| 224e37a6 | 20-Jan-2025 |
Stephen Hemminger <stephen@networkplumber.org> |
crypto/cnxk: fix build with GCC 15
GCC 15 produces warnings about uninitialized variables.
In file included from ../lib/mbuf/rte_mbuf.h:36, from ../lib/cryptodev/rte_crypto.h:15,
crypto/cnxk: fix build with GCC 15
GCC 15 produces warnings about uninitialized variables.
In file included from ../lib/mbuf/rte_mbuf.h:36, from ../lib/cryptodev/rte_crypto.h:15, from ../lib/cryptodev/rte_cryptodev.h:19, from ../drivers/crypto/cnxk/cn9k_cryptodev_ops.c:5: In function ‘pdcp_chain_sg1_prep’, inlined from ‘cpt_pdcp_chain_alg_prep’ at ../drivers/crypto/cnxk/cnxk_se.h:1621:11, inlined from ‘fill_pdcp_chain_params’ at ../drivers/crypto/cnxk/cnxk_se.h:3114:8, inlined from ‘cpt_sym_inst_fill’ at ../drivers/crypto/cnxk/cnxk_se.h:3364:9, inlined from ‘cn9k_cpt_inst_prep’ at ../drivers/crypto/cnxk/cn9k_cryptodev_ops.c:93:10: ../lib/eal/include/rte_common.h:469:38: warning: ‘fc_params.meta_buf.vaddr’ may be used uninitialized [-Wmaybe-uninitialized] 469 | #define RTE_PTR_ADD(ptr, x) ((void*)((uintptr_t)(ptr) + (x))) | ^~~~~~~~~~~~~~~~ ../drivers/common/cnxk/roc_platform.h:47:34: note: in expansion of macro ‘RTE_PTR_ADD’ 47 | #define PLT_PTR_ADD RTE_PTR_ADD | ^~~~~~~~~~~ ../drivers/crypto/cnxk/cnxk_se.h:900:19: note: in expansion of macro ‘PLT_PTR_ADD’ 900 | m_vaddr = PLT_PTR_ADD(m_vaddr, ROC_SE_OFF_CTRL_LEN + PLT_ALIGN_CEIL(hdr_len, 8)); | ^~~~~~~~~~~ In file included from ../drivers/crypto/cnxk/cn9k_cryptodev_ops.c:20: ../drivers/crypto/cnxk/cnxk_se.h: In function ‘cn9k_cpt_inst_prep’: ../drivers/crypto/cnxk/cnxk_se.h:3008:33: note: ‘fc_params.meta_buf.vaddr’ was declared here 3008 | struct roc_se_fc_params fc_params; | ^~~~~~~~~ In function ‘pdcp_chain_sg1_prep’, inlined from ‘cpt_pdcp_chain_alg_prep’ at ../drivers/crypto/cnxk/cnxk_se.h:1621:11, inlined from ‘fill_pdcp_chain_params’ at ../drivers/crypto/cnxk/cnxk_se.h:3114:8, inlined from ‘cpt_sym_inst_fill’ at ../drivers/crypto/cnxk/cnxk_se.h:3364:9, inlined from ‘cn9k_cpt_inst_prep’ at ../drivers/crypto/cnxk/cn9k_cryptodev_ops.c:82:10: ../lib/eal/include/rte_common.h:469:38: warning: ‘fc_params.meta_buf.vaddr’ may be used uninitialized [-Wmaybe-uninitialized] 469 | #define RTE_PTR_ADD(ptr, x) ((void*)((uintptr_t)(ptr) + (x))) | ^~~~~~~~~~~~~~~~ ../drivers/common/cnxk/roc_platform.h:47:34: note: in expansion of macro ‘RTE_PTR_ADD’ 47 | #define PLT_PTR_ADD RTE_PTR_ADD | ^~~~~~~~~~~ ../drivers/crypto/cnxk/cnxk_se.h:900:19: note: in expansion of macro ‘PLT_PTR_ADD’ 900 | m_vaddr = PLT_PTR_ADD(m_vaddr, ROC_SE_OFF_CTRL_LEN + PLT_ALIGN_CEIL(hdr_len, 8)); | ^~~~~~~~~~~ ../drivers/crypto/cnxk/cnxk_se.h: In function ‘cn9k_cpt_inst_prep’: ../drivers/crypto/cnxk/cnxk_se.h:3008:33: note: ‘fc_params.meta_buf.vaddr’ was declared here 3008 | struct roc_se_fc_params fc_params; | ^~~~~~~~~
Fixes: d3bff77cc371 ("crypto/cnxk: separate out PDCP chain datapath") Cc: stable@dpdk.org
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org> Acked-by: David Marchand <david.marchand@redhat.com>
show more ...
