Date: Fri, 6 Jun 2025 13:57:02 GMT From: Mark Johnston <markj@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org Subject: git: 25f09d4a9c35 - main - qat: fix typos and formatting issues Message-ID: <202506061357.556Dv2Z6083879@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by markj: URL: https://cgit.FreeBSD.org/src/commit/?id=25f09d4a9c358c5452435d299e00c1a1bdafff87 commit 25f09d4a9c358c5452435d299e00c1a1bdafff87 Author: Hareshx Sankar Raj <hareshx.sankar.raj@intel.com> AuthorDate: 2025-04-29 23:13:11 +0000 Commit: Mark Johnston <markj@FreeBSD.org> CommitDate: 2025-06-06 13:42:31 +0000 qat: fix typos and formatting issues Multiple typos are corrected across the source code. Formatting corrections are done to improve code quality and maintainability. Some files which did not have proper Copyright license are updated. Reviewed by: markj, ziaee MFC after: 2 weeks Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D50379 --- sys/dev/qat/include/common/adf_uio_cleanup.h | 3 +- sys/dev/qat/include/common/adf_uio_control.h | 3 +- sys/dev/qat/qat/qat_ocf.c | 3 +- .../qat/qat_api/common/compression/dc_datapath.c | 12 +---- .../common/crypto/sym/include/lac_session.h | 26 ++++----- .../qat_api/common/crypto/sym/include/lac_sym.h | 12 ++--- .../common/crypto/sym/include/lac_sym_alg_chain.h | 7 +-- .../qat_api/common/crypto/sym/include/lac_sym_cb.h | 6 +-- .../common/crypto/sym/include/lac_sym_cipher.h | 6 +-- .../common/crypto/sym/include/lac_sym_hash.h | 13 ++--- .../common/crypto/sym/include/lac_sym_hash_defs.h | 4 +- .../crypto/sym/include/lac_sym_hash_precomputes.h | 6 +-- .../common/crypto/sym/include/lac_sym_key.h | 21 ++++---- .../common/crypto/sym/include/lac_sym_partial.h | 4 +- .../common/crypto/sym/include/lac_sym_qat.h | 4 +- .../common/crypto/sym/include/lac_sym_qat_cipher.h | 4 +- .../common/crypto/sym/include/lac_sym_qat_hash.h | 6 +-- .../sym/include/lac_sym_qat_hash_defs_lookup.h | 4 +- .../common/crypto/sym/include/lac_sym_stats.h | 6 +-- .../qat_api/common/crypto/sym/key/lac_sym_key.c | 22 +++----- .../qat_api/common/crypto/sym/lac_sym_alg_chain.c | 10 ++-- .../qat/qat_api/common/crypto/sym/lac_sym_api.c | 14 ++--- .../qat_api/common/crypto/sym/lac_sym_auth_enc.c | 3 +- sys/dev/qat/qat_api/common/crypto/sym/lac_sym_cb.c | 15 +++--- .../qat/qat_api/common/crypto/sym/lac_sym_cipher.c | 7 ++- .../common/crypto/sym/lac_sym_compile_check.c | 7 +-- sys/dev/qat/qat_api/common/crypto/sym/lac_sym_dp.c | 7 +-- .../qat/qat_api/common/crypto/sym/lac_sym_hash.c | 3 +- .../crypto/sym/lac_sym_hash_sw_precomputes.c | 4 +- .../qat/qat_api/common/crypto/sym/lac_sym_queue.c | 4 +- .../qat_api/common/crypto/sym/qat/lac_sym_qat.c | 6 +-- .../common/crypto/sym/qat/lac_sym_qat_cipher.c | 23 ++++---- .../crypto/sym/qat/lac_sym_qat_hash_defs_lookup.c | 8 +-- sys/dev/qat/qat_api/common/ctrl/sal_crypto.c | 22 +------- sys/dev/qat/qat_api/common/include/lac_common.h | 3 +- sys/dev/qat/qat_api/common/include/lac_hooks.h | 4 +- sys/dev/qat/qat_api/common/include/lac_mem.h | 6 +-- sys/dev/qat/qat_api/common/include/lac_mem_pools.h | 14 ++--- sys/dev/qat/qat_api/common/include/lac_sal.h | 10 ++-- sys/dev/qat/qat_api/common/include/lac_sal_types.h | 6 +-- .../qat/qat_api/common/include/sal_qat_cmn_msg.h | 4 +- .../qat/qat_api/common/qat_comms/sal_qat_cmn_msg.c | 4 +- sys/dev/qat/qat_api/common/utils/lac_buffer_desc.c | 6 +-- sys/dev/qat/qat_api/firmware/include/icp_qat_fw.h | 7 ++- .../qat/qat_api/firmware/include/icp_qat_fw_comp.h | 15 ++---- .../qat/qat_api/firmware/include/icp_qat_fw_la.h | 10 ++-- .../qat/qat_api/firmware/include/icp_qat_fw_mmp.h | 14 +++-- .../qat_api/firmware/include/icp_qat_fw_mmp_ids.h | 5 +- .../qat/qat_api/firmware/include/icp_qat_fw_pke.h | 4 +- sys/dev/qat/qat_api/firmware/include/icp_qat_hw.h | 6 +-- .../qat_api/firmware/include/icp_qat_hw_20_comp.h | 3 +- sys/dev/qat/qat_api/include/cpa.h | 12 ++--- sys/dev/qat/qat_api/include/cpa_dev.h | 18 +++---- sys/dev/qat/qat_api/include/cpa_types.h | 12 ++--- sys/dev/qat/qat_api/include/dc/cpa_dc.h | 23 ++++---- sys/dev/qat/qat_api/include/dc/cpa_dc_bp.h | 14 ++--- sys/dev/qat/qat_api/include/dc/cpa_dc_chain.h | 56 +++++++++---------- sys/dev/qat/qat_api/include/dc/cpa_dc_dp.h | 12 ++--- sys/dev/qat/qat_api/include/icp_buffer_desc.h | 9 ++-- sys/dev/qat/qat_api/include/icp_sal_user.h | 6 +-- sys/dev/qat/qat_api/include/lac/cpa_cy_common.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_dh.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_dsa.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_ec.h | 20 +++---- sys/dev/qat/qat_api/include/lac/cpa_cy_ecdh.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_ecdsa.