Set AES-CTR IV length to 8 in SA config as it is
used for per packet IV length and set it to 16
in xform since the application populates 16B IV
in the datapath. AES-CTR requires 16B IV
constructed from nonce and counter.
Fixes: 5ff7502f345e ("examples/ipsec-secgw: set AES-CTR IV length to 16")

Signed-off-by: Tejasree Kondoj <ktejas...@marvell.com>
---
 examples/ipsec-secgw/sa.c | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)

diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
index 5f5d2685f6..63eadb3393 100644
--- a/examples/ipsec-secgw/sa.c
+++ b/examples/ipsec-secgw/sa.c
@@ -96,10 +96,8 @@ const struct supported_cipher_algo cipher_algos[] = {
        {
                .keyword = "aes-128-ctr",
                .algo = RTE_CRYPTO_CIPHER_AES_CTR,
-               /* iv_len includes 8B per packet IV, 4B nonce
-                * and 4B counter
-                */
-               .iv_len = 16,
+               /* Per packet IV length */
+               .iv_len = 8,
                .block_size = 4,
                .key_len = 20
        },
@@ -1332,9 +1330,14 @@ sa_add_rules(struct sa_ctx *sa_ctx, const struct 
ipsec_sa entries[],
                        case RTE_CRYPTO_CIPHER_DES_CBC:
                        case RTE_CRYPTO_CIPHER_3DES_CBC:
                        case RTE_CRYPTO_CIPHER_AES_CBC:
-                       case RTE_CRYPTO_CIPHER_AES_CTR:
                                iv_length = sa->iv_len;
                                break;
+                       case RTE_CRYPTO_CIPHER_AES_CTR:
+                               /* Length includes 8B per packet IV, 4B nonce 
and
+                                * 4B counter as populated in datapath.
+                                */
+                               iv_length = 16;
+                               break;
                        default:
                                RTE_LOG(ERR, IPSEC_ESP,
                                                "unsupported cipher algorithm 
%u\n",
-- 
2.25.1

Reply via email to