> > > +
> > > +static int
> > > +fill_crypto_xform(struct crypto_xform *xform,
> > > + const struct rte_ipsec_sa_prm *prm)
> > > +{
> > > + struct rte_crypto_sym_xform *xf;
> > > +
> > > + memset(xform, 0, sizeof(*xform));
> > > +
> > > + for (xf = prm->crypto_xform; xf != NULL; xf = xf->next) {
> > > +         if (xf->type == RTE_CRYPTO_SYM_XFORM_AUTH) {
> > > +                 if (xform->auth != NULL)
> > > +                         return -EINVAL;
> > > +                 xform->auth = &xf->auth;
> > > +         } else if (xf->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {
> > > +                 if (xform->cipher != NULL)
> > > +                         return -EINVAL;
> > > +                 xform->cipher = &xf->cipher;
> > > +         } else if (xf->type == RTE_CRYPTO_SYM_XFORM_AEAD) {
> > > +                 if (xform->aead != NULL)
> > > +                         return -EINVAL;
> > > +                 xform->aead = &xf->aead;
> > > +         } else
> > > +                 return -EINVAL;
> > > + }
> > > +
> > > + return check_crypto_xform(xform);
> > > +}
> > how is this function handling the inbound and outbound cases.
> > In inbound first xform is auth and then cipher.
> > In outbound first is cipher and then auth. I think this should be
> > checked in the lib.
> 
> Interesting, I didn't know about such limitation.
> My understanding was that the any order (<auth,cipher>, <cipher,auth>)
> for both inbound and outbound is acceptable.
> Is that order restriction is documented somewhere?
> 

Actually, if such restriction really exists, and cryptodev framework obeys it,
then crypto session creation will fail anyway.

> > Here for loop should not be there, as there would be at max only 2 xforms.

Reply via email to