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_im.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_key.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_kpt.h | 20 +++---- sys/dev/qat/qat_api/include/lac/cpa_cy_ln.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_prime.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_rsa.h | 12 ++--- sys/dev/qat/qat_api/include/lac/cpa_cy_sym.h | 62 ++++++++++++---------- sys/dev/qat/qat_api/include/lac/cpa_cy_sym_dp.h | 16 +++--- .../qat_api/qat_direct/include/icp_accel_devices.h | 4 +- .../qat/qat_api/qat_direct/include/icp_adf_init.h | 4 +- .../qat_kernel/src/lac_adf_interface_freebsd.c | 6 +-- sys/dev/qat/qat_api/qat_utils/include/qat_utils.h | 7 ++- .../qat/qat_api/qat_utils/src/QatUtilsServices.c | 4 +- sys/dev/qat/qat_common/qat_uclo.c | 1 + 80 files changed, 385 insertions(+), 467 deletions(-) diff --git a/sys/dev/qat/include/common/adf_uio_cleanup.h b/sys/dev/qat/include/common/adf_uio_cleanup.h index 8f1132181355..876843cd9aa8 100644 --- a/sys/dev/qat/include/common/adf_uio_cleanup.h +++ b/sys/dev/qat/include/common/adf_uio_cleanup.h @@ -1,10 +1,9 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2023 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ #ifndef ADF_UIO_CLEANUP_H #define ADF_UIO_CLEANUP_H void adf_uio_do_cleanup_orphan(int bank, struct adf_uio_control_accel *accel); - #endif diff --git a/sys/dev/qat/include/common/adf_uio_control.h b/sys/dev/qat/include/common/adf_uio_control.h index 4662c02233b6..032baa9b54c2 100644 --- a/sys/dev/qat/include/common/adf_uio_control.h +++ b/sys/dev/qat/include/common/adf_uio_control.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2023 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ #ifndef QAT_UIO_CONTROL_H #define QAT_UIO_CONTROL_H #include <sys/condvar.h> @@ -38,5 +38,4 @@ struct adf_uio_control_accel { }; - #endif /* end of include guard: QAT_UIO_CONTROL_H */ diff --git a/sys/dev/qat/qat/qat_ocf.c b/sys/dev/qat/qat/qat_ocf.c index 3ec8f802f324..afdc5f396c80 100644 --- a/sys/dev/qat/qat/qat_ocf.c +++ b/sys/dev/qat/qat/qat_ocf.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /* System headers */ #include <sys/param.h> #include <sys/systm.h> @@ -1280,7 +1280,6 @@ static driver_t qat_ocf_driver = { .size = sizeof(struct qat_ocf_softc), }; - DRIVER_MODULE_ORDERED(qat, nexus, qat_ocf_driver, diff --git a/sys/dev/qat/qat_api/common/compression/dc_datapath.c b/sys/dev/qat/qat_api/common/compression/dc_datapath.c index de14be2fdb0d..f5a8600eadfa 100644 --- a/sys/dev/qat/qat_api/common/compression/dc_datapath.c +++ b/sys/dev/qat/qat_api/common/compression/dc_datapath.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** * @file dc_datapath.c @@ -523,7 +523,7 @@ dcCheckOpData(sal_compression_service_t *pService, CpaDcOpData *pOpData) if (CPA_TRUE == pOpData->integrityCrcCheck && NULL == pOpData->pCrcData) { LAC_INVALID_PARAM_LOG("Integrity CRC data structure " - "not intialized in CpaDcOpData"); + "not initialized in CpaDcOpData"); return CPA_STATUS_INVALID_PARAM; } @@ -1401,7 +1401,6 @@ cpaDcCompressData(CpaInstanceHandle dcInstance, CpaInstanceHandle insHandle = NULL; Cpa64U srcBuffSize = 0; - if (CPA_INSTANCE_HANDLE_SINGLE == dcInstance) { insHandle = dcGetFirstHandle(); } else { @@ -1507,7 +1506,6 @@ cpaDcCompressData2(CpaInstanceHandle dcInstance, return CPA_STATUS_INVALID_PARAM; } - if ((CPA_TRUE == pOpData->compressAndVerify) && (CPA_TRUE == pOpData->compressAndVerifyAndRecover) && (CPA_FALSE == pOpData->integrityCrcCheck)) { @@ -1526,7 +1524,6 @@ cpaDcCompressData2(CpaInstanceHandle dcInstance, return CPA_STATUS_UNSUPPORTED; } - if (CPA_INSTANCE_HANDLE_SINGLE == dcInstance) { insHandle = dcGetFirstHandle(); } else { @@ -1703,7 +1700,6 @@ dcDecompressDataCheck(CpaInstanceHandle insHandle, return CPA_STATUS_INVALID_PARAM; } - *srcBufferSize = srcBuffSize; return CPA_STATUS_SUCCESS; @@ -1724,7 +1720,6 @@ cpaDcDecompressData(CpaInstanceHandle dcInstance, Cpa64U srcBuffSize = 0; CpaStatus status = CPA_STATUS_SUCCESS; - if (CPA_INSTANCE_HANDLE_SINGLE == dcInstance) { insHandle = dcGetFirstHandle(); } else { @@ -1783,7 +1778,6 @@ cpaDcDecompressData(CpaInstanceHandle dcInstance, return CPA_STATUS_INVALID_PARAM; } - if (CPA_DC_STATEFUL == pSessionDesc->sessState) { /* Lock the session to check if there are in-flight stateful * requests */ @@ -1864,7 +1858,6 @@ cpaDcDecompressData2(CpaInstanceHandle dcInstance, callbackTag); } - if (CPA_INSTANCE_HANDLE_SINGLE == dcInstance) { insHandle = dcGetFirstHandle(); } else { @@ -1931,7 +1924,6 @@ cpaDcDecompressData2(CpaInstanceHandle dcInstance, return CPA_STATUS_INVALID_PARAM; } - if (CPA_DC_STATEFUL == pSessionDesc->sessState) { /* Lock the session to check if there are in-flight stateful * requests */ diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_session.