From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B4B2F45C9B for ; Tue, 12 Nov 2024 23:10:20 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id AD30F4064C; Tue, 12 Nov 2024 23:10:20 +0100 (CET) Received: from mail-wr1-f50.google.com (mail-wr1-f50.google.com [209.85.221.50]) by mails.dpdk.org (Postfix) with ESMTP id 19FDD4064C for ; Tue, 12 Nov 2024 23:10:20 +0100 (CET) Received: by mail-wr1-f50.google.com with SMTP id ffacd0b85a97d-37d4ac91d97so5702917f8f.2 for ; Tue, 12 Nov 2024 14:10:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1731449420; x=1732054220; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Y2cuMTeIzKQGI3CpnaMmRob+eBZoH01Q+p1IuKBNBEQ=; b=gPJxdPuxXTc0rGxVJ1D9dMdDQDht7oP5j9+HYDVEPzkVtB88dso5dUZhNMzB3G9s41 dVi1biBiufMjTl2sU2iF/iiXyOH0q2D/lGEu+IsPZTAF5F6dO8Q6GmNxcj0W/WuSL8zw cic7T1xIXEa2tGxfSBulTGYw2XD+UOCJqxFKvpttQrSh2JelwoNVy8783kuW1OG8TRKi p6kmkm3LnfYrjWkipj1g4UtSJlZoHrqpHc0+Xogpj39X1nh8x9ZFaCNbbFuR4ws3z8Wi 4jELylj1ZXZCKjGV98UhS5xIdUgS+/aYaloBTOnp42jHcYMh4dMZW4Gl4fD9/aCCVkSi BamQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731449420; x=1732054220; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Y2cuMTeIzKQGI3CpnaMmRob+eBZoH01Q+p1IuKBNBEQ=; b=wV8AHK3+kNozsAhbnPle6G5iMxkL0geiD4G2Mcaj1DbFcRMaxRgr0akBX1ekbdRF1Q blEos4O6IwrF6/NG5qhJkALE/f+XyxQPUq8C5f90dLvVE2DyJaxAkOq400jGfqJaIsU0 agC8SUJL03lVK9YLdl9jSWHhSQY5Y6n0RyLOaP6ie3NbiP3Fsh01jmjjhOPa5xaZee2c mEycDGLwuQObbV6Vg/PGtZTF7ltnYctRnD9/CsEo1pr44zmsTboZjiLF9OPeGn0LmbmQ u7EGC+G97b8ZuvkhsrQxxy24jVERohl+1ueLGyCl0pgHahsWiT+CGNNYW3/RIJUafzb5 S5tg== X-Gm-Message-State: AOJu0Ywqw7/86HCn3YjwMjnYdOhowXiEmkGbtIWCf9tmZXDPKsOf9qLf ttnu49hZL0jR3k2ZHZRqFQCtFQFmsFbkThKjnZZiZJaLAnazWtQ8UPwi2A== X-Google-Smtp-Source: AGHT+IEFo1thAbt5HmBDPj2MXaXChEkzQXjNjd5OTO+DszDRnILTodiv+zRGE7GC8FZP+MWdFGoVnA== X-Received: by 2002:a05:6000:2a1:b0:374:c658:706e with SMTP id ffacd0b85a97d-381f1884860mr19948287f8f.39.1731449419618; Tue, 12 Nov 2024 14:10:19 -0800 (PST) Received: from localhost ([2a01:4b00:d036:ae00:e89d:e9a1:da72:2f9d]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-381ed9ea6b5sm16655236f8f.84.2024.11.12.14.10.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Nov 2024 14:10:18 -0800 (PST) From: luca.boccassi@gmail.com To: Arkadiusz Kusztal Cc: dpdk stable Subject: patch 'crypto/qat: fix modexp/inv length' has been queued to stable release 22.11.7 Date: Tue, 12 Nov 2024 22:07:50 +0000 Message-ID: <20241112220754.666489-40-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.45.2 In-Reply-To: <20241112220754.666489-1-luca.boccassi@gmail.com> References: <20241023211704.1216956-79-luca.boccassi@gmail.com> <20241112220754.666489-1-luca.boccassi@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 22.11.7 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 11/14/24. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/bluca/dpdk-stable This queued commit can be viewed at: https://github.com/bluca/dpdk-stable/commit/ff8e326ee23987703817b168dddc554bdbd8715c Thanks. Luca Boccassi --- >From ff8e326ee23987703817b168dddc554bdbd8715c Mon Sep 17 00:00:00 2001 From: Arkadiusz Kusztal Date: Thu, 31 Oct 2024 19:19:17 +0000 Subject: [PATCH] crypto/qat: fix modexp/inv length [ upstream commit 5b2fe7ef3c1b731f086d9454262a530a082b0441 ] This commit fixes an unset length in modular algorithms in QAT asymmetric crypto PMD. Fixes: 3b78aa7b2317 ("crypto/qat: refactor asymmetric crypto functions") Signed-off-by: Arkadiusz Kusztal --- drivers/crypto/qat/qat_asym.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c index 82e165538d..e67ebe4f9f 100644 --- a/drivers/crypto/qat/qat_asym.c +++ b/drivers/crypto/qat/qat_asym.c @@ -268,6 +268,7 @@ modexp_collect(struct rte_crypto_asym_op *asym_op, rte_memcpy(modexp_result, cookie->output_array[0] + alg_bytesize - n.length, n.length); + asym_op->modex.result.length = alg_bytesize; HEXDUMP("ModExp result", cookie->output_array[0], alg_bytesize); return RTE_CRYPTO_OP_STATUS_SUCCESS; @@ -329,6 +330,7 @@ modinv_collect(struct rte_crypto_asym_op *asym_op, - n.length), cookie->output_array[0] + alg_bytesize - n.length, n.length); + asym_op->modinv.result.length = alg_bytesize; HEXDUMP("ModInv result", cookie->output_array[0], alg_bytesize); return RTE_CRYPTO_OP_STATUS_SUCCESS; -- 2.45.2 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2024-11-12 22:06:59.939641525 +0000 +++ 0040-crypto-qat-fix-modexp-inv-length.patch 2024-11-12 22:06:58.695307642 +0000 @@ -1 +1 @@ -From 5b2fe7ef3c1b731f086d9454262a530a082b0441 Mon Sep 17 00:00:00 2001 +From ff8e326ee23987703817b168dddc554bdbd8715c Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 5b2fe7ef3c1b731f086d9454262a530a082b0441 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org @@ -18 +19 @@ -index 9e97582e22..7bb2f6c1e0 100644 +index 82e165538d..e67ebe4f9f 100644 @@ -21 +22 @@ -@@ -277,6 +277,7 @@ modexp_collect(struct rte_crypto_asym_op *asym_op, +@@ -268,6 +268,7 @@ modexp_collect(struct rte_crypto_asym_op *asym_op, @@ -29 +30 @@ -@@ -338,6 +339,7 @@ modinv_collect(struct rte_crypto_asym_op *asym_op, +@@ -329,6 +330,7 @@ modinv_collect(struct rte_crypto_asym_op *asym_op,