From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id 06898A00E6 for ; Tue, 16 Apr 2019 16:38:55 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id EB0311B4DC; Tue, 16 Apr 2019 16:38:54 +0200 (CEST) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id A117C1B4DC for ; Tue, 16 Apr 2019 16:38:53 +0200 (CEST) Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0E9193199394; Tue, 16 Apr 2019 14:38:53 +0000 (UTC) Received: from rh.redhat.com (ovpn-117-214.ams2.redhat.com [10.36.117.214]) by smtp.corp.redhat.com (Postfix) with ESMTP id C61541001DE0; Tue, 16 Apr 2019 14:38:51 +0000 (UTC) From: Kevin Traynor To: Fan Zhang Cc: Konstantin Ananyev , Akhil Goyal , dpdk stable Date: Tue, 16 Apr 2019 15:37:04 +0100 Message-Id: <20190416143719.21601-46-ktraynor@redhat.com> In-Reply-To: <20190416143719.21601-1-ktraynor@redhat.com> References: <20190416143719.21601-1-ktraynor@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.41]); Tue, 16 Apr 2019 14:38:53 +0000 (UTC) Subject: [dpdk-stable] patch 'examples/ipsec-secgw: fix AES-CTR block size' has been queued to LTS release 18.11.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hi, FYI, your patch has been queued to LTS release 18.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 04/24/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Thanks. Kevin Traynor --- >From 1c839a075d579c942bbc45246f087b213575609e Mon Sep 17 00:00:00 2001 From: Fan Zhang Date: Tue, 5 Mar 2019 14:40:41 +0000 Subject: [PATCH] examples/ipsec-secgw: fix AES-CTR block size [ upstream commit 8d9a222507b291113e18e6bc46f3196a51fd181d ] This patch fixes the incorrect block size for AES-CTR in legacy mode. Originally, wrong block size will cause esp_inbound() drop AES-CTR encrypted packets if the payload sizes not equal to multiple times of 16. Fixes: 4470c22de2e1 ("examples/ipsec-secgw: add AES-CTR") Signed-off-by: Fan Zhang Acked-by: Konstantin Ananyev Acked-by: Akhil Goyal --- examples/ipsec-secgw/sa.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c index 640f1d793..4ea016a6a 100644 --- a/examples/ipsec-secgw/sa.c +++ b/examples/ipsec-secgw/sa.c @@ -80,5 +80,5 @@ const struct supported_cipher_algo cipher_algos[] = { .algo = RTE_CRYPTO_CIPHER_AES_CTR, .iv_len = 8, - .block_size = 16, /* XXX AESNI MB limition, should be 4 */ + .block_size = 4, .key_len = 20 }, -- 2.20.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-04-16 15:34:27.262544033 +0100 +++ 0046-examples-ipsec-secgw-fix-AES-CTR-block-size.patch 2019-04-16 15:34:25.219179084 +0100 @@ -1,15 +1,16 @@ -From 8d9a222507b291113e18e6bc46f3196a51fd181d Mon Sep 17 00:00:00 2001 +From 1c839a075d579c942bbc45246f087b213575609e Mon Sep 17 00:00:00 2001 From: Fan Zhang Date: Tue, 5 Mar 2019 14:40:41 +0000 Subject: [PATCH] examples/ipsec-secgw: fix AES-CTR block size +[ upstream commit 8d9a222507b291113e18e6bc46f3196a51fd181d ] + This patch fixes the incorrect block size for AES-CTR in legacy mode. Originally, wrong block size will cause esp_inbound() drop AES-CTR encrypted packets if the payload sizes not equal to multiple times of 16. Fixes: 4470c22de2e1 ("examples/ipsec-secgw: add AES-CTR") -Cc: stable@dpdk.org Signed-off-by: Fan Zhang Acked-by: Konstantin Ananyev @@ -19,10 +20,10 @@ 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c -index 414fcd26c..93e3620bc 100644 +index 640f1d793..4ea016a6a 100644 --- a/examples/ipsec-secgw/sa.c +++ b/examples/ipsec-secgw/sa.c -@@ -81,5 +81,5 @@ const struct supported_cipher_algo cipher_algos[] = { +@@ -80,5 +80,5 @@ const struct supported_cipher_algo cipher_algos[] = { .algo = RTE_CRYPTO_CIPHER_AES_CTR, .iv_len = 8, - .block_size = 16, /* XXX AESNI MB limition, should be 4 */