From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 74D204550C; Thu, 27 Jun 2024 16:35:32 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 3D2E3427DF; Thu, 27 Jun 2024 16:35:32 +0200 (CEST) Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on2044.outbound.protection.outlook.com [40.107.104.44]) by mails.dpdk.org (Postfix) with ESMTP id 639F4427DF for ; Thu, 27 Jun 2024 16:35:30 +0200 (CEST) ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=cugYNtd/ehudSmL8+qK7MED1UKrPbHlVSyCsViLQlnSls/JSEBJDazpeIqcyAdTRVr41fULkuMYDg78E3nkrsSXl4r2ZZd2n1EjuEY04yMgJTTOS2+qXCWuMg1Vir/f2/J4y7MY5O4TfUA/JhZx1OlnmIYMMwt5VoXmgscgMj5I4ZXrBZ80+T/TPPUxhtDjvi5xSNN3ztAjUABaJJIMsFOTwkqJRfg8WtWEEuX1/w2Eg+nj0RuiN1vfVBJ79sLP0ks/vnv6wlHRTDtTthKloYrT+1KdpAnyNHLe8M3WQaSjiMQzNZD64z/OGJVLE5bAEg3KwFAHWYqHYCr9gnW3AIw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0fKx2Q+l9j9ZERMOzc37lwDTwSo2xO+xDDwBqFA1OEs=; b=ilKxEH6shxSZ4r9xzUfk58vZbQB7EeHoLhvoToMisdwVvHn90nhrA+MEYFsBNXhcB95lkotW6DH2kGxm6taC/OCa/xH4xiphVmB9wNETx+9VHHBhwsiM0jN5Wl/Ch8x1hgiT+1We3/rY3fUhUiaS+H9W7xk4c48J40+qLbRi9zBcc+Y4IsgGOeZ/AorfPxMMsXp1rGcSLcIGrGjRUDdSIYOFeJfcpvH4Wc1QqgmMrd6EMW/AYtc/4AWZu4nwNvlnYdHwhi4vW1BDCLsRGRUvgvR8zEn7Kfea/ECiUKxS6mqLO+FaHE6e+4FMXOgOaE0DME3JGEJCQAjs0EnASS7upw== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=dpdk.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0fKx2Q+l9j9ZERMOzc37lwDTwSo2xO+xDDwBqFA1OEs=; b=Q1vAsxCX9OpojFCxebSEVPpwrXSlANi2OMLS2kp2sfKsYRfBVuXwA6hmqQGaiLYGz2I9OPBZ9t01Mh7W725ASYsAQYhBLBznqo/k78sm6+Nlw19KWcY6OPFOZtHGvURcF/ZB7Bis1Lxlvk4WiJTshoI2zKHBpmH2gA1Z2NOak7M= Received: from AM6PR0202CA0039.eurprd02.prod.outlook.com (2603:10a6:20b:3a::16) by AM9PR08MB6659.eurprd08.prod.outlook.com (2603:10a6:20b:30a::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7698.35; Thu, 27 Jun 2024 14:35:28 +0000 Received: from AM1PEPF000252DC.eurprd07.prod.outlook.com (2603:10a6:20b:3a:cafe::a4) by AM6PR0202CA0039.outlook.office365.com (2603:10a6:20b:3a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7719.25 via Frontend Transport; Thu, 27 Jun 2024 14:35:28 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM1PEPF000252DC.mail.protection.outlook.com (10.167.16.54) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7677.15 via Frontend Transport; Thu, 27 Jun 2024 14:35:27 +0000 Received: ("Tessian outbound 3d451520b20a:v357"); Thu, 27 Jun 2024 14:35:27 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: de4bf499b77897d6 X-CR-MTA-TID: 64aa7808 Received: from e0322360b34b.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 95EAB604-7056-4946-85D7-C92C4101B237.1; Thu, 27 Jun 2024 14:35:21 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e0322360b34b.