On Fri, 2021-12-03 at 08:54 +0100, christian.ehrha...@canonical.com
wrote:
> From: Christian Ehrhardt
>
> The candidate list for backports lists partial fixes like:
> "(21.02 (partially fixed in 21.08))"
> That is useful to identify fixes menat for later releases, but
> indirectly applying to ol
On Fri, 2021-12-03 at 08:54 +0100, christian.ehrha...@canonical.com
wrote:
> From: Christian Ehrhardt
>
> It was important in the past to select anything with "fix" in the
> headline, but recently more often created false positives and work
> to sort tihngs out than identifying many helpful patch
On Sun, 5 Dec 2021 12:33:57 +0530
Jerin Jacob wrote:
> On Sat, Dec 4, 2021 at 11:08 PM Stephen Hemminger
> wrote:
> >
> > On Sat, 4 Dec 2021 22:54:58 +0530
> > wrote:
> >
> > > + /**
> > > + * Maximum supported traffic class as per PFC (802.1Qbb)
> > > specification.
> > > + *
- On Nov 30, 2021, at 7:42 AM, Bruce Richardson bruce.richard...@intel.com
wrote:
> On Mon, Nov 29, 2021 at 02:45:15PM -0600, Lewis Donzis wrote:
>>Hello.
>>We just upgraded from 21.08 to 21.11 and it's rather astounding the
>>number of incompatible changes in three months. No
On Tue, Nov 30, 2021 at 1:30 AM wrote:
>
> From: Liron Himi
>
> add references to REE files from ROC files
>
> Signed-off-by: Liron Himi
> ---
> cnxk_logtype_nix;
> cnxk_logtype_npa;
> cnxk_logtype_npc;
> + cnxk_logtype_ree;
> cnxk_logtype_sso;
> cnx
> Subject: [PATCH] examples/ipsec-secgw: fix event dev start sequence
>
> Start eventdev after complete initialization of event dev, rx adapter and tx
> adapter.
>
> Fixes: e0b0e55c8f15 ("examples/ipsec-secgw: add framework for event
> helper")
> Cc: ano...@marvell.com
> Cc: sta...@dpdk.org
>
Hi,
This patch is not just for map update.
what about all other changes?
Liron Himi
Park Azorim, Kyriat Arie, Petah Tikva, 49527, Israel
Mobile: +972.52.3329169
-Original Message-
From: Jerin Jacob
Sent: Monday, 6 December 2021 07:08
To: Liron Himi
Cc: Jerin Jacob Kollanukkaran ;
Add new tests to lookaside IPsec tests.
* Support for chained operations.
* AES-CBC 128 NULL auth known vector tests.
* AES-CBC 128 HMAC-SHA256 known vector tests.
* AES-CBC 128 HMAC-SHA384 known vector tests.
* AES-CBC 128 HMAC-SHA512 known vector tests.
* NULL cipher AES-XCBC known vector tests.
Extend the framework to support chained operations and add
AES-CBC 128 known vector tests.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 62 ++--
app/test/test_cryptodev_security_ipsec.c | 51 ++
app/test/test_cryptodev_security_
From: Tejasree Kondoj
Adding lookaside IPsec AES-CBC-HMAC-SHA256 test cases.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 12 ++-
app/test/test_cryptodev_security_ipsec.h | 3 +
.../test_cryptodev_security_ipsec_test_vectors.h | 109 +++
Extend lookaside IPsec combined mode cases to cover chained operations
also.
Currently covering combinations of,
Ciphers,
1. AES-128-CBC
Auth,
1. NULL
2. SHA2-256 [16B ICV]
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 11 +++--
app/test/test_cryptodev_security_ip
From: Tejasree Kondoj
Add IPv6 known vector and combined mode tests.
Following modes are added:
Tunnel IPv6 in IPv6
Tunnel IPv4 in IPv4
Tunnel IPv4 in IPv6
Tunnel IPv6 in IPv4
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 102 ++-
app/test/tes
From: Tejasree Kondoj
Add lookaside IPsec HMAC-SHA384/512 known vectors.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 20 ++
app/test/test_cryptodev_security_ipsec.h | 14 +-
.../test_cryptodev_security_ipsec_test_vectors.h | 213 +++
13 matches
Mail list logo