> In the example application the key can be provided by the user or
> generated randomly by the example application.
> 
> Then a validation is done in order to check if the key size is
> supported in the algorithm capabilities.
> 
> As a result of patch [1] application should support the case where a
> user supplies a wrapped key.
> 
> In order to align with this patch and be able to use the app with
> wrapped keys, app should remove the validation of key size in the
> application and rely on a PMD key size validation.
> 
> The validation is removed in case the key is provided by by user, and
> kept in case the key should be generated by the application.
> 
> [1] https://www.mail-archive.com/dev@dpdk.org/msg201281.html 
> 
> Signed-off-by: Shiri Kuzin <shi...@nvidia.com>
> ---
This patch should be aligned as per the latest version of the patch.
http://patches.dpdk.org/project/dpdk/patch/20210413063718.3123698-1-ma...@nvidia.com/


>  examples/l2fwd-crypto/main.c | 8 +++-----
>  1 file changed, 3 insertions(+), 5 deletions(-)
> 
> diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c
> index a96cb94cc4..5ae2569065 100644
> --- a/examples/l2fwd-crypto/main.c
> +++ b/examples/l2fwd-crypto/main.c
> @@ -2111,13 +2111,11 @@ check_capabilities(struct l2fwd_crypto_options
> *options, uint8_t cdev_id)
>                                       cap->sym.cipher.key_size.min,
>                                       cap->sym.cipher.key_size.max,
>                                       cap->sym.cipher.key_size.increment)
> -                                             != 0) {
> +                                             != 0)
>                               RTE_LOG(DEBUG, USER1,
> -                                     "Device %u does not support cipher "
> -                                     "key length\n",
> +                                     "Key length does not match the
> device "
> +                                     "%u capability\n",
>                                       cdev_id);
> -                             return -1;
> -                     }
>               /*
>                * Check if length of the cipher key to be randomly generated
>                * is supported by the algorithm chosen.
> --
> 2.21.0

Reply via email to