> -----Original Message-----
> From: Zhang, Roy Fan
> Sent: Tuesday, March 5, 2019 2:41 PM
> To: [email protected]
> Cc: [email protected]; Zhang, Roy Fan <[email protected]>; Ananyev, 
> Konstantin <[email protected]>;
> [email protected]
> Subject: [PATCH] ipsec-secgw: fix AES-CTR block size in legacy mode
> 
> This patch fixes the incorrect block size for AES-CTR in
> legacy mode. Originally, wrong block size will cause
> esp_inbound() drop AES-CTR encrypted packets if the payload
> sizes not equal to multiple times of 16.
> 
> Fixes: 4470c22de2e1 ("examples/ipsec-secgw: add AES-CTR")
> Cc: [email protected]
> 
> Signed-off-by: Fan Zhang <[email protected]>
> ---
>  examples/ipsec-secgw/sa.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
> index 414fcd26c..93e3620bc 100644
> --- a/examples/ipsec-secgw/sa.c
> +++ b/examples/ipsec-secgw/sa.c
> @@ -80,7 +80,7 @@ const struct supported_cipher_algo cipher_algos[] = {
>               .keyword = "aes-128-ctr",
>               .algo = RTE_CRYPTO_CIPHER_AES_CTR,
>               .iv_len = 8,
> -             .block_size = 16, /* XXX AESNI MB limition, should be 4 */
> +             .block_size = 4,
>               .key_len = 20
>       },
>       {
> --

Acked-by: Konstantin Ananyev <[email protected]>

> 2.14.5

Reply via email to