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 27 Jun 2024 14:35:21 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Kw46sWh89EM+nw1EJ7InQnfH/H1lXOXYkgTZXE2r21Zls2bn3o5tqGvjZZ++JOHCpcGJEV/33bCcNxfOAbp5tQluiJh3PPxd7+VHGVf0GZdZuYNKTGdv8XmEDZIE5yFPO2Nz92p/qoXsywpHBA/nN8P8SruueWqU8Z98lGLDCHI6RxwIat2qCSy85V0hJWYhham+9vRHP9FhXSPvZK5RB+cuZ4x8XeAlnUJiYcBS+4nVPzQDDLqsDW6lFXaH6x6uItpsg6cXVbcBrtoPVNzMhyj7fkW6cI4p5VM4ftQVrB+pPreBg8FwGaAaF0auYjtp8hC+oA/HUc2+STLk/vTKwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0fKx2Q+l9j9ZERMOzc37lwDTwSo2xO+xDDwBqFA1OEs=; b=fs4+x94eRP+soQiR1/gBpJMzRIWPHvTzOJymBTQS+wywzic1mMMVNN3ntBtyOM/a3SMbRqfEyRVfgoO1TylfJj/ybXHFGH+Fh6ZkLhP2LDafwFJ5E1/rq5v/L/2h4F+18FIsH3/qXz3rCIvIYlvNO4tp4RMl108KXUkj5yo1wgohgsjphRMUW5b/dLP22RCOf0MyFbFBBOMKn6bIwMnwT4RnHfg2gCXuj6vyKD29g4nWLEO+aDrfFHDvY0lsRnJC2THsK6sQ8S6gJQDCnfKOj3apE7tj1hlzzxG7ge0cPFiuTfAXPjdNm4fa00+nx9lOcItiRFe54qFaisxAuddfJA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0fKx2Q+l9j9ZERMOzc37lwDTwSo2xO+xDDwBqFA1OEs=; b=Q1vAsxCX9OpojFCxebSEVPpwrXSlANi2OMLS2kp2sfKsYRfBVuXwA6hmqQGaiLYGz2I9OPBZ9t01Mh7W725ASYsAQYhBLBznqo/k78sm6+Nlw19KWcY6OPFOZtHGvURcF/ZB7Bis1Lxlvk4WiJTshoI2zKHBpmH2gA1Z2NOak7M= Received: from AM0PR08MB5073.eurprd08.prod.outlook.com (2603:10a6:208:15c::27) by FRZPR08MB10999.eurprd08.prod.outlook.com (2603:10a6:d10:13a::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7719.25; Thu, 27 Jun 2024 14:35:18 +0000 Received: from AM0PR08MB5073.eurprd08.prod.outlook.com ([fe80::6eb8:f4fd:f86d:a8d0]) by AM0PR08MB5073.eurprd08.prod.outlook.com ([fe80::6eb8:f4fd:f86d:a8d0%2]) with mapi id 15.20.7698.025; Thu, 27 Jun 2024 14:35:18 +0000 From: Wathsala Wathawana Vithanage To: Brian Dooley , Kai Ji , Pablo de Lara CC: "dev@dpdk.org" , "gakhil@marvell.com" , nd , nd Subject: RE: [PATCH v1] crypto/ipsec_mb: use new ipad/opad calculation API Thread-Topic: [PATCH v1] crypto/ipsec_mb: use new ipad/opad calculation API Thread-Index: AQHatyU+xbsauH6Kk06JkZzjl0jg2LHbz86Q Date: Thu, 27 Jun 2024 14:35:18 +0000 Message-ID: References: <20240605084844.270122-1-brian.dooley@intel.com> In-Reply-To: <20240605084844.270122-1-brian.dooley@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; x-ms-traffictypediagnostic: AM0PR08MB5073:EE_|FRZPR08MB10999:EE_|AM1PEPF000252DC:EE_|AM9PR08MB6659:EE_ X-MS-Office365-Filtering-Correlation-Id: 87c8c1df-39fa-465f-fc18-08dc96b66370 x-checkrecipientrouted: true nodisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|376014|366016|1800799024|38070700018; X-Microsoft-Antispam-Message-Info-Original: =?us-ascii?Q?XPROBoJKxUYyPiwpa7xpVq6nXm9HDlmQrFiZQlAQoJPcyZH8Ptp76z4QjU1W?= =?us-ascii?Q?nwh3kHeklKDjGA/M0GOlKWaDrMzqKLF/TFtMhPCphSv8pu1L+Zyg0i/Jkeyj?= =?us-ascii?Q?V+Odmw/SiHYvvNwaPmQowap9Tt+MqtnvNp1Ib2WQANgeFI2T1ofEPByYUzoJ?= =?us-ascii?Q?yeUzXIBWThmBGU6zGZQNCDwqqnrWTtmAY7qTss5mQmEhL7S6MAnMDWTH34Cl?= =?us-ascii?Q?igw5rvOqdn2RNJnrkqK6FL2xmT/CzepI2L8WPZdYbHfhNxlkLOo4RMe8so3I?= =?us-ascii?Q?AMsevd61nMV3Eo2EAWVHEIj3N+1YSci0mrIJDP/Ti5ZX4oi39Hwbemqnyybq?= =?us-ascii?Q?LIOpfj0H+2YHdlxjUHgQy0I0RZilthSa1N4zeYMYUrFq5WupzQGapRtwn/i5?= =?us-ascii?Q?Ny2dp7s+4CNa5oPUcqJa3pT1/gwHrcWDmae3JafRqew4ZrVeXDyTjZvH2a4j?= =?us-ascii?Q?/NNRiI6xEdHs9GP1/ijRcK/O7nfJe2svHQvxAU5Igj+6OTLDkGUpBvw/e4CT?= =?us-ascii?Q?RLomgl8YoKQsG8GjK+8KuXKSaLryONBN63sWVM8blbkwaiI8RXyaMJ9goKVD?= =?us-ascii?Q?YXA79VXeCZUFHgu/D8kl56PdHJPa0DiTtLjutk1av7lkiRjImXmkXyIGz1FY?= =?us-ascii?Q?JzKc3sHXEffCdB9f8ZJnDFJRKZFueF2QIudKA4/KO5HU5rvQjtqx12J39Z0+?= =?us-ascii?Q?sYC8mEmpKIbKM8wSvyWO2Aa1EbS1tBiaS5t8qfYvUm3kAipW/RBiiHyQSCeq?