#include "crypto.h"
-#define NUM_HMAC (10)
-#define NUM_CRYPTO (7)
-
-
/* CIPHER KEY LENGTHS */
#define KEY_SIZE_64_IN_BYTES (64 / 8)
#define KEY_SIZE_56_IN_BYTES (56 / 8)
* +18 takes this to the next cache line.
*/
-#define CRYPTO_OFFSET_TO_OPDATA (ETHER_MAX_LEN+18)
+#define CRYPTO_OFFSET_TO_OPDATA (ETHER_MAX_LEN+18)
/*
* Default number of requests to place on the hardware ring before kicking the
return CPA_STATUS_SUCCESS;
}
+ /* Set flags for digest operations */
+ sessionSetupData.digestIsAppended = CPA_FALSE;
+ sessionSetupData.verifyDigest = CPA_TRUE;
+
/* Get the session context size based on the crypto and/or hash operations*/
status = cpaCySymDpSessionCtxGetSize(cyInstanceHandle, &sessionSetupData,
&sessionCtxSizeInBytes);
}
status = cpaCySymDpInitSession(cyInstanceHandle, &sessionSetupData,
- CPA_TRUE,CPA_FALSE, *ppSessionCtx);
+ *ppSessionCtx);
if (CPA_STATUS_SUCCESS != status) {
printf("Crypto: cpaCySymDpInitSession failed with status %"PRId32"\n", status);
return CPA_STATUS_FAIL;
int
crypto_init(void)
{
- if (CPA_STATUS_SUCCESS != icp_sal_userStart("SSL")) {
+ if (CPA_STATUS_SUCCESS != icp_sal_userStartMultiProcess("SSL",CPA_FALSE)) {
printf("Crypto: Could not start sal for user space\n");
return CPA_STATUS_FAIL;
}
- printf("Crypto: icp_sal_userStart(\"SSL\")\n");
+ printf("Crypto: icp_sal_userStartMultiProcess(\"SSL\",CPA_FALSE)\n");
return 0;
}
+ CRYPTO_OFFSET_TO_OPDATA);
uint32_t lcore_id;
+ if (unlikely(c >= NUM_CRYPTO || h >= NUM_HMAC))
+ return CRYPTO_RESULT_FAIL;
+
lcore_id = rte_lcore_id();
bzero(opData, sizeof(CpaCySymDpOpData));
+ CRYPTO_OFFSET_TO_OPDATA);
uint32_t lcore_id;
+ if (unlikely(c >= NUM_CRYPTO || h >= NUM_HMAC))
+ return CRYPTO_RESULT_FAIL;
+
lcore_id = rte_lcore_id();
bzero(opData, sizeof(CpaCySymDpOpData));