From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by dpdk.org (Postfix) with ESMTP id 75F6B47CE for ; Fri, 21 Apr 2017 08:23:17 +0200 (CEST) Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Apr 2017 23:23:17 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.37,229,1488873600"; d="scan'208";a="77100605" Received: from yliu-dev.sh.intel.com ([10.239.67.162]) by orsmga002.jf.intel.com with ESMTP; 20 Apr 2017 23:23:16 -0700 From: Yuanhan Liu To: Pablo de Lara Cc: Yuanhan Liu , Fan Zhang , dpdk stable Date: Fri, 21 Apr 2017 14:19:43 +0800 Message-Id: <1492755587-28967-18-git-send-email-yuanhan.liu@linux.intel.com> X-Mailer: git-send-email 1.9.0 In-Reply-To: <1492755587-28967-1-git-send-email-yuanhan.liu@linux.intel.com> References: <1492755587-28967-1-git-send-email-yuanhan.liu@linux.intel.com> Subject: [dpdk-stable] patch 'examples/l2fwd-crypto: fix padding calculation' has been queued to LTS release 16.11.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Apr 2017 06:23:17 -0000 Hi, FYI, your patch has been queued to LTS release 16.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 04/26/17. So please shout if anyone has objections. Thanks. --yliu --- >>From 7ec092c6207d00e26cc7bfc26bde97c9aee5d336 Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Wed, 19 Apr 2017 15:37:54 +0100 Subject: [PATCH] examples/l2fwd-crypto: fix padding calculation [ upstream commit c64457cb11f0df25813983b10c47d80058b9a8ba ] For padding calculation, it is necessary to know if algorithm is a block cipher or stream cipher algorithm, and know the block size for the algorithm. In the application, this block size should be only the cipher block size, but if authentication was used too, it was being overwritten by the authentication block size, which is not needed. Fixes: 27cf2d1b18e1 ("examples/l2fwd-crypto: discover capabilities") Signed-off-by: Pablo de Lara Acked-by: Fan Zhang --- examples/l2fwd-crypto/main.c | 1 - 1 file changed, 1 deletion(-) diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c index 5f8f04f..77a5fe1 100644 --- a/examples/l2fwd-crypto/main.c +++ b/examples/l2fwd-crypto/main.c @@ -1698,7 +1698,6 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports, continue; } - options->block_size = cap->sym.auth.block_size; /* * Check if length of provided AAD is supported * by the algorithm chosen. -- 1.9.0