= =?us-ascii?Q?fi8eqAMzw20EszQT9cKWz/SUty/Ref35HF/cDRm9oH77goZvwuubO1v4zTeu?= =?us-ascii?Q?m0hLzPQMZR7etJic4ghnUp929RAYcNqIZqVnW0qkSKOacDtgKpW34pF1/Ug9?= =?us-ascii?Q?u6+YzZfCF1z+k0qfsVleEP9+OMW2SyXjl6TH3gx3qC02ClrNLrQDBoPYLvpZ?= =?us-ascii?Q?xrtZ2JSASP199qR7lSWV5SzDgdtVG1SbbT5ZqLUC05kjvjy+//qv/x9Hxmdf?= =?us-ascii?Q?NoVdlgzbDPwK+2oZZuCF2kR++xB5QIu1iiesxxkVK//VzsIH3pBR6YyDZFgo?= =?us-ascii?Q?Y5SZ23qHfoHgkKSh6FQbWP7gNLZ+FiwCeFDDrjAOaD49XQd0h/xZ/Q5+lO2k?= =?us-ascii?Q?YLRwmP25KV3gn4KJhfpRqBHFyzd7lWWmeFEpplw4XpH9HbLlX7avqciBSx2J?= =?us-ascii?Q?tQbqMdFx0BkJnrj84BkwbjtnJygG5ERy4KlntCcyI7eGtfw9d7eL501ZdCU7?= =?us-ascii?Q?Nt/2j4zn6Sq5Qr2xY5LOo09oV1gxVVqhjREuzf9S3iE4Pu111aTa8vO+ofZ8?= =?us-ascii?Q?qlHrJ2j0pB3syicuH751BsIOrmzlKC0X78PXq+px3pJESyKU51TYcL4T0t7w?= =?us-ascii?Q?dUxd3MuylJciXrdm08Mii8awJqsbEmRTH/43lpOlnlixZFCiPA=3D=3D?= X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB5073.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(376014)(366016)(1800799024)(38070700018); DIR:OUT; SFP:1101; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRZPR08MB10999 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM1PEPF000252DC.eurprd07.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: ec1eeb3c-d4ae-4763-d604-08dc96b65e31 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|35042699022|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?LA7pOWm7vJN+YTnf7zSfUJNvE0iqk5JIbF1MN7aMkWkTkCHvWBNdjAEFFKVE?= =?us-ascii?Q?Jsf+CszqIwT0igd5sI2x+HqO00d/rMn+UE8Osj94KWKDEmNrt82Ml//Z87p1?= =?us-ascii?Q?LIp1kz9S6KHXFqq7LmG1SwxyD4G+llwUT5vtyuc+yQlB5XReEKJJc3eASs9f?= =?us-ascii?Q?CNYjcOuQX0Uq6dWmibRli9b8xAAyPGbIwmH2OFmehTq37jArm41G/iP6lZWJ?= =?us-ascii?Q?jzsmTx1l5D58qHvIMyd8VoN2tOAq/SRbSXEb7XBazxYw+L2ye4+q3WwTIyiO?= =?us-ascii?Q?e/6+y1ONcGL2t4B/v7w7wQ63kgagLtd5dlBJItXBxAAjzQbnuhWZp7bLL9hS?= =?us-ascii?Q?JiosjRZ/36TaAsNZbnPynxAP9+RLl9yAoMEU6gtLJw/qFtbRj//pxLcZy55h?= =?us-ascii?Q?oPnBRwrw/JWeykgbKzY5+CX7ZXFvCh7+THmAJ19Vi8Pmhihpx43xlr64xsVK?= =?us-ascii?Q?bdIukW0r/qqX5JHSzQI0Ghsw11LfxPOjWXrvXX2pTWO9/FUZJ3mjHCdvPMXN?= =?us-ascii?Q?uWlQpfCMmrJKdKHj2HZVF7VJCNB9RS1hNhdzZXYVrVlkzqiG3A1z3d1v1OdF?= =?us-ascii?Q?RA3AjVel61BPinFv/noKUJFlydrMuB/FZm2v/VuXi6bDleY0eqQ9nnNfgt+d?= =?us-ascii?Q?w2Eed6vnRL7GVQKkrkAE2XQd5j//oE3v4BT2NW+o7mUPmk9BNdTpRZigOboH?= =?us-ascii?Q?QLG5TNVihL5mmhtrlWBGejJkxpKyBH4Wvqq8nHIfHnguzony9gpc3shzphEX?= =?us-ascii?Q?eyV68zRRKauqZeg+j38hZhYtLlAh9eedzH4iFGg/tDye0+YgNR0Gj0wzD0Mw?= =?us-ascii?Q?ksl6KZDDTOpgUXXj0AVfjsdiymmXxUf3ZSxmSghMiZo+BkyWx7XWRTJRTF8B?= =?us-ascii?Q?TI3Azt1rzI2nyjziLlYgB/jxicR+r3DwRxv8zZG+7IqblAEVdCmd0aGUTK8f?= =?us-ascii?Q?SPtLko1ld8ayapiUXHhflEH5o5sldW6I1OlBWYTJRzF4MbgXjwP4H1uyR5D8?= =?us-ascii?Q?lvcv+maIJVedMgFsycrQ33n0ecZU4pNzVsHrCperuOFlO+c8grEU5T0umSYp?= =?us-ascii?Q?SRvaBiPv2fMQhQ4yVS1oJ9DeRw99AYBFM1l1ejENEoepNEXu6TZ5/c3pBfP0?= =?us-ascii?Q?j4TdKcq1U3FNeiBdY3NGsq9HSUwif0+PE4JN9fCPOgyC+ywaN4leCbo4uiup?= =?us-ascii?Q?Xc9PYMUwMV/mz7UpcJbgkZH7ERdfNFGfMw7hz4Pov0jtwB6MVXZuPID+zBdg?= =?us-ascii?Q?tKhgOYlcYpt/fjYCIaGlZ2J7D3PxaU70r+jta6XsX+fujXR6boKTD4/i5DAc?= =?us-ascii?Q?wZ7Po2VmyYt+rerCnupluRQVlR5Z7Dr/x690DaK4oyoFNnsxARESH/eKRLPI?