From mboxrd@z Thu Jan 1 00:00:00 1970 From: bugzilla@dpdk.org Subject: [Bug 44] examples/l2fwd-crypto : Wrong data length in case of AEAD ciphers Date: Wed, 09 May 2018 12:43:52 +0000 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable To: dev@dpdk.org Return-path: List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" https://dpdk.org/tracker/show_bug.cgi?id=3D44 Bug ID: 44 Summary: examples/l2fwd-crypto : Wrong data length in case of AEAD ciphers Product: DPDK Version: 18.05 Hardware: All OS: All Status: CONFIRMED Severity: normal Priority: Normal Component: examples Assignee: dev@dpdk.org Reporter: ankur.dwivedi@cavium.com Target Milestone: --- In l2fwd-crypto application, file main.c , the digest length is not getting decremented for AEAD ciphers. Line 410: if (cparams->do_hash && cparams->hash_verify) data_len -=3D cparams->digest_length; I think this results in wrong values assignment in line 517 op->sym->aead.data.length =3D data_len; and wrong digest data pointer assignment in line 524 op->sym->aead.digest.data =3D rte_pktmbuf_mtod(m, uint8_t *) + ipdata_offset + data_len; --=20 You are receiving this mail because: You are the assignee for the bug.=