> -----Original Message----- > From: Nicolau, Radu > Sent: Thursday, January 25, 2018 5:37 PM > To: Trahe, Fiona <fiona.tr...@intel.com>; dev@dpdk.org > Cc: De Lara Guarch, Pablo <pablo.de.lara.gua...@intel.com> > Subject: RE: [PATCH 1/2] crypto/qat: fix null auth algo issue > > > > -----Original Message----- > > From: Trahe, Fiona > > Sent: Thursday, January 25, 2018 5:19 PM > > To: dev@dpdk.org > > Cc: Nicolau, Radu <radu.nico...@intel.com>; De Lara Guarch, Pablo > > <pablo.de.lara.gua...@intel.com>; Trahe, Fiona <fiona.tr...@intel.com> > > Subject: [PATCH 1/2] crypto/qat: fix null auth algo issue > > > > If auth algorithm is RTE_CRYPTO_AUTH_NULL and digest_length is 0 in > > the xform and digest pointer is set in the op, then the PMD may > > overwrite memory at the digest pointer. > > With this patch the memory is not overwritten. > > > > Fixes: db0e952a5c01 ("crypto/qat: add NULL capability") > > > > Signed-off-by: Fiona Trahe <fiona.tr...@intel.com> > > --- > > Tested and > Acked-by: Radu Nicolau <radu.nico...@intel.com>
Applied to dpdk-next-crypto. Thanks, Pablo