= =?us-ascii?Q?2jb6yLlPuu47q0SGYGRBTlMMlVoqgsvyudcZ0yu4/ZNxx9zYYV1fNacPfcsS?= =?us-ascii?Q?NKPchbfdKN8Svh4dyWkSid9S8Ucs3Lkj?= X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(35042699022)(376014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jun 2024 14:35:27.5706 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 87c8c1df-39fa-465f-fc18-08dc96b66370 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM1PEPF000252DC.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6659 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Acked-by: Wathsala Vithanage > Subject: [PATCH v1] crypto/ipsec_mb: use new ipad/opad calculation API >=20 > From: Pablo de Lara >=20 > IPSec Multi-buffer library v1.4 added a new API to calculate inner/outer > padding for HMAC-SHAx/MD5. >=20 > Signed-off-by: Pablo de Lara > Signed-off-by: Brian Dooley > --- > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 34 > +++++++++++++++++++++++++- > 1 file changed, 33 insertions(+), 1 deletion(-) >=20 > diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c > b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c > index 69a546697b..b3fdea02ff 100644 > --- a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c > +++ b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c > @@ -13,6 +13,7 @@ struct aesni_mb_op_buf_data { > uint32_t offset; > }; >=20 > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > /** > * Calculate the authentication pre-computes > * > @@ -55,6 +56,7 @@ calculate_auth_precomputes(hash_one_block_t > one_block_hash, > memset(ipad_buf, 0, blocksize); > memset(opad_buf, 0, blocksize); > } > +#endif >=20 > static inline int > is_aead_algo(IMB_HASH_ALG hash_alg, IMB_CIPHER_MODE cipher_mode) > @@ -66,12 +68,14 @@ is_aead_algo(IMB_HASH_ALG hash_alg, > IMB_CIPHER_MODE cipher_mode) >=20 > /** Set session authentication parameters */ static int - > aesni_mb_set_session_auth_parameters(const IMB_MGR *mb_mgr, > +aesni_mb_set_session_auth_parameters(IMB_MGR *mb_mgr, > struct aesni_mb_session *sess, > const struct rte_crypto_sym_xform *xform) { > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_one_block_t hash_oneblock_fn =3D NULL; > unsigned int key_larger_block_size =3D 0; > +#endif > uint8_t hashed_key[HMAC_MAX_BLOCK_SIZE] =3D { 0 }; > uint32_t auth_precompute =3D 1; >=20 > @@ -267,18 +271,24 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > switch (xform->auth.algo) { > case RTE_CRYPTO_AUTH_MD5_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_MD5; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->md5_one_block; > +#endif > break; > case RTE_CRYPTO_AUTH_SHA1_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_HMAC_SHA_1; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->sha1_one_block; > +#endif > if (xform->auth.key.length > get_auth_algo_blocksize( > IMB_AUTH_HMAC_SHA_1)) { > IMB_SHA1(mb_mgr, > xform->auth.key.data, > xform->auth.key.length, > hashed_key); > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > key_larger_block_size =3D 1; > +#endif > } > break; > case RTE_CRYPTO_AUTH_SHA1: > @@ -287,14 +297,18 