From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by dpdk.org (Postfix) with ESMTP id 106EA5596 for ; Tue, 22 Mar 2016 22:24:28 +0100 (CET) Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga103.jf.intel.com with ESMTP; 22 Mar 2016 14:24:28 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.24,379,1455004800"; d="scan'208";a="916728075" Received: from sie-lab-214-036.ir.intel.com (HELO sie-lab-214-36.ir.intel.com) ([10.237.214.36]) by orsmga001.jf.intel.com with ESMTP; 22 Mar 2016 14:24:27 -0700 From: Pablo de Lara To: dev@dpdk.org Cc: declan.doherty@intel.com, Pablo de Lara Date: Tue, 22 Mar 2016 21:24:01 +0000 Message-Id: <1458681841-245648-4-git-send-email-pablo.de.lara.guarch@intel.com> X-Mailer: git-send-email 2.5.0 In-Reply-To: <1458681841-245648-1-git-send-email-pablo.de.lara.guarch@intel.com> References: <1458652644-30754-1-git-send-email-pablo.de.lara.guarch@intel.com> <1458681841-245648-1-git-send-email-pablo.de.lara.guarch@intel.com> Subject: [dpdk-dev] [PATCH v2 3/3] l2fwd-crypto: add NULL in cipher/auth algo list X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Mar 2016 21:24:29 -0000 NULL crypto operation is now supported, but l2fwd-crypto was missing an update on the list of supported algorithms that can be passed from command line. Signed-off-by: Pablo de Lara --- examples/l2fwd-crypto/main.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c index f8713e4..cb3bdbe 100644 --- a/examples/l2fwd-crypto/main.c +++ b/examples/l2fwd-crypto/main.c @@ -859,6 +859,9 @@ parse_cipher_algo(enum rte_crypto_cipher_algorithm *algo, char *optarg) } else if (strcmp("AES_GCM", optarg) == 0) { *algo = RTE_CRYPTO_CIPHER_AES_GCM; return 0; + } else if (strcmp("NULL", optarg) == 0) { + *algo = RTE_CRYPTO_CIPHER_NULL; + return 0; } else if (strcmp("SNOW3G_UEA2", optarg) == 0) { *algo = RTE_CRYPTO_CIPHER_SNOW3G_UEA2; return 0; @@ -916,6 +919,9 @@ parse_auth_algo(enum rte_crypto_auth_algorithm *algo, char *optarg) } else if (strcmp("MD5_HMAC", optarg) == 0) { *algo = RTE_CRYPTO_AUTH_MD5_HMAC; return 0; + } else if (strcmp("NULL", optarg) == 0) { + *algo = RTE_CRYPTO_AUTH_NULL; + return 0; } else if (strcmp("SHA1_HMAC", optarg) == 0) { *algo = RTE_CRYPTO_AUTH_SHA1_HMAC; return 0; -- 2.5.0