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_session.h index afb3994daad7..6c9de34e7691 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_session.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_session.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -56,7 +56,7 @@ * while there are requests in flight. * * <b>Reference Count</b>\n - * - The perform funcion increments the reference count for the session. + * - The perform function increments the reference count for the session. * - The callback function decrements the reference count for the session. * - The Remove function checks the reference count to ensure that it is 0. * @@ -256,14 +256,14 @@ typedef struct lac_session_desc_s { /**< Cipher slice type to be used, set at init session time */ Cpa8U cipherAesXtsKey1Forward[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< Cached AES XTS Forward key - * For CPM2.0 AES XTS key convertion need to be done in SW. + * For CPM2.0 AES XTS key conversions need to be done in SW. * Because use can update session direction at any time, * also forward key needs to be cached */ Cpa8U cipherAesXtsKey1Reverse[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< AES XTS Reverse key - * For CPM2.0 AES XTS key convertion need to be done in SW. - * Reverse key always will be calcilated at session setup time and + * For CPM2.0 AES XTS key conversions need to be done in SW. + * Reverse key always will be calculated at session setup time and * cached to be used when needed */ Cpa8U cipherAesXtsKey2[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< For AES XTS session need to store Key2 value in order to generate @@ -442,14 +442,14 @@ typedef struct lac_session_desc_d1_s { /**< Cipher slice type to be used, set at init session time */ Cpa8U cipherAesXtsKey1Forward[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< Cached AES XTS Forward key - * For CPM2.0 AES XTS key convertion need to be done in SW. + * For CPM2.0 AES XTS key conversions need to be done in SW. * Because use can update session direction at any time, * also forward key needs to be cached */ Cpa8U cipherAesXtsKey1Reverse[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< AES XTS Reverse key - * For CPM2.0 AES XTS key convertion need to be done in SW. - * Reverse key always will be calcilated at session setup time and + * For CPM2.0 AES XTS key conversions need to be done in SW. + * Reverse key always will be calculated at session setup time and * cached to be used when needed */ Cpa8U cipherAesXtsKey2[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< For AES XTS session need to store Key2 value in order to generate @@ -594,14 +594,14 @@ typedef struct lac_session_desc_d2_s { /**< Cipher slice type to be used, set at init session time */ Cpa8U cipherAesXtsKey1Forward[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< Cached AES XTS Forward key - * For CPM2.0 AES XTS key convertion need to be done in SW. + * For CPM2.0 AES XTS key conversions need to be done in SW. * Because use can update session direction at any time, * also forward key needs to be cached */ Cpa8U cipherAesXtsKey1Reverse[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< AES XTS Reverse key - * For CPM2.0 AES XTS key convertion need to be done in SW. - * Reverse key always will be calcilated at session setup time and + * For CPM2.0 AES XTS key conversions need to be done in SW. + * Reverse key always will be calculated at session setup time and * cached to be used when needed */ Cpa8U cipherAesXtsKey2[LAC_CIPHER_AES_XTS_KEY_MAX_LENGTH]; /**< For AES XTS session need to store Key2 value in order to generate @@ -625,7 +625,7 @@ typedef struct lac_session_desc_d2_s { sizeof(LAC_ARCH_UINT)) /**< @ingroup LacSym_Session * Size of the memory that the client has to allocate for a session. Extra - * memory is needed to internally re-align the data. The pointer to the algined + * memory is needed to internally re-align the data. The pointer to the aligned * data is stored at the start of the user allocated memory hence the extra * space for an LAC_ARCH_UINT */ @@ -669,7 +669,7 @@ typedef struct lac_session_desc_d2_s { * * @param[in] instanceHandle_in Instance Handle * @param[in] pSymCb callback function -* @param[in] pSessionSetupData pointer to the strucutre containing the setup +* @param[in] pSessionSetupData pointer to the structure containing the setup *data * @param[in] isDpSession CPA_TRUE for a data plane session * @param[out] pSessionCtx