From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id 3EA321B51F for ; Thu, 7 Feb 2019 14:28:13 +0100 (CET) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8447C171218; Thu, 7 Feb 2019 13:28:12 +0000 (UTC) Received: from ktraynor.remote.csb (unknown [10.33.36.135]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7E39B600D7; Thu, 7 Feb 2019 13:28:11 +0000 (UTC) From: Kevin Traynor To: Fiona Trahe Cc: Arek Kusztal , dpdk stable Date: Thu, 7 Feb 2019 13:25:47 +0000 Message-Id: <20190207132614.20538-41-ktraynor@redhat.com> In-Reply-To: <20190207132614.20538-1-ktraynor@redhat.com> References: <20190207132614.20538-1-ktraynor@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Thu, 07 Feb 2019 13:28:12 +0000 (UTC) Subject: [dpdk-stable] patch 'doc: add GCM AAD limitation in qat guide' has been queued to LTS release 18.11.1 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 07 Feb 2019 13:28:13 -0000 Hi, FYI, your patch has been queued to LTS release 18.11.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 02/14/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Thanks. Kevin Traynor --- >>From e9fa1954dca7b357b5f16ae0602c09609c294dda Mon Sep 17 00:00:00 2001 From: Fiona Trahe Date: Thu, 17 Jan 2019 18:23:19 +0000 Subject: [PATCH] doc: add GCM AAD limitation in qat guide [ upstream commit 2a7bb4fdf61e9edfb7adbaecb50e728b82da9e23 ] Add limitation that AAD buffer must be padded with zeroes in GCM case. Fixes: d4f44265a1d7 ("doc: add limitation of AAD size to QAT guide") Signed-off-by: Fiona Trahe Acked-by: Arek Kusztal --- doc/guides/cryptodevs/qat.rst | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/doc/guides/cryptodevs/qat.rst b/doc/guides/cryptodevs/qat.rst index 9fb9f01d1..3ca70bc05 100644 --- a/doc/guides/cryptodevs/qat.rst +++ b/doc/guides/cryptodevs/qat.rst @@ -80,8 +80,7 @@ Limitations * No BSD support as BSD QAT kernel driver not available. * ZUC EEA3/EIA3 is not supported by dh895xcc devices -* Maximum additional authenticated data (AAD) for GCM is 240 bytes long. +* Maximum additional authenticated data (AAD) for GCM is 240 bytes long and must be passed to the device in a buffer rounded up to the nearest block-size multiple (x16) and padded with zeros. * Queue pairs are not thread-safe (that is, within a single queue pair, RX and TX from different lcores is not supported). - Extra notes on KASUMI F9 ~~~~~~~~~~~~~~~~~~~~~~~~ -- 2.19.0 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-02-07 13:19:56.500797629 +0000 +++ 0041-doc-add-GCM-AAD-limitation-in-qat-guide.patch 2019-02-07 13:19:55.000000000 +0000 @@ -1,13 +1,14 @@ -From 2a7bb4fdf61e9edfb7adbaecb50e728b82da9e23 Mon Sep 17 00:00:00 2001 +From e9fa1954dca7b357b5f16ae0602c09609c294dda Mon Sep 17 00:00:00 2001 From: Fiona Trahe Date: Thu, 17 Jan 2019 18:23:19 +0000 Subject: [PATCH] doc: add GCM AAD limitation in qat guide +[ upstream commit 2a7bb4fdf61e9edfb7adbaecb50e728b82da9e23 ] + Add limitation that AAD buffer must be padded with zeroes in GCM case. Fixes: d4f44265a1d7 ("doc: add limitation of AAD size to QAT guide") -Cc: stable@dpdk.org Signed-off-by: Fiona Trahe Acked-by: Arek Kusztal