net/iavf: enable IRQ mapping configuration for large VF
[dpdk.git] / drivers / crypto / aesni_mb / aesni_mb_pmd_private.h
index 601ab9a..11e7bf5 100644 (file)
@@ -7,7 +7,7 @@
 
 #include <intel-ipsec-mb.h>
 
-#if defined(RTE_LIBRTE_SECURITY) && (IMB_VERSION_NUM) >= IMB_VERSION(0, 54, 0)
+#if defined(RTE_LIB_SECURITY) && (IMB_VERSION_NUM) >= IMB_VERSION(0, 54, 0)
 #define AESNI_MB_DOCSIS_SEC_ENABLED 1
 #include <rte_security.h>
 #include <rte_security_driver.h>
@@ -56,7 +56,9 @@ static const unsigned auth_blocksize[] = {
                [PLAIN_SHA_384]                 = 128,
                [PLAIN_SHA_512]                 = 128,
 #if IMB_VERSION(0, 53, 3) <= IMB_VERSION_NUM
-               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 16
+               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 16,
+               [IMB_AUTH_SNOW3G_UIA2_BITLEN]   = 16,
+               [IMB_AUTH_KASUMI_UIA1]          = 16
 #endif
 };
 
@@ -83,14 +85,16 @@ static const unsigned auth_truncated_digest_byte_lengths[] = {
                [AES_CMAC]                      = 12,
                [AES_CCM]                       = 8,
                [NULL_HASH]                     = 0,
-               [AES_GMAC]                      = 16,
+               [AES_GMAC]                      = 12,
                [PLAIN_SHA1]                    = 20,
                [PLAIN_SHA_224]                 = 28,
                [PLAIN_SHA_256]                 = 32,
                [PLAIN_SHA_384]                 = 48,
                [PLAIN_SHA_512]                 = 64,
 #if IMB_VERSION(0, 53, 3) <= IMB_VERSION_NUM
-               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 4
+               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 4,
+               [IMB_AUTH_SNOW3G_UIA2_BITLEN]   = 4,
+               [IMB_AUTH_KASUMI_UIA1]          = 4
 #endif
 };
 
@@ -117,7 +121,7 @@ static const unsigned auth_digest_byte_lengths[] = {
                [AES_XCBC]                      = 16,
                [AES_CMAC]                      = 16,
                [AES_CCM]                       = 16,
-               [AES_GMAC]                      = 12,
+               [AES_GMAC]                      = 16,
                [NULL_HASH]                     = 0,
                [PLAIN_SHA1]                    = 20,
                [PLAIN_SHA_224]                 = 28,
@@ -125,7 +129,9 @@ static const unsigned auth_digest_byte_lengths[] = {
                [PLAIN_SHA_384]                 = 48,
                [PLAIN_SHA_512]                 = 64,
 #if IMB_VERSION(0, 53, 3) <= IMB_VERSION_NUM
-               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 4
+               [IMB_AUTH_ZUC_EIA3_BITLEN]      = 4,
+               [IMB_AUTH_SNOW3G_UIA2_BITLEN]   = 4,
+               [IMB_AUTH_KASUMI_UIA1]          = 4
 #endif
        /**< Vector mode dependent pointer table of the multi-buffer APIs */
 
@@ -238,6 +244,12 @@ struct aesni_mb_session {
                        /**< Expanded GCM key */
                        uint8_t zuc_cipher_key[16];
                        /**< ZUC cipher key */
+#if IMB_VERSION(0, 53, 3) <= IMB_VERSION_NUM
+                       snow3g_key_schedule_t pKeySched_snow3g_cipher;
+                       /**< SNOW3G scheduled cipher key */
+                       kasumi_key_sched_t pKeySched_kasumi_cipher;
+                       /**< KASUMI scheduled cipher key */
+#endif
                };
        } cipher;
 
@@ -279,6 +291,12 @@ struct aesni_mb_session {
                        /**< Expanded XCBC authentication keys */
                        uint8_t zuc_auth_key[16];
                        /**< ZUC authentication key */
+#if IMB_VERSION(0, 53, 3) <= IMB_VERSION_NUM
+                       snow3g_key_schedule_t pKeySched_snow3g_auth;
+                       /**< SNOW3G scheduled authentication key */
+                       kasumi_key_sched_t pKeySched_kasumi_auth;
+                       /**< KASUMI scheduled authentication key */
+#endif
                };
        /** Generated digest size by the Multi-buffer library */
        uint16_t gen_digest_len;