxwTt7jr6ZCb8sI /yxxHsbi9lndcgikZP1RXOglmETGTfYrnfaFOoNaAFU8IEhgl12XMjbAvwsezNHOJVds fO3akMKK/iWX/+RTbXEingNoFBtiRUZBXFNJvXzf4ggXfIe51sjv01ulb8zvGAJY8FvI aZdBh7dxGlkvxsSxMwwXkc8NmuogyspYVwurWOloQjXdO/0JB9mz/61qLMshL2a3ynRH z3AI5GuwSpmRS9rpRn7/BVqYFB+rbCCgRaCH4HC9cLAKb6pfs6AJdtg8dmCyiofAtdiN WXhA== X-Gm-Message-State: AHYfb5glwqgoRQhqSnJO/5nrmof57YzsUZBADPovIv+7hzGD2/wKxLvV AkS3XFyIUxdLa5U75QAWaA== X-Received: by 10.98.78.71 with SMTP id c68mr372019pfb.209.1503308145625; Mon, 21 Aug 2017 02:35:45 -0700 (PDT) Received: from localhost.localdomain ([45.63.61.64]) by smtp.gmail.com with ESMTPSA id 69sm23355087pfh.186.2017.08.21.02.35.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 21 Aug 2017 02:35:44 -0700 (PDT) From: Yuanhan Liu To: Pablo de Lara Cc: Declan Doherty , dpdk stable , Yuanhan Liu Date: Mon, 21 Aug 2017 17:30:45 +0800 Message-Id: <1503307878-16728-31-git-send-email-yliu@fridaylinux.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> References: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> Subject: [dpdk-stable] patch 'crypto/aesni_mb: fix HMAC supported key sizes' has been queued to stable release 17.05.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Aug 2017 09:35:46 -0000 Hi, FYI, your patch has been queued to stable release 17.05.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 08/24/17. So please shout if anyone has objections. Thanks. --yliu --- >>From b1efe1da73a5f25011258938257e63587fd59f6a Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Tue, 25 Jul 2017 06:24:55 +0100 Subject: [PATCH] crypto/aesni_mb: fix HMAC supported key sizes [ upstream commit cefa431162fcef7f1ef0804beb25d7a9883fc54a ] For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported key sizes are not a fixed value, but a range between 1 and the block size. Fixes: 26c2e4ad5ad4 ("cryptodev: add capabilities discovery") Signed-off-by: Pablo de Lara Acked-by: Declan Doherty --- drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c index d1bc28e..cb2893a 100644 --- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c +++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c @@ -48,9 +48,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_MD5_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 12, @@ -69,9 +69,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA1_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 12, @@ -90,9 +90,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA224_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 14, @@ -111,9 +111,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA256_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 16, @@ -132,9 +132,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA384_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 24, @@ -153,9 +153,9 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA512_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 32, -- 2.7.4