From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 3D2B0A0093 for ; Wed, 9 Mar 2022 12:01:58 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 33DD7410EF; Wed, 9 Mar 2022 12:01:58 +0100 (CET) Received: from smtp-relay-internal-0.canonical.com (smtp-relay-internal-0.canonical.com [185.125.188.122]) by mails.dpdk.org (Postfix) with ESMTP id 8844540150 for ; Wed, 9 Mar 2022 12:01:56 +0100 (CET) Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 4A52B3F616 for ; Wed, 9 Mar 2022 11:01:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1646823716; bh=96U/y1sgb/b/aBIWnGeAq1Sz85BbIyhc4caA0A0VVcg=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=TMcCWjombfAnzi3cFxLnFg9hp3AmRxCNMWr8D0IVdWa9pO0sv05FptTEG7DrqXBOM lQFGnoVPDeoM8O36uhO58GN62iVAO5XYsmht6IxuE9SVXn++QGQBZyJXo7UaS/wWfj MC+fQP6hmsFmRa2Ip7HU4BE1yfmLmO5T/l+q7jwpvUGZfey3+FXd6RJVPeKE+yeU/K puq8M2Un23oW4Z6Edre4Z2C34ncCuEeK3NMqWfbEQ8upjHeES8JucMJdn5WqqV8Ps2 lVlH85c4vulmaGDWlSQpJICPRrqJpc1tv5JhaOCdWU0ArLB5s+UkLkF5hxFCjf5eQq NgsbzBAqKK3Cg== Received: by mail-wm1-f71.google.com with SMTP id a26-20020a7bc1da000000b003857205ec7cso835949wmj.2 for ; Wed, 09 Mar 2022 03:01:56 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=96U/y1sgb/b/aBIWnGeAq1Sz85BbIyhc4caA0A0VVcg=; b=mhwcY+E10TshCTSrxkwVq4e418LMvYTabPTorrn+FlSwsCVlXUolzYGXXnT8eCk3+R m/6mqm3w4Jxw2wWE66dq/2nNa4XHD3jodIoJ6//uKkeVsC0zOR50L1KLSBssfz7n9Qma atre4QnCJUg6wQV7WqNksGj2AUPlflCV2WJ1ld3fQDOQB6SBYbtAr64wSWAWnpTJWQko 92xbeOqXwzK/XKDgjDFQVxKVM+Of2tv9tnIMDpgFNloBygbxQhM4KRbLuouev40p5sUQ JM6XHLU3UcpwPPyQ0UZWnXBDoAQg5teS5sg751YxpR803ExdAabGRf/HVfHDKzGo2/lS xF2Q== X-Gm-Message-State: AOAM530dGWRq0wzu2n6QUlbV+Ji73Am3arvEzVZY9U+w0BA9Kp3OQn40 Ps4r+gsHLh+gG1oTNBWegmYWk/6VMCdSkjBIUCisPBnlL0rjQRY6TkzIYk6laJkn2I95dnR574F x+2/7LUG23QAs97RUilUs+Ooc X-Received: by 2002:a05:6000:1d0:b0:1f1:deb3:7879 with SMTP id t16-20020a05600001d000b001f1deb37879mr15124812wrx.272.1646823715419; Wed, 09 Mar 2022 03:01:55 -0800 (PST) X-Google-Smtp-Source: ABdhPJwCsXMJRYPO0TzTIlWJaCHQlQoQE11nfCypPJxZt0czyXSNufL99ZRcznoEEBJLfg9fwgfIEw== X-Received: by 2002:a05:6000:1d0:b0:1f1:deb3:7879 with SMTP id t16-20020a05600001d000b001f1deb37879mr15124802wrx.272.1646823715159; Wed, 09 Mar 2022 03:01:55 -0800 (PST) Received: from localhost.localdomain (068-133-067-156.ip-addr.inexio.net. [156.67.133.68]) by smtp.gmail.com with ESMTPSA id v14-20020adfd18e000000b0020373e5319asm1467247wrc.103.2022.03.09.03.01.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Mar 2022 03:01:54 -0800 (PST) From: christian.ehrhardt@canonical.com To: Arek Kusztal Cc: Akhil Goyal , dpdk stable Subject: patch 'cryptodev: fix RSA key type name' has been queued to stable release 19.11.12 Date: Wed, 9 Mar 2022 12:00:39 +0100 Message-Id: <20220309110116.1295395-8-christian.ehrhardt@canonical.com> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220309110116.1295395-1-christian.ehrhardt@canonical.com> References: <20220309110116.1295395-1-christian.ehrhardt@canonical.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 19.11.12 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 03/11/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/cpaelzer/dpdk-stable-queue This queued commit can be viewed at: https://github.com/cpaelzer/dpdk-stable-queue/commit/e8422022f2daa59d1ad2e92ffd352ed920e5c250 Thanks. Christian Ehrhardt --- >From e8422022f2daa59d1ad2e92ffd352ed920e5c250 Mon Sep 17 00:00:00 2001 From: Arek Kusztal Date: Fri, 18 Feb 2022 07:53:32 +0000 Subject: [PATCH] cryptodev: fix RSA key type name [ upstream commit 3387912f5cacd934594f2c7a0c34eda7279419a8 ] This patch fixes misspelled RTE_RSA_KEY_TYPE_QT, this will prevent checkpach from complaining wherever change to RSA is being made. Fixes: 26008aaed14c ("cryptodev: add asymmetric xform and op definitions") Signed-off-by: Arek Kusztal