> -----Original Message----- > From: Power, Ciara <ciara.po...@intel.com> > Sent: Wednesday, September 29, 2021 5:30 PM > To: dev@dpdk.org > Cc: Zhang, Roy Fan <roy.fan.zh...@intel.com>; Bronowski, PiotrX > <piotrx.bronow...@intel.com>; gak...@marvell.com; Power, Ciara > <ciara.po...@intel.com>; Thomas Monjalon <tho...@monjalon.net>; De Lara > Guarch, Pablo <pablo.de.lara.gua...@intel.com>; Ray Kinsella > <m...@ashroe.eu> > Subject: [PATCH v3 03/10] drivers/crypto: move aesni-mb PMD to IPsec-mb > framework > > From: Piotr Bronowski <piotrx.bronow...@intel.com> > > This patch removes the crypto/aesni_mb folder and gathers all > aesni-mb PMD implementation specific details into a single file, > pmd_aesni_mb.c in crypto/ipsec_mb. > > Now that intel-ipsec-mb v1.0 is the minimum supported version, old > macros can be replaced with the newer macros supported by this version. > > Signed-off-by: Piotr Bronowski <piotrx.bronow...@intel.com> > Signed-off-by: Ciara Power <ciara.po...@intel.com> >
... > deps += ['bus_vdev', 'net', 'security'] > diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c ... > + .xform_type = RTE_CRYPTO_SYM_XFORM_AEAD, > + {.aead = { > + .algo = > RTE_CRYPTO_AEAD_CHACHA20_POLY1305, > + .block_size = 64, > + .key_size = { > + .min = 32, > + .max = 32, > + .increment = 0 > + }, > + .digest_size = { > + .min = 16, > + .max = 16, > + .increment = 0 > + }, > + .aad_size = { > + .min = 0, > + .max = 240, We support more than 240 bytes of AAD. I think we can support up to 1024 bytes. Could you change it here? > + .increment = 1 > + }, > + .iv_size = { > + .min = 12, > + .max = 12, > + .increment = 0 > + }, > + }, } > + }, } > + }, > + RTE_CRYPTODEV_END_OF_CAPABILITIES_LIST() ... > +static int > +aesni_mb_set_session_auth_parameters(const IMB_MGR *mb_mgr, ... > + case IMB_KEY_192_BYTES: > + IMB_AES192_GCM_PRE(mb_mgr, xform- > >auth.key.data, > + &sess->cipher.gcm_key); > + sess->cipher.key_length_in_bytes = > IMB_KEY_192_BYTES; > + break; > + case IMB_KEY_256_BYTES: > + IMB_AES256_GCM_PRE(mb_mgr, xform- > >auth.key.data, > + &sess->cipher.gcm_key); > + sess->cipher.key_length_in_bytes = > IMB_KEY_256_BYTES; > + break; > + default: > + RTE_LOG(ERR, PMD, "failed to parse test type\n"); Wrong error message. This should say something like "Wrong authentication key length". Also, the same message is present for the cipher key length, for GCM. Thanks, Pablo