Pointer to session context diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym.h index 3eb41432aced..f7468b5d20dd 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -18,7 +18,7 @@ * The symmetric component demuliplexes the following crypto operations to * the appropriate sub-components: cipher, hash, algorithm chaining and * authentication encryption. It is a common layer between the above - * mentioned components where common resources are allocated and paramater + * mentioned components where common resources are allocated and parameter * checks are done. The operation specific resource allocation and parameter * checks are done in the sub-component itself. * @@ -32,15 +32,15 @@ * chain to ensure it is valid. * - \ref LacSymStats "Statistics": Manages statistics for symmetric * - \ref LacSymQat "Symmetric QAT": The symmetric qat component is - * initialiased by the symmetric component. - * - \ref LacCipher "Cipher" : demultiplex cipher opertions to this component. - * - \ref LacHash "Hash" : demultiplex hash opertions to this component. + * initialised by the symmetric component. + * - \ref LacCipher "Cipher" : demultiplex cipher operations to this component. + * - \ref LacHash "Hash" : demultiplex hash operations to this component. * to this component. * - \ref LacAlgChain "Algorithm Chaining": The algorithm chaining component * - OSAL : Memory allocation, Mutex's, atomics * * @lld_initialisation - * This component is initialied during the LAC initialisation sequence. It + * This component is initialized during the LAC initialisation sequence. It * initialises the session table, statistics, symmetric QAT, initialises the * hash definitions lookup table, the hash alg supported lookup table and * registers a callback function with the symmetric response handler to process diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_alg_chain.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_alg_chain.h index 1750fd0bebf4..095b7a426732 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_alg_chain.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_alg_chain.h @@ -1,8 +1,5 @@ -/*************************************************************************** - * - * <COPYRIGHT_TAG> - * - ***************************************************************************/ +/* SPDX-License-Identifier: BSD-3-Clause */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cb.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cb.h index 58caa321c410..703fa92b614a 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cb.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cb.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -21,7 +21,7 @@ * Dequeue pending requests * @description * This function is called by a callback function of a blocking - * operation (either a partial packet or a hash precompute operaion) + * operation (either a partial packet or a hash precompute operation) * in softIRQ context. It dequeues requests for the following reasons: * 1. All pre-computes that happened when initialising a session * have completed. Dequeue any requests that were queued on the @@ -40,7 +40,7 @@ CpaStatus LacSymCb_PendingReqsDequeue(lac_session_desc_t *pSessionDesc); /** ***************************************************************************** * @ingroup LacSym - * Register symmetric callback funcion handlers + * Register symmetric callback function handlers * * @description * This function registers the symmetric callback handler functions with diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cipher.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cipher.h index 3ae237939b2c..c3d8203dd8b0 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cipher.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_cipher.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -23,14 +23,14 @@ * and Triple-DES cipher algorithms, in ECB, CBC and CTR modes. The ARC4 stream * cipher algorithm is also supported. Data may be provided as a full packet, * or as a sequence of partial packets. The result of the operation can be - * written back to the source buffer (in-place) or to a seperate output buffer + * written back to the source buffer (in-place) or to a separate output buffer * (out-of-place). Data must be encapsulated in ICP buffers. * * The cipher component is responsible for implementing the cipher-specific * functionality for registering and de-registering a session, for the perform * operation and for processing the QAT responses to cipher requests. Statistics * are maintained for cipher in the symmetric \ref CpaCySymStats64 "stats" - * structure. This module has been