Message ID | 20180814003848.11095-1-pablo.de.lara.guarch@intel.com (mailing list archive) |
---|---|
Headers |
Return-Path: <dev-bounces@dpdk.org> X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id CE7AB397D; Tue, 14 Aug 2018 10:45:17 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by dpdk.org (Postfix) with ESMTP id 92EBD1E2F for <dev@dpdk.org>; Tue, 14 Aug 2018 10:45:16 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Aug 2018 01:45:14 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,237,1531810800"; d="scan'208";a="224482004" Received: from silpixa00399466.ir.intel.com (HELO silpixa00399466.ger.corp.intel.com) ([10.237.223.220]) by orsmga004.jf.intel.com with ESMTP; 14 Aug 2018 01:45:13 -0700 From: Pablo de Lara <pablo.de.lara.guarch@intel.com> To: declan.doherty@intel.com Cc: dev@dpdk.org, Pablo de Lara <pablo.de.lara.guarch@intel.com> Date: Tue, 14 Aug 2018 01:38:43 +0100 Message-Id: <20180814003848.11095-1-pablo.de.lara.guarch@intel.com> X-Mailer: git-send-email 2.17.1 Subject: [dpdk-dev] [PATCH 0/5] AESNI MB PMD changes X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions <dev.dpdk.org> List-Unsubscribe: <https://mails.dpdk.org/options/dev>, <mailto:dev-request@dpdk.org?subject=unsubscribe> List-Archive: <http://mails.dpdk.org/archives/dev/> List-Post: <mailto:dev@dpdk.org> List-Help: <mailto:dev-request@dpdk.org?subject=help> List-Subscribe: <https://mails.dpdk.org/listinfo/dev>, <mailto:dev-request@dpdk.org?subject=subscribe> Errors-To: dev-bounces@dpdk.org Sender: "dev" <dev-bounces@dpdk.org> |
Series |
AESNI MB PMD changes
|
|
Message
De Lara Guarch, Pablo
Aug. 14, 2018, 12:38 a.m. UTC
The Multi-buffer library supports full digest sizes for the HMAC algorithms (except for MD5), from 0.50 version. Also, since 0.50, keys larger than the algorithm block size can be used for HMAC algorithms, performing a hash on the key. Therefore, the AESNI MB PMD now supports any key size for the HMAC algorithms and any truncated digest size for any SHAx-HMAC and AES-CMAC algorithm. Pablo de Lara (5): crypto/aesni_mb: support all truncated HMAC digest sizes crypto/aesni_mb: check for invalid digest size crypto/aesni_mb: fix truncated digest size for CMAC crypto/aesni_mb: support all truncated CMAC digest sizes crypto/aesni_mb: support large HMAC key sizes drivers/crypto/aesni_mb/aesni_mb_ops.h | 61 ++++++ drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 180 +++++++++++++++--- .../crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 60 +++++- .../aesni_mb/rte_aesni_mb_pmd_private.h | 24 +-- 4 files changed, 285 insertions(+), 40 deletions(-)
Comments
> The Multi-buffer library supports full digest sizes for the HMAC algorithms > (except for MD5), from 0.50 version. > Also, since 0.50, keys larger than the algorithm block size can be used for > HMAC algorithms, performing a hash on the key. > > Therefore, the AESNI MB PMD now supports any key size for the HMAC > algorithms and any truncated digest size for any SHAx-HMAC and AES-CMAC > algorithm. > > Pablo de Lara (5): > crypto/aesni_mb: support all truncated HMAC digest sizes > crypto/aesni_mb: check for invalid digest size > crypto/aesni_mb: fix truncated digest size for CMAC > crypto/aesni_mb: support all truncated CMAC digest sizes > crypto/aesni_mb: support large HMAC key sizes > > drivers/crypto/aesni_mb/aesni_mb_ops.h | 61 ++++++ > drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 180 +++++++++++++++--- > .../crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 60 +++++- > .../aesni_mb/rte_aesni_mb_pmd_private.h | 24 +-- > 4 files changed, 285 insertions(+), 40 deletions(-) > Series-Acked-by: Marko Kovacevic <marko.kovacevic@intel.com>
On 8/14/2018 6:08 AM, Pablo de Lara wrote: > The Multi-buffer library supports full digest sizes for the HMAC > algorithms (except for MD5), from 0.50 version. > Also, since 0.50, keys larger than the algorithm block size > can be used for HMAC algorithms, performing a hash on the key. > > Therefore, the AESNI MB PMD now supports any key size for > the HMAC algorithms and any truncated digest size for any > SHAx-HMAC and AES-CMAC algorithm. > > Pablo de Lara (5): > crypto/aesni_mb: support all truncated HMAC digest sizes > crypto/aesni_mb: check for invalid digest size > crypto/aesni_mb: fix truncated digest size for CMAC > crypto/aesni_mb: support all truncated CMAC digest sizes > crypto/aesni_mb: support large HMAC key sizes > > drivers/crypto/aesni_mb/aesni_mb_ops.h | 61 ++++++ > drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 180 +++++++++++++++--- > .../crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 60 +++++- > .../aesni_mb/rte_aesni_mb_pmd_private.h | 24 +-- > 4 files changed, 285 insertions(+), 40 deletions(-) > Series applied to dpdk-next-crypto Thanks