From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 94A8EA0557 for ; Wed, 16 Nov 2022 11:40:54 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 911BF42D17; Wed, 16 Nov 2022 11:40:54 +0100 (CET) Received: from smtp-relay-internal-0.canonical.com (smtp-relay-internal-0.canonical.com [185.125.188.122]) by mails.dpdk.org (Postfix) with ESMTP id CDE6B40E03 for ; Wed, 16 Nov 2022 11:40:53 +0100 (CET) Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 977053F11B for ; Wed, 16 Nov 2022 10:40:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1668595253; bh=YzzPopRFyr75saq8u44xraumALpWmMFGS1fn9Uy7wsU=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=mqIGUevhjWpO/FNGXFBjZFbB1uBpQ1S8zhfP/cmIpM8frXX/3XaHnb0gxuTdt9TlL oXzlrJYW7t+MTY1AqUguRWPsse7fMjw7VtkbD5gFxER07GsG/AF5h7slNcppIBKDWs ulX1iwjG8rioE/aijgLiFOJGU/9J3PUrqZnZux0YUlzYlqQRSzI4Uq1/MKLTfdoy77 ZjWGDuBbh8yE54b0IPIvKHCikJ43oPcjyDagshEnxk5d3BtzlaGa2/iMAXutrIl0Gr yCgvhyiI9rs1y/hQB5QA4se95Pxrmj2o7TjYWuDP0wXnBJy0n59JzlMlSpk99f9ZWz SjxeilJu1Q7YQ== Received: by mail-wm1-f72.google.com with SMTP id h188-20020a1c21c5000000b003cfe4cc64eeso984231wmh.6 for ; Wed, 16 Nov 2022 02:40:53 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YzzPopRFyr75saq8u44xraumALpWmMFGS1fn9Uy7wsU=; b=zfrTlbcdUkJcfKZ+UmKWLEYZtxHn7Mo9sbrj99hVlEuuGSAzpkTXHq1EuF8E728Ttm zt2Vv8oODfqDi8Y/OYqmugURUHnuVmszGCGW1cjSqpJFdMbhjD0FO3rcTM22tM1zxcl3 OyX6LFBIcftLLwJfRzq1hfJwuvyUTnZREddJ+IpG2Cq+OPWofv4fS3VDI2xohBTYZk5z eEWSrJkflhSqDmVcGInX4dQvByzdFljkiJHTGOrX8tuHhrWILcrN/lRyvhzFKQp8Mbe7 KLj4aqgRznvonyunPTnThpdlzXYeIbrkD5OqCqHPvCf7tvBK/8BwmxQXePN2FVI119xZ mbAg== X-Gm-Message-State: ANoB5pmrEd2Duk+6bqG+Pgpwu9bQXOXOoOoVq4PSBX4TOc0gC68KUGkU CVOXnyQ8EV1OJ52W9WNeqjl9Z/B7nN971iGwisSz9lS6ewy2zsUoRtVZ2HVrUsvbuT7datC7OSl YG7C6Jw+CRGchw3TwEkC0L30g X-Received: by 2002:a05:600c:4f10:b0:3b4:ff86:25af with SMTP id l16-20020a05600c4f1000b003b4ff8625afmr1651943wmq.68.1668595253390; Wed, 16 Nov 2022 02:40:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf5NpnrlARg+kFQ3C9xvGw8LB3eM10P2BAhIvKqE7/l4HFw1l+pFv92G00mkkGkOrldZ2FHVkA== X-Received: by 2002:a05:600c:4f10:b0:3b4:ff86:25af with SMTP id l16-20020a05600c4f1000b003b4ff8625afmr1651934wmq.68.1668595253068; Wed, 16 Nov 2022 02:40:53 -0800 (PST) Received: from localhost.localdomain ([2a02:6d40:39e5:dd00:975:f38b:96af:696f]) by smtp.gmail.com with ESMTPSA id s3-20020adfecc3000000b0022e653f5abbsm14719833wro.69.2022.11.16.02.40.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Nov 2022 02:40:52 -0800 (PST) From: christian.ehrhardt@canonical.com To: Pablo de Lara Cc: Brian Dooley , dpdk stable Subject: patch 'examples/fips_validation: fix typo in error log' has been queued to stable release 19.11.14 Date: Wed, 16 Nov 2022 11:40:07 +0100 Message-Id: <20221116104012.2975036-12-christian.ehrhardt@canonical.com> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20221116104012.2975036-1-christian.ehrhardt@canonical.com> References: <20221116104012.2975036-1-christian.ehrhardt@canonical.