From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr0-f193.google.com (mail-wr0-f193.google.com [209.85.128.193]) by dpdk.org (Postfix) with ESMTP id 766BBF90 for ; Mon, 30 Apr 2018 16:44:34 +0200 (CEST) Received: by mail-wr0-f193.google.com with SMTP id p5-v6so8278195wre.12 for ; Mon, 30 Apr 2018 07:44:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=o015xRwpdyoih8Ft8PFUetvLf1HVuDYxMRR95sVNyX4=; b=UmIvvWEJ8Ye4re1gtX5YFpVO1yhiIjAmh8jZ7Bm18fsfSiZKuEEj4RHVbAGTqxYYVR eswFcgtGCtG0JLX/cdQgy0aHb27Bh/mov709CqgMd9Y/BROmRbmSKu4nnKHFewWeyK+c t0Pd/n5C4D2L+Xg4N11p6GYuiZmCdwhPHz7+6jthuAeEkA8Cn5iQeGIxQoU9KagANksn 7dabc1jJ61Apyhx3MTooyvJCYN7s+pXrNU8oGC8/eMTDai9TjWjBmVRr3iGE4/I6elid tWEmpnoEkpmY9s0N5LmPFtlHe48KwrHDeNWdoVYovpM2X6MzpO9P1oqTnJAjdP/rhHJC wdtA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=o015xRwpdyoih8Ft8PFUetvLf1HVuDYxMRR95sVNyX4=; b=PKeZDZxuajoCitxRNs28kkFff2BOxfsujYHzD20cezaQfpa27Svjb72sAimweyYU+7 QKStfSmsrBTJS7wKpRErYQdJcE108ZWGwIlrsrn/q9Of8C9U4fLRVNqGcpp49mjzFN26 XiT6X4Nh1a4Vn/yMQZIjaIF6LokWIAcds/DLUOKbpnrCbBVrn7oU+H+DXmp3ALTBKAVr tM5FDxdDxEFcSUYwxVcU4UvAPCaeC/gNOVpHbMjBhlCGRfAWT9RzmM5XLKJMHJPDp//W wdrCTX9zdcVR87B4vdFC8OA+yFoQc0MBUImwILSEgRMgqDcX56Q5hBpDPtLVJbD+t48q jbyw== X-Gm-Message-State: ALQs6tCZhHXHwG3Gp5CJQCP1JYDbcy2yDKiqOq09sw1rIqLqw+z1OKA+ h1Pi4n3iHsNCokf+zlLXG/ItZjgRnOc= X-Google-Smtp-Source: AB8JxZrWsKYzN7WR7maUR/UMnZk3m1zXVZTZJ4HWoZgNdyjtUJ6ekBmgK1Iv8UJVzgG0pEU2DbwLeA== X-Received: by 2002:adf:a4da:: with SMTP id h26-v6mr9348840wrb.164.1525099474189; Mon, 30 Apr 2018 07:44:34 -0700 (PDT) Received: from localhost ([2a00:23c5:be9a:5200:ce4c:82c0:d567:ecbb]) by smtp.gmail.com with ESMTPSA id u69sm10865269wma.37.2018.04.30.07.44.33 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 30 Apr 2018 07:44:33 -0700 (PDT) From: luca.boccassi@gmail.com To: Hemant Agrawal Cc: Nipun Gupta , Akhil Goyal , dpdk stable Date: Mon, 30 Apr 2018 15:41:36 +0100 Message-Id: <20180430144223.18657-81-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.14.2 In-Reply-To: <20180430144223.18657-1-luca.boccassi@gmail.com> References: <20180430140606.4615-80-luca.boccassi@gmail.com> <20180430144223.18657-1-luca.boccassi@gmail.com> Subject: [dpdk-stable] patch 'crypto/dpaa2_sec: fix HMAC supported digest sizes' has been queued to stable release 18.02.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Apr 2018 14:44:34 -0000 Hi, FYI, your patch has been queued to stable release 18.02.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 05/02/18. So please shout if anyone has objections. Thanks. Luca Boccassi --- >>From 1f4a7bd2cc558fafd8e47448c777a3a4ce91eec5 Mon Sep 17 00:00:00 2001 From: Hemant Agrawal Date: Thu, 19 Apr 2018 22:22:38 +0530 Subject: [PATCH] crypto/dpaa2_sec: fix HMAC supported digest sizes [ upstream commit e37effdc3d48c5f63871639c9007a10a5f57b825 ] For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported digest sizes are not a fixed value, but a range between 1 and the maximum digest size for those algorithms. Fixes: f947fd77185f ("crypto/dpaa2_sec: fix HMAC supported key sizes") Signed-off-by: Nipun Gupta Signed-off-by: Hemant Agrawal Acked-by: Akhil Goyal --- drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h index e8ac95bac..a9d83ebce 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h @@ -185,9 +185,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 16, + .min = 1, .max = 16, - .increment = 0 + .increment = 1 }, .iv_size = { 0 } }, } @@ -206,9 +206,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 20, + .min = 1, .max = 20, - .increment = 0 + .increment = 1 }, .iv_size = { 0 } }, } @@ -227,9 +227,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 28, + .min = 1, .max = 28, - .increment = 0 + .increment = 1 }, .iv_size = { 0 } }, } @@ -248,9 +248,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 32, - .max = 32, - .increment = 0 + .min = 1, + .max = 32, + .increment = 1 }, .iv_size = { 0 } }, } @@ -269,9 +269,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 48, + .min = 1, .max = 48, - .increment = 0 + .increment = 1 }, .iv_size = { 0 } }, } @@ -290,9 +290,9 @@ static const struct rte_cryptodev_capabilities dpaa2_sec_capabilities[] = { .increment = 1 }, .digest_size = { - .min = 64, + .min = 1, .max = 64, - .increment = 0 + .increment = 1 }, .iv_size = { 0 } }, } -- 2.14.2