|
| 20e633b0 | 06-Nov-2024 |
Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com> |
crypto/qat: fix ECDSA session handling
Fixed a problem with setting the key in the session in the ECDSA algorithm. Since the key is being initialized in the session for EC, it should be reflected in
crypto/qat: fix ECDSA session handling
Fixed a problem with setting the key in the session in the ECDSA algorithm. Since the key is being initialized in the session for EC, it should be reflected in the PMD session initialization function.
Fixes: badc0c6f6d6a ("cryptodev: set private and public keys in EC session") Cc: stable@dpdk.org
Signed-off-by: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
show more ...
|
| 5b2fe7ef | 31-Oct-2024 |
Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com> |
crypto/qat: fix modexp/inv length
This commit fixes an unset length in modular algorithms in QAT asymmetric crypto PMD.
Fixes: 3b78aa7b2317 ("crypto/qat: refactor asymmetric crypto functions") Cc:
crypto/qat: fix modexp/inv length
This commit fixes an unset length in modular algorithms in QAT asymmetric crypto PMD.
Fixes: 3b78aa7b2317 ("crypto/qat: refactor asymmetric crypto functions") Cc: stable@dpdk.org
Signed-off-by: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
show more ...
|
| c5819b0d | 17-Oct-2024 |
Stephen Hemminger <stephen@networkplumber.org> |
crypto/openssl: fix potential string overflow
The algorithm name is a string and should be copied with strlcpy() rather than rte_memcpy(). This fixes a warning detected with clang and ASAN.
Bugzill
crypto/openssl: fix potential string overflow
The algorithm name is a string and should be copied with strlcpy() rather than rte_memcpy(). This fixes a warning detected with clang and ASAN.
Bugzilla ID: 1565 Fixes: 2b9c693f6ef5 ("crypto/openssl: support AES-CMAC operations") Cc: stable@dpdk.org
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
show more ...
|
| 32d8bc55 | 24-Oct-2024 |
Barry Cao <barry.cao@nxp.com> |
crypto/dpaa_sec: support UDP-encapsulated ESP
This patch enables support for NAT-T traversal in IPSEC ESP protocol offload mode.
Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com> Signed-off-by
crypto/dpaa_sec: support UDP-encapsulated ESP
This patch enables support for NAT-T traversal in IPSEC ESP protocol offload mode.
Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com> Signed-off-by: Barry Cao <barry.cao@nxp.com>
show more ...
|
| 123098cd | 24-Oct-2024 |
Gagandeep Singh <g.singh@nxp.com> |
crypto/dpaa_sec: enhance IPsec extended sequence number
Setting ESN seq number initialization. Initialize the sequence number of ESP to 1.
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Signed-of
crypto/dpaa_sec: enhance IPsec extended sequence number
Setting ESN seq number initialization. Initialize the sequence number of ESP to 1.
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Signed-off-by: Barry Cao <barry.cao@nxp.com>
show more ...
|
| 662811cb | 10-Oct-2024 |
Gagandeep Singh <g.singh@nxp.com> |
crypto/dpaa2_sec: rework debug logs
Move the duplicate code in a common function and remove un-necessary newline characters from the logs.
Signed-off-by: Jun Yang <jun.yang@nxp.com> Signed-off-by:
crypto/dpaa2_sec: rework debug logs
Move the duplicate code in a common function and remove un-necessary newline characters from the logs.
Signed-off-by: Jun Yang <jun.yang@nxp.com> Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
show more ...
|
| 0c2f1b05 | 03-Oct-2024 |
Brian Dooley <brian.dooley@intel.com> |
crypto/ipsec_mb: support SM4 algorithm
This patch introduces SM4 CBC, SM4 ECB and SM4 CTR algorithm support to the AESNI_MB PMD. SM4 CTR is available in the v2.0 release of Intel IPsec MB.
Signed-o
crypto/ipsec_mb: support SM4 algorithm
This patch introduces SM4 CBC, SM4 ECB and SM4 CTR algorithm support to the AESNI_MB PMD. SM4 CTR is available in the v2.0 release of Intel IPsec MB.
Signed-off-by: Brian Dooley <brian.dooley@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|