From mboxrd@z Thu Jan 1 00:00:00 1970
From: bugzilla@dpdk.org
Subject: [Bug 44] examples/l2fwd-crypto : Wrong data length in
case of AEAD ciphers
Date: Wed, 09 May 2018 12:43:52 +0000
Message-ID:
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
To: dev@dpdk.org
Return-path:
List-Id: DPDK patches and discussions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
Errors-To: dev-bounces@dpdk.org
Sender: "dev"
https://dpdk.org/tracker/show_bug.cgi?id=3D44
Bug ID: 44
Summary: examples/l2fwd-crypto : Wrong data length in case of
AEAD ciphers
Product: DPDK
Version: 18.05
Hardware: All
OS: All
Status: CONFIRMED
Severity: normal
Priority: Normal
Component: examples
Assignee: dev@dpdk.org
Reporter: ankur.dwivedi@cavium.com
Target Milestone: ---
In l2fwd-crypto application, file main.c , the digest length is not getting
decremented for AEAD ciphers.
Line 410:
if (cparams->do_hash && cparams->hash_verify)
data_len -=3D cparams->digest_length;
I think this results in wrong values assignment in line 517
op->sym->aead.data.length =3D data_len;
and wrong digest data pointer assignment in line 524
op->sym->aead.digest.data =3D rte_pktmbuf_mtod(m,
uint8_t *) + ipdata_offset + data_len;
--=20
You are receiving this mail because:
You are the assignee for the bug.=