> -----Original Message-----
> From: Zhang, Roy Fan
> Sent: Tuesday, March 5, 2019 2:41 PM
> To: [email protected]
> Cc: [email protected]; Zhang, Roy Fan <[email protected]>; Ananyev,
> Konstantin <[email protected]>;
> [email protected]
> Subject: [PATCH] ipsec-secgw: fix AES-CTR block size in legacy mode
>
> This patch fixes the incorrect block size for AES-CTR in
> legacy mode. Originally, wrong block size will cause
> esp_inbound() drop AES-CTR encrypted packets if the payload
> sizes not equal to multiple times of 16.
>
> Fixes: 4470c22de2e1 ("examples/ipsec-secgw: add AES-CTR")
> Cc: [email protected]
>
> Signed-off-by: Fan Zhang <[email protected]>
> ---
> examples/ipsec-secgw/sa.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
> index 414fcd26c..93e3620bc 100644
> --- a/examples/ipsec-secgw/sa.c
> +++ b/examples/ipsec-secgw/sa.c
> @@ -80,7 +80,7 @@ const struct supported_cipher_algo cipher_algos[] = {
> .keyword = "aes-128-ctr",
> .algo = RTE_CRYPTO_CIPHER_AES_CTR,
> .iv_len = 8,
> - .block_size = 16, /* XXX AESNI MB limition, should be 4 */
> + .block_size = 4,
> .key_len = 20
> },
> {
> --
Acked-by: Konstantin Ananyev <[email protected]>
> 2.14.5