From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 304D6A034F for ; Tue, 1 Mar 2022 11:43:59 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2BDFC407FF; Tue, 1 Mar 2022 11:43:59 +0100 (CET) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mails.dpdk.org (Postfix) with ESMTP id C631D407FF for ; Tue, 1 Mar 2022 11:43:57 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1646131437; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=7lbHgkX+VSTXMvHGg0HcB9SXI+Q/vU5tx+3XSh6xZ6I=; b=L0q7j1uH8fIk0HREyKjSKz5WX6LTQqdNOVICaGgklZWz/6Mi8Y6IUszs8BGfQ/p1jHZB3j 13eP139Hbjt0funRbM+3H2hhJ3MRJSKIoAGwpyumZy4P7frj03jLiBSeL/osc7tf0l58tr 9U0EeZrtH4WBNQryqVwGFSCe0dO3ApU= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-154-3VEr0632M7aRfalc4HxgZA-1; Tue, 01 Mar 2022 05:43:54 -0500 X-MC-Unique: 3VEr0632M7aRfalc4HxgZA-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 7F98B1091DA0; Tue, 1 Mar 2022 10:43:53 +0000 (UTC) Received: from rh.Home (unknown [10.39.194.142]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7439175524; Tue, 1 Mar 2022 10:43:52 +0000 (UTC) From: Kevin Traynor To: Arek Kusztal Cc: Akhil Goyal , dpdk stable Subject: patch 'cryptodev: fix RSA key type name' has been queued to stable release 21.11.1 Date: Tue, 1 Mar 2022 10:41:42 +0000 Message-Id: <20220301104300.334382-26-ktraynor@redhat.com> In-Reply-To: <20220301104300.334382-1-ktraynor@redhat.com> References: <20220301104300.334382-1-ktraynor@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=ktraynor@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 21.11.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 03/06/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable/commit/f092922c3674c6b5fa5e9b6806abc9dbdf0e106c Thanks. Kevin --- >From f092922c3674c6b5fa5e9b6806abc9dbdf0e106c Mon Sep 17 00:00:00 2001 From: Arek Kusztal Date: Fri, 18 Feb 2022 07:53:32 +0000 Subject: [PATCH] cryptodev: fix RSA key type name [ upstream commit 3387912f5cacd934594f2c7a0c34eda7279419a8 ] This patch fixes misspelled RTE_RSA_KEY_TYPE_QT, this will prevent checkpach from complaining wherever change to RSA is being made. Fixes: 26008aaed14c ("cryptodev: add asymmetric xform and op definitions") Signed-off-by: Arek Kusztal Acked-by: Akhil Goyal --- app/test/test_cryptodev_asym.c | 2 +- app/test/test_cryptodev_rsa_test_vectors.h | 2 +- drivers/crypto/qat/qat_asym.c | 4 ++-- lib/cryptodev/rte_crypto_asym.h | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index 9d19a6d6d9..1131290e88 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -559,5 +559,5 @@ test_one_case(const void *test_case, int sessionless) &testsuite_params, &tc, test_msg, sessionless, i, - RTE_RSA_KET_TYPE_QT); + RTE_RSA_KEY_TYPE_QT); } if (status) diff --git a/app/test/test_cryptodev_rsa_test_vectors.h b/app/test/test_cryptodev_rsa_test_vectors.h index 48a72e1492..04539a1ecf 100644 --- a/app/test/test_cryptodev_rsa_test_vectors.h +++ b/app/test/test_cryptodev_rsa_test_vectors.h @@ -379,5 +379,5 @@ struct rte_crypto_asym_xform rsa_xform_crt = { .length = sizeof(rsa_e) }, - .key_type = RTE_RSA_KET_TYPE_QT, + .key_type = RTE_RSA_KEY_TYPE_QT, .qt = { .p = { diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c index 09d8761c5f..bd0bf5f0cb 100644 --- a/drivers/crypto/qat/qat_asym.c +++ b/drivers/crypto/qat/qat_asym.c @@ -98,5 +98,5 @@ static void qat_clear_arrays_by_alg(struct qat_asym_op_cookie *cookie, QAT_ASYM_MODINV_NUM_OUT_PARAMS, alg_size); else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) { - if (xform->rsa.key_type == RTE_RSA_KET_TYPE_QT) + if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT) qat_clear_arrays_crt(cookie, alg_size); else { @@ -371,5 +371,5 @@ qat_asym_fill_arrays(struct rte_crypto_asym_op *asym_op, } } - if (xform->rsa.key_type == RTE_RSA_KET_TYPE_QT) { + if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT) { qat_req->input_param_count = diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_asym.h index 9c866f553f..9c5bb9233a 100644 --- a/lib/cryptodev/rte_crypto_asym.h +++ b/lib/cryptodev/rte_crypto_asym.h @@ -147,5 +147,5 @@ enum rte_crypto_rsa_priv_key_type { RTE_RSA_KEY_TYPE_EXP, /**< RSA private key is an exponent */ - RTE_RSA_KET_TYPE_QT, + RTE_RSA_KEY_TYPE_QT, /**< RSA private key is in quintuple format * See rte_crypto_rsa_priv_key_qt -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-03-01 10:41:02.073161922 +0000 +++ 0026-cryptodev-fix-RSA-key-type-name.patch 2022-03-01 10:41:01.277244092 +0000 @@ -1 +1 @@ -From 3387912f5cacd934594f2c7a0c34eda7279419a8 Mon Sep 17 00:00:00 2001 +From f092922c3674c6b5fa5e9b6806abc9dbdf0e106c Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 3387912f5cacd934594f2c7a0c34eda7279419a8 ] + @@ -11 +12,0 @@ -Cc: stable@dpdk.org @@ -23 +24 @@ -index 7cda8bb081..573af2a537 100644 +index 9d19a6d6d9..1131290e88 100644 @@ -26 +27 @@ -@@ -550,5 +550,5 @@ test_one_case(const void *test_case, int sessionless) +@@ -559,5 +559,5 @@ test_one_case(const void *test_case, int sessionless) @@ -45 +46 @@ -index f46eefd4b3..27ce0337a7 100644 +index 09d8761c5f..bd0bf5f0cb 100644 @@ -63 +64 @@ -index 2eb0f001e3..cd24d4b07b 100644 +index 9c866f553f..9c5bb9233a 100644 @@ -66 +67 @@ -@@ -146,5 +146,5 @@ enum rte_crypto_rsa_priv_key_type { +@@ -147,5 +147,5 @@ enum rte_crypto_rsa_priv_key_type {