From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by dpdk.org (Postfix) with ESMTP id 5AE599954 for ; Thu, 25 May 2017 11:51:55 +0200 (CEST) Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 May 2017 02:51:54 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.38,391,1491289200"; d="scan'208";a="91624581" Received: from yliu-dev.sh.intel.com ([10.239.67.162]) by orsmga002.jf.intel.com with ESMTP; 25 May 2017 02:51:54 -0700 From: Yuanhan Liu To: Pablo de Lara Cc: Yuanhan Liu , Fan Zhang , dpdk stable Date: Thu, 25 May 2017 17:49:14 +0800 Message-Id: <1495705809-21416-102-git-send-email-yuanhan.liu@linux.intel.com> X-Mailer: git-send-email 1.9.0 In-Reply-To: <1495705809-21416-1-git-send-email-yuanhan.liu@linux.intel.com> References: <1495705809-21416-1-git-send-email-yuanhan.liu@linux.intel.com> Subject: [dpdk-stable] patch 'examples/l2fwd-crypto: fix padding calculation' has been queued to stable release 17.02.1 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 May 2017 09:51:55 -0000 Hi, FYI, your patch has been queued to stable release 17.02.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 05/28/17. So please shout if anyone has objections. Thanks. --yliu --- >>From 7150f467c51243573f5cf87cb129fad650e52210 Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Wed, 19 Apr 2017 15:37:54 +0100 Subject: [PATCH] examples/l2fwd-crypto: fix padding calculation [ upstream commit c64457cb11f0df25813983b10c47d80058b9a8ba ] For padding calculation, it is necessary to know if algorithm is a block cipher or stream cipher algorithm, and know the block size for the algorithm. In the application, this block size should be only the cipher block size, but if authentication was used too, it was being overwritten by the authentication block size, which is not needed. Fixes: 27cf2d1b18e1 ("examples/l2fwd-crypto: discover capabilities") Signed-off-by: Pablo de Lara Acked-by: Fan Zhang --- examples/l2fwd-crypto/main.c | 1 - 1 file changed, 1 deletion(-) diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c index 8a68e55..2b28e38 100644 --- a/examples/l2fwd-crypto/main.c +++ b/examples/l2fwd-crypto/main.c @@ -1716,7 +1716,6 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports, continue; } - options->block_size = cap->sym.auth.block_size; /* * Check if length of provided AAD is supported * by the algorithm chosen. -- 1.9.0