seperated out into two. The cipher QAT module + * structure. This module has been separated out into two. The cipher QAT module * deals entirely with QAT data structures. The cipher module itself has minimal * exposure to the QAT data structures. * diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash.h index 4451e91ea5d6..19f6f5ddc69a 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash.h @@ -1,8 +1,5 @@ -/*************************************************************************** - * - * <COPYRIGHT_TAG> - * - ***************************************************************************/ +/* SPDX-License-Identifier: BSD-3-Clause */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -24,7 +21,7 @@ * * The hash component supports hashing in 3 modes. PLAIN, AUTH and NESTED. * Plain mode is used to provide data integrity while auth mode is used to - * provide integrity as well as its authenticity. Nested mode is inteded + * provide integrity as well as its authenticity. Nested mode is intended * for use by non standard HMAC like algorithms such as for the SSL master * key secret. Partial packets is supported for both plain and auth modes. * In-place and out-of-place processing is supported for all modes. The @@ -33,7 +30,7 @@ * The hash component is responsible for implementing the hash specific * functionality for initialising a session and for a perform operation. * Statistics are maintained in the symmetric \ref CpaCySymStats64 "stats" - * structure. This module has been seperated out into two. The hash QAT module + * structure. This module has been separated out into two. The hash QAT module * deals entirely with QAT data structures. The hash module itself has minimal * exposure to the QAT data structures. * @@ -62,7 +59,7 @@ * the data path by the length of time it takes to do two hashes on a block * size of data. Note: a partial packet operation generates an intermediate * state. The final operation on a partial packet or when a full packet is - * used applies padding and gives the final hash result. Esentially for the + * used applies padding and gives the final hash result. Essentially for the * inner hash, a partial packet final is issued on the data, using the * precomputed intermediate state and returns the digest. * diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_defs.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_defs.h index 6ebdcf659360..de9e74b31577 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_defs.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_defs.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -313,7 +313,7 @@ /**< @ingroup LacSymQatHash * Macro to check for qat hash mode is set to 2 and the hash mode is * Auth. This applies to HMAC algorithms (no pre compute). This is used - * to differntiate between TLS and HMAC */ + * to differentiate between TLS and HMAC */ #define IS_HASH_MODE_2_NESTED(qatHashMode, hashMode) \ ((IS_HASH_MODE_2(qatHashMode)) && \ diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_precomputes.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_precomputes.h index cdb252fb5b46..cf5e21a14c5f 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_precomputes.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_hash_precomputes.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -34,7 +34,7 @@ /**< maximum size of the working data for the HMAC precompute operations * * Maximum size of lac_sym_hash_precomp_op_data_t is 264 bytes. For hash - * precomputes there are 2 of these structrues and a further + * precomputes there are 2 of these structures and a further * lac_sym_hash_precomp_op_t structure required. This comes to a total of 536 * bytes. * For the asynchronous version of the precomputes, the memory for the hash @@ -122,7 +122,7 @@ typedef struct lac_sym_hash_aes_precomp_qat_s { Cpa8U contentDesc[LAC_SYM_QAT_MAX_CIPHER_SETUP_BLK_SZ]; /**< Content descriptor for a cipher operation */ Cpa8U data[LAC_SYM_HASH_PRECOMP_MAX_AES_ECB_DATA]; - /**< The data to be ciphered is conatined here and the result is + /**< The data to be ciphered is contained here and the result is * written in place back into this buffer */ icp_qat_fw_la_cipher_req_params_t cipherReqParams; /**< Request parameters as read in by the QAT */ diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_key.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_key.h index bae0d8faabc7..25c919d9b38d 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_key.