From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f45.google.com (mail-pg0-f45.google.com [74.125.83.45]) by dpdk.org (Postfix) with ESMTP id 3A9D49151 for ; Mon, 21 Aug 2017 11:35:52 +0200 (CEST) Received: by mail-pg0-f45.google.com with SMTP id u191so22479349pgc.2 for ; Mon, 21 Aug 2017 02:35:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fridaylinux-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=JmbkoC9whN3HFxV19HqGKLqfrZXx5B5VbXx/N1ZU/q0=; b=ZdaQcv8IDfK+OSjIV00B0N8B3XHsxkEqhGZz1U2IS0+q3f7dRka5UlrR6d2fnXnWzM Hx6QHRxchPeAQP2s+rS4dQF9RA724VRipa52u2CGln6j0L0LMxrxX5OzstY8lC3aCLCO sNME8ADU4P2eqn3AsuxrDfbXxDVOctMPP+7QgBCzBAlE6vr1S347TZVnL8AJYlP8CDLf lPvUfOZ3E1LF8AtySfHnDgZEhGjLPNb/SXAYANoWZNjpPbZPG/d6+Rtn2vJdX+Lad/Ps KUG5rJJYDPAKvvZwmKE0miyu4DlY6tsmVnfdueJr9VfEenJzc/txqmQsaept6Ol7K7cP wiig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=JmbkoC9whN3HFxV19HqGKLqfrZXx5B5VbXx/N1ZU/q0=; b=qATlXQ8Y8WA69w0n+qDe2Z+tv51Wxe7sjuCRgOeQo30ipCYG77lhiS8WmkbTd00EBb 26GNFgheeWgFb2362lyU7TqLrTILoF0YWDRKafnNd3XVkUeQGuWxJBowliv4U4igwDKe VayX4LwqQz4xk8iXJPwjhCtwGnlUJWb1tofYLwYpRseUmv4sr5qYtFfqf2A2r3IsQPun 58jTHgzDy2E4a3/3kGXPYt9iiHZR1a1lQVAWBtQvpJ0ldbQahnm7qBSOsM+hxf1/Gp0h MGE6PAw0AF8RgX4czhm9+IG8WtfFmVajnmrxoTLi35+FY1GOOkww9WR8atd/VsETWwGB 9dQg== X-Gm-Message-State: AHYfb5jIs2lUuf0LTK6knYfLIgrWhlz62jqm0Zcjrp5MKX2pakyWWFjS DPGdcSanhJUYym04 X-Received: by 10.84.143.129 with SMTP id 1mr18131361plz.88.1503308151479; Mon, 21 Aug 2017 02:35:51 -0700 (PDT) Received: from localhost.localdomain ([45.63.61.64]) by smtp.gmail.com with ESMTPSA id 69sm23355087pfh.186.2017.08.21.02.35.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 21 Aug 2017 02:35:50 -0700 (PDT) From: Yuanhan Liu To: Pablo de Lara Cc: Declan Doherty , dpdk stable , Yuanhan Liu Date: Mon, 21 Aug 2017 17:30:46 +0800 Message-Id: <1503307878-16728-32-git-send-email-yliu@fridaylinux.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> References: <1503307878-16728-1-git-send-email-yliu@fridaylinux.org> Subject: [dpdk-stable] patch 'crypto/openssl: fix HMAC supported key sizes' has been queued to stable release 17.05.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Aug 2017 09:35:52 -0000 Hi, FYI, your patch has been queued to stable release 17.05.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 08/24/17. So please shout if anyone has objections. Thanks. --yliu --- >>From 62ead17e5dfac54f2d3d783dfa7241148e584113 Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Tue, 25 Jul 2017 06:24:56 +0100 Subject: [PATCH] crypto/openssl: fix HMAC supported key sizes [ upstream commit e5e7bc712601f8eefe15997cc46265cdc0ace0ce ] For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported key sizes are not a fixed value, but a range between 1 and the block size. Fixes: d61f70b4c918 ("crypto/libcrypto: add driver for OpenSSL library") Signed-off-by: Pablo de Lara Acked-by: Declan Doherty --- drivers/crypto/openssl/rte_openssl_pmd_ops.c | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c b/drivers/crypto/openssl/rte_openssl_pmd_ops.c index 22a6873..d6f1ce3 100644 --- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c +++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c @@ -48,9 +48,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_MD5_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 16, @@ -90,9 +90,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA1_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 20, @@ -132,9 +132,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA224_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 28, @@ -174,9 +174,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA256_HMAC, .block_size = 64, .key_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 32, @@ -216,9 +216,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA384_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 48, @@ -258,9 +258,9 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = { .algo = RTE_CRYPTO_AUTH_SHA512_HMAC, .block_size = 128, .key_size = { - .min = 128, + .min = 1, .max = 128, - .increment = 0 + .increment = 1 }, .digest_size = { .min = 64, -- 2.7.4