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > break; > case RTE_CRYPTO_AUTH_SHA224_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_HMAC_SHA_224; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->sha224_one_block; > +#endif > if (xform->auth.key.length > get_auth_algo_blocksize( > IMB_AUTH_HMAC_SHA_224)) { > IMB_SHA224(mb_mgr, > xform->auth.key.data, > xform->auth.key.length, > hashed_key); > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > key_larger_block_size =3D 1; > +#endif > } > break; > case RTE_CRYPTO_AUTH_SHA224: > @@ -303,14 +317,18 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > break; > case RTE_CRYPTO_AUTH_SHA256_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_HMAC_SHA_256; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->sha256_one_block; > +#endif > if (xform->auth.key.length > get_auth_algo_blocksize( > IMB_AUTH_HMAC_SHA_256)) { > IMB_SHA256(mb_mgr, > xform->auth.key.data, > xform->auth.key.length, > hashed_key); > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > key_larger_block_size =3D 1; > +#endif > } > break; > case RTE_CRYPTO_AUTH_SHA256: > @@ -319,14 +337,18 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > break; > case RTE_CRYPTO_AUTH_SHA384_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_HMAC_SHA_384; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->sha384_one_block; > +#endif > if (xform->auth.key.length > get_auth_algo_blocksize( > IMB_AUTH_HMAC_SHA_384)) { > IMB_SHA384(mb_mgr, > xform->auth.key.data, > xform->auth.key.length, > hashed_key); > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > key_larger_block_size =3D 1; > +#endif > } > break; > case RTE_CRYPTO_AUTH_SHA384: > @@ -335,14 +357,18 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > break; > case RTE_CRYPTO_AUTH_SHA512_HMAC: > sess->template_job.hash_alg =3D IMB_AUTH_HMAC_SHA_512; > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > hash_oneblock_fn =3D mb_mgr->sha512_one_block; > +#endif > if (xform->auth.key.length > get_auth_algo_blocksize( > IMB_AUTH_HMAC_SHA_512)) { > IMB_SHA512(mb_mgr, > xform->auth.key.data, > xform->auth.key.length, > hashed_key); > +#if IMB_VERSION(1, 3, 0) >=3D IMB_VERSION_NUM > key_larger_block_size =3D 1; > +#endif > } > break; > case RTE_CRYPTO_AUTH_SHA512: > @@ -376,6 +402,11 @@ aesni_mb_set_session_auth_parameters(const > IMB_MGR *mb_mgr, > return 0; >=20 > /* Calculate Authentication precomputes */ > +#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM > + imb_hmac_ipad_opad(mb_mgr, sess- > >template_job.hash_alg, > + xform->auth.key.data, xform- > >auth.key.length, > + sess->auth.pads.inner, sess- > >auth.pads.outer); #else > if (key_larger_block_size) { > calculate_auth_precomputes(hash_oneblock_fn, > sess->auth.pads.inner, sess->auth.pads.outer, @@ - > 389,6 +420,7 @@ aesni_mb_set_session_auth_parameters(const IMB_MGR > *mb_mgr, > xform->auth.key.length, > get_auth_algo_blocksize(sess- > >template_job.hash_alg)); > } > +#endif > sess->template_job.u.HMAC._hashed_auth_key_xor_ipad =3D > sess->auth.pads.inner; > sess->template_job.u.HMAC._hashed_auth_key_xor_opad =3D > -- > 2.25.1