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_key.h @@ -1,8 +1,5 @@ -/*************************************************************************** - * - * <COPYRIGHT_TAG> - * - ***************************************************************************/ +/* SPDX-License-Identifier: BSD-3-Clause */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -16,7 +13,7 @@ * * @lld_overview * - * Key generation component is reponsible for SSL, TLS & MGF operations. All + * Key generation component is responsible for SSL, TLS & MGF operations. All * memory required for the keygen operations is got from the keygen cookie * structure which is carved up as required. * @@ -24,8 +21,8 @@ * outer hash and SHA1 as the inner hash. * * Refer to sections in draft-freier-ssl-version3-02.txt: - * 6.1 Asymmetric cryptographic computations - This refers to coverting - * the pre master secret to the master secret. + * 6.1 Asymmetric cryptographic computations - This refers to converting + * the pre-master secret to the master secret. * 6.2.2 Converting the master secret into keys and MAC secrets - Using * the master secret to generate the key material. * @@ -40,11 +37,11 @@ * * @lld_dependencies * \ref LacSymQatHash: for building up hash content descriptor - * \ref LacMem: for virt to phys coversions + * \ref LacMem: for virt to phys conversions * * @lld_initialisation - * The reponse handler is registered with Symmetric. The Maximum SSL is - * allocated. A structure is allocated containing all the TLS lables that + * The response handler is registered with Symmetric. The Maximum SSL is + * allocated. A structure is allocated containing all the TLS labels that * are supported. On shutdown the memory for these structures are freed. * * @lld_module_algorithms @@ -115,7 +112,7 @@ * * @description * This structure is used to hold the various TLS labels. Each field is - * on an 8 byte boundary provided the structure itslef is 8 bytes aligned. + * on an 8 byte boundary provided the structure itself is 8 bytes aligned. *****************************************************************************/ typedef struct lac_sym_key_tls_labels_s { Cpa8U masterSecret[ICP_QAT_FW_LA_TLS_LABEL_LEN_MAX]; diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_partial.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_partial.h index 3f6c75ca7fb7..633d1c7afa96 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_partial.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_partial.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -20,7 +20,7 @@ * proceed where they would get an incorrect digest, cipher result. * * Maintain a SpinLock for partials in flight per session. Try and acquire this - * SpinLock. If it cant be acquired return an error straight away to the client + * SpinLock. If it can't be acquired return an error straight away to the client * as there is already a partial in flight. There is no blocking in the data * path for this. * diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat.h index 986e230dc1ff..dc72601bae44 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -24,7 +24,7 @@ * - \ref LacMem "Memory" - Inline memory functions * * @lld_initialisation - * This component is initialied during the LAC initialisation sequence. It + * This component is initialized during the LAC initialisation sequence. It * is called by the Symmetric Initialisation function. * * @lld_module_algorithms diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_cipher.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_cipher.h index 2f1d36dcd669..2f4a4511f4fc 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_cipher.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_cipher.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -172,7 +172,7 @@ void LacSymQat_CipherXTSModeUpdateKeyLen(lac_session_desc_t *pSessionDesc, * LacSymQat_CipherCtrlBlockInitialize() * * @description - * intialize the cipher control block with all zeros + * initialize the cipher control block with all zeros * * @param[in] pMsg Pointer to the common request message * diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash.h index 38c5892b0cc4..51a215ffc72a 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -42,7 +42,7 @@ * hash precomputes * * @description - * This structure contains infomation on the hash precomputes + * This structure contains information on the hash precomputes * *****************************************************************************/ typedef struct lac_sym_qat_hash_precompute_info_s { @@ -62,7 +62,7 @@ typedef struct lac_sym_qat_hash_precompute_info_s { * hash state prefix buffer info * * @description - * This structure contains infomation on the hash state prefix aad buffer + * This structure contains information on the hash state prefix aad buffer * *****************************************************************************/ typedef struct lac_sym_qat_hash_state_buffer_info_s { diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash_defs_lookup.