Acked-by: Akhil Goyal --- app/test/test_cryptodev_asym.c | 2 +- app/test/test_cryptodev_rsa_test_vectors.h | 2 +- drivers/crypto/qat/qat_asym.c | 4 ++-- lib/librte_cryptodev/rte_crypto_asym.h | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index a0802994fa..9254c17183 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -557,7 +557,7 @@ test_one_case(const void *test_case, int sessionless) status = test_cryptodev_asym_op( &testsuite_params, &tc, test_msg, sessionless, i, - RTE_RSA_KET_TYPE_QT); + RTE_RSA_KEY_TYPE_QT); } if (status) break; diff --git a/app/test/test_cryptodev_rsa_test_vectors.h b/app/test/test_cryptodev_rsa_test_vectors.h index 48a72e1492..04539a1ecf 100644 --- a/app/test/test_cryptodev_rsa_test_vectors.h +++ b/app/test/test_cryptodev_rsa_test_vectors.h @@ -378,7 +378,7 @@ struct rte_crypto_asym_xform rsa_xform_crt = { .data = rsa_e, .length = sizeof(rsa_e) }, - .key_type = RTE_RSA_KET_TYPE_QT, + .key_type = RTE_RSA_KEY_TYPE_QT, .qt = { .p = { .data = rsa_p, diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c index f893508030..217e84c1cf 100644 --- a/drivers/crypto/qat/qat_asym.c +++ b/drivers/crypto/qat/qat_asym.c @@ -97,7 +97,7 @@ static void qat_clear_arrays_by_alg(struct qat_asym_op_cookie *cookie, qat_clear_arrays(cookie, QAT_ASYM_MODINV_NUM_IN_PARAMS, QAT_ASYM_MODINV_NUM_OUT_PARAMS, alg_size); else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) { - if (xform->rsa.key_type == RTE_RSA_KET_TYPE_QT) + if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT) qat_clear_arrays_crt(cookie, alg_size); else { qat_clear_arrays(cookie, QAT_ASYM_RSA_NUM_IN_PARAMS, @@ -370,7 +370,7 @@ qat_asym_fill_arrays(struct rte_crypto_asym_op *asym_op, return -(EINVAL); } } - if (xform->rsa.key_type == RTE_RSA_KET_TYPE_QT) { + if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT) { qat_req->input_param_count = QAT_ASYM_RSA_QT_NUM_IN_PARAMS; diff --git a/lib/librte_cryptodev/rte_crypto_asym.h b/lib/librte_cryptodev/rte_crypto_asym.h index 0d34ce8dfd..90d8bc0439 100644 --- a/lib/librte_cryptodev/rte_crypto_asym.h +++ b/lib/librte_cryptodev/rte_crypto_asym.h @@ -133,7 +133,7 @@ enum rte_crypto_rsa_padding_type { enum rte_crypto_rsa_priv_key_type { RTE_RSA_KEY_TYPE_EXP, /**< RSA private key is an exponent */ - RTE_RSA_KET_TYPE_QT, + RTE_RSA_KEY_TYPE_QT, /**< RSA private key is in quintuple format * See rte_crypto_rsa_priv_key_qt */ -- 2.35.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-03-09 11:57:43.805568372 +0100 +++ 0008-cryptodev-fix-RSA-key-type-name.patch 2022-03-09 11:57:43.328937980 +0100 @@ -1 +1 @@ -From 3387912f5cacd934594f2c7a0c34eda7279419a8 Mon Sep 17 00:00:00 2001 +From e8422022f2daa59d1ad2e92ffd352ed920e5c250 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 3387912f5cacd934594f2c7a0c34eda7279419a8 ] + @@ -11 +12,0 @@ -Cc: stable@dpdk.org @@ -19 +20 @@ - lib/cryptodev/rte_crypto_asym.h | 2 +- + lib/librte_cryptodev/rte_crypto_asym.h | 2 +- @@ -23 +24 @@ -index 7cda8bb081..573af2a537 100644 +index a0802994fa..9254c17183 100644 @@ -26 +27 @@ -@@ -549,7 +549,7 @@ test_one_case(const void *test_case, int sessionless) +@@ -557,7 +557,7 @@ test_one_case(const void *test_case, int sessionless) @@ -49 +50 @@ -index f46eefd4b3..27ce0337a7 100644 +index f893508030..217e84c1cf 100644 @@ -70,5 +71,5 @@ -diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_asym.h -index 2eb0f001e3..cd24d4b07b 100644 ---- a/lib/cryptodev/rte_crypto_asym.h -+++ b/lib/cryptodev/rte_crypto_asym.h -@@ -145,7 +145,7 @@ enum rte_crypto_rsa_padding_type { +diff --git a/lib/librte_cryptodev/rte_crypto_asym.h b/lib/librte_cryptodev/rte_crypto_asym.h +index 0d34ce8dfd..90d8bc0439 100644 +--- a/lib/librte_cryptodev/rte_crypto_asym.h ++++ b/lib/librte_cryptodev/rte_crypto_asym.h +@@ -133,7 +133,7 @@ enum rte_crypto_rsa_padding_type {