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 19.11.14 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 11/23/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/cpaelzer/dpdk-stable-queue This queued commit can be viewed at: https://github.com/cpaelzer/dpdk-stable-queue/commit/9412df88ffeb26d1cdabe6dab50fcd14882833dc Thanks. Christian Ehrhardt --- >From 9412df88ffeb26d1cdabe6dab50fcd14882833dc Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Mon, 7 Nov 2022 10:03:30 +0000 Subject: [PATCH] examples/fips_validation: fix typo in error log [ upstream commit 8782b3b64b4c38c0e2d4cf5bda2795ddd268cf41 ] Digest length is being printed out, not IV length. Fixes: ac026f4668d0 ("examples/fips_validation: support CMAC parsing") Fixes: f64adb6714e0 ("examples/fips_validation: support HMAC parsing") Signed-off-by: Pablo de Lara Reviewed-by: Brian Dooley --- examples/fips_validation/main.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/examples/fips_validation/main.c b/examples/fips_validation/main.c index 739c93656f..52e4e424cb 100644 --- a/examples/fips_validation/main.c +++ b/examples/fips_validation/main.c @@ -745,7 +745,7 @@ prepare_hmac_xform(struct rte_crypto_sym_xform *xform) if (rte_cryptodev_sym_capability_check_auth(cap, auth_xform->key.length, auth_xform->digest_length, 0) != 0) { - RTE_LOG(ERR, USER1, "PMD %s key length %u IV length %u\n", + RTE_LOG(ERR, USER1, "PMD %s key length %u Digest length %u\n", info.device_name, auth_xform->key.length, auth_xform->digest_length); return -EPERM; @@ -829,7 +829,7 @@ prepare_cmac_xform(struct rte_crypto_sym_xform *xform) if (rte_cryptodev_sym_capability_check_auth(cap, auth_xform->key.length, auth_xform->digest_length, 0) != 0) { - RTE_LOG(ERR, USER1, "PMD %s key length %u IV length %u\n", + RTE_LOG(ERR, USER1, "PMD %s key length %u Digest length %u\n", info.device_name, auth_xform->key.length, auth_xform->digest_length); return -EPERM; -- 2.38.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-11-16 11:36:50.869764365 +0100 +++ 0012-examples-fips_validation-fix-typo-in-error-log.patch 2022-11-16 11:36:50.428775551 +0100 @@ -1 +1 @@ -From 8782b3b64b4c38c0e2d4cf5bda2795ddd268cf41 Mon Sep 17 00:00:00 2001 +From 9412df88ffeb26d1cdabe6dab50fcd14882833dc Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 8782b3b64b4c38c0e2d4cf5bda2795ddd268cf41 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org @@ -19 +20 @@ -index 404a29d7b6..9a9babb53a 100644 +index 739c93656f..52e4e424cb 100644 @@ -22 +23 @@ -@@ -1210,7 +1210,7 @@ prepare_hmac_xform(struct rte_crypto_sym_xform *xform) +@@ -745,7 +745,7 @@ prepare_hmac_xform(struct rte_crypto_sym_xform *xform) @@ -31 +32 @@ -@@ -1339,7 +1339,7 @@ prepare_cmac_xform(struct rte_crypto_sym_xform *xform) +@@ -829,7 +829,7 @@ prepare_cmac_xform(struct rte_crypto_sym_xform *xform)