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash_defs_lookup.h index decc5d8c491b..050dd42ba9b2 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash_defs_lookup.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash_defs_lookup.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -117,7 +117,7 @@ void LacSymQat_HashAlgLookupGet(CpaInstanceHandle instanceHandle, /** ******************************************************************************* * @ingroup LacSymQatHashDefsLookup -* get hash defintions from lookup table. +* get hash definitions from lookup table. * * @description * This function looks up the hash lookup array for a structure diff --git a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_stats.h b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_stats.h index 96f579b26c4c..ac7439713681 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_stats.h +++ b/sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_stats.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -9,7 +9,7 @@ * * @ingroup LacSym * - * Symetric Common consists of common statistics, buffer and partial packet + * Symmetric Common consists of common statistics, buffer and partial packet * functionality. * ***************************************************************************/ @@ -123,7 +123,7 @@ void LacSym_StatsFree(CpaInstanceHandle instanceHandle); /** ******************************************************************************* * @ingroup LacSymStats -* Inrement a stat +* Increment a stat * * @description * This function incrementes a stat for a specific engine. diff --git a/sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c b/sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c index cab8d6c7796c..965874e7466f 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c +++ b/sys/dev/qat/qat_api/common/crypto/sym/key/lac_sym_key.c @@ -1,8 +1,5 @@ -/*************************************************************************** - * - * <COPYRIGHT_TAG> - * - ***************************************************************************/ +/* SPDX-License-Identifier: BSD-3-Clause */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** ***************************************************************************** @@ -365,7 +362,6 @@ cpaCyKeyGenQueryStats(CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -393,7 +389,6 @@ cpaCyKeyGenQueryStats64(CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -917,7 +912,6 @@ cpaCyKeyGenMgf(const CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -956,7 +950,6 @@ cpaCyKeyGenMgfExt(const CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -2194,11 +2187,11 @@ LacSymKey_CheckParamSslTls(const void *pKeyGenOpData, /* Api max value */ /* ICP_QAT_FW_LA_TLS_V1_1_SECRET_LEN_MAX needs to be * multiplied - * by 4 in order to verifiy the 512 conditions. We did + * by 4 in order to verify the 512 conditions. We did * not change * ICP_QAT_FW_LA_TLS_V1_1_SECRET_LEN_MAX as it * represents - * the max value tha firmware can handle. + * the max value that firmware can handle. */ maxSecretLen = ICP_QAT_FW_LA_TLS_V1_1_SECRET_LEN_MAX * 4; @@ -2206,11 +2199,11 @@ LacSymKey_CheckParamSslTls(const void *pKeyGenOpData, /* Api max value */ /* ICP_QAT_FW_LA_TLS_V1_2_SECRET_LEN_MAX needs to be * multiplied - * by 8 in order to verifiy the 512 conditions. We did + * by 8 in order to verify the 512 conditions. We did * not change * ICP_QAT_FW_LA_TLS_V1_2_SECRET_LEN_MAX as it * represents - * the max value tha firmware can handle. + * the max value that firmware can handle. */ maxSecretLen = ICP_QAT_FW_LA_TLS_V1_2_SECRET_LEN_MAX * 8; @@ -2596,7 +2589,6 @@ cpaCyKeyGenTls(const CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -2669,7 +2661,6 @@ cpaCyKeyGenTls2(const CpaInstanceHandle instanceHandle_in, { CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -2756,7 +2747,6 @@ cpaCyKeyGenTls3(const CpaInstanceHandle instanceHandle_in, return CPA_STATUS_INVALID_PARAM; } - return LacSymKey_KeyGenSslTls(instanceHandle_in, pKeyGenCb, pCallbackTag, diff --git a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_alg_chain.c b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_alg_chain.c index 5b4ebdc85654..56f211025103 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_alg_chain.c +++ b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_alg_chain.c @@ -1,8 +1,5 @@ -/*************************************************************************** - * - * <COPYRIGHT_TAG> - * - ***************************************************************************/ +/* SPDX-License-Identifier: BSD-3-Clause */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -403,7 +400,6 @@ LacAlgChain_HashCDBuild( &sizeInBytes); } } - static Cpa16U LacAlgChain_GetCipherConfigSize(lac_session_desc_t *pSessionDesc) { @@ -1178,7 +1174,7 @@ LacAlgChain_SessionInit(const CpaInstanceHandle instanceHandle, &cipherOffsetInConstantsTable, &hashOffsetInConstantsTable); - /* for a certain combination of Algorthm Chaining we want to + /* for a certain combination of Algorithm Chaining we want to use an optimised cd block */ if (pSessionDesc->symOperation == diff --git a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_api.c b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_api.c index a0891278cb52..6f330835902c 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_api.c +++ b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_api.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -336,7 +336,6 @@ LacSymSession_ParamCheck(const CpaInstanceHandle instanceHandle, return CPA_STATUS_SUCCESS; } - /** * @ingroup LacSym * Function which perform parameter checks on data buffers for symmetric @@ -445,7 +444,7 @@ LacSymPerform_BufferParamCheck(const CpaBufferList *const pSrcBuffer, } } - /* check for partial packet suport for the session operation */ + /* check for partial packet support for the session operation */ if (CPA_CY_SYM_PACKET_TYPE_FULL != pOpData->packetType) { if (CPA_FALSE == pSessionDesc->isPartialSupported) { /* return out here to simplify cleanup */ @@ -569,7 +568,6 @@ LacSym_InitSession(const CpaInstanceHandle instanceHandle, return CPA_STATUS_INVALID_PARAM; } - pCipherSetupData = &pSessionSetupData->cipherSetupData; pHashSetupData = &pSessionSetupData->hashSetupData; @@ -673,7 +671,6 @@ cpaCySymRemoveSession(const CpaInstanceHandle instanceHandle_in, CpaInstanceHandle instanceHandle = NULL; Cpa64U numPendingRequests = 0; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -794,7 +791,6 @@ LacSym_Perform(const CpaInstanceHandle instanceHandle, } } - /* If synchronous Operation - Callback function stored in the session * descriptor so a flag is set in the perform to indicate that * the perform is being re-called for the synchronous operation */ @@ -872,7 +868,7 @@ LacSym_Perform(const CpaInstanceHandle instanceHandle, pVerifyResult); if (CPA_STATUS_SUCCESS == status) { - /* check for partial packet suport for the session operation */ + /* check for partial packet support for the session operation */ if (CPA_CY_SYM_PACKET_TYPE_FULL != pOpData->packetType) { LacSym_PartialPacketStateUpdate( pOpData->packetType, &pSessionDesc->partialState); @@ -923,7 +919,6 @@ cpaCySymQueryStats(const CpaInstanceHandle instanceHandle_in, CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -955,7 +950,6 @@ cpaCySymQueryStats64(const CpaInstanceHandle instanceHandle_in, CpaInstanceHandle instanceHandle = NULL; - if (CPA_INSTANCE_HANDLE_SINGLE == instanceHandle_in) { instanceHandle = Lac_GetFirstHandle(SAL_SERVICE_TYPE_CRYPTO_SYM); @@ -1037,7 +1031,6 @@ cpaCySymSessionCtxGetDynamicSize( /* Choose Session Context size */ getCtxSize(pSessionSetupData, pSessionCtxSizeInBytes); - return CPA_STATUS_SUCCESS; } @@ -1116,6 +1109,5 @@ cpaCyBufferListGetMetaSize(const CpaInstanceHandle instanceHandle_in, (sizeof(icp_flat_buffer_desc_t) * numBuffers) + ICP_DESCRIPTOR_ALIGNMENT_BYTES; - return CPA_STATUS_SUCCESS; } diff --git a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_auth_enc.c b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_auth_enc.c index dd018a25a88c..67ffeafcd48d 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_auth_enc.c +++ b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_auth_enc.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -91,7 +91,6 @@ LacSymAlgChain_CheckCCMData(Cpa8U *pAdditionalAuthData, return CPA_STATUS_SUCCESS; } - /** * @ingroup LacAuthEnc */ diff --git a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_cb.c b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_cb.c index 4e47de384a1a..d88c6707b9df 100644 --- a/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_cb.c +++ b/sys/dev/qat/qat_api/common/crypto/sym/lac_sym_cb.c @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright(c) 2007-2022 Intel Corporation */ +/* Copyright(c) 2007-2025 Intel Corporation */ /** *************************************************************************** @@ -296,7 +296,7 @@ LacSymCb_ProcessDpCallback(CpaCySymDpOpData *pResponse, *** 2509 LINES SKIPPED ***
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202506061357.556Dv2Z6083879>