patch 'doc: add missing auth algo for IPsec example' has been queued to stable release 21.11.2
Kevin Traynor
ktraynor at redhat.com
Thu Jun 9 13:36:04 CEST 2022
Hi,
FYI, your patch has been queued to stable release 21.11.2
Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet.
It will be pushed if I get no objections before 06/13/22. So please
shout if anyone has objections.
Also note that after the patch there's a diff of the upstream commit vs the
patch applied to the branch. This will indicate if there was any rebasing
needed to apply to the stable branch. If there were code changes for rebasing
(ie: not only metadata diffs), please double check that the rebase was
correctly done.
Queued patches are on a temporary branch at:
https://github.com/kevintraynor/dpdk-stable
This queued commit can be viewed at:
https://github.com/kevintraynor/dpdk-stable/commit/9bd73e2c323bbe61fcc5c1a1625e00174273a86c
Thanks.
Kevin
---
>From 9bd73e2c323bbe61fcc5c1a1625e00174273a86c Mon Sep 17 00:00:00 2001
From: Gagandeep Singh <g.singh at nxp.com>
Date: Fri, 20 May 2022 09:51:04 +0530
Subject: [PATCH] doc: add missing auth algo for IPsec example
[ upstream commit d05828ac583876f05590ac14136c398a54014bc6 ]
Adding the missing SHA256-HMAC authentication algorithm
in ipsec-secgw guide.
Fixes: b5350285ce6e ("examples/ipsec-secgw: support SHA256 HMAC")
Signed-off-by: Gagandeep Singh <g.singh at nxp.com>
Acked-by: Akhil Goyal <gakhil at marvell.com>
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/doc/guides/sample_app_ug/ipsec_secgw.rst b/doc/guides/sample_app_ug/ipsec_secgw.rst
index c53ee7c386..468a977478 100644
--- a/doc/guides/sample_app_ug/ipsec_secgw.rst
+++ b/doc/guides/sample_app_ug/ipsec_secgw.rst
@@ -117,5 +117,6 @@ Constraints
* No AH mode.
* Supported algorithms: AES-CBC, AES-CTR, AES-GCM, 3DES-CBC, HMAC-SHA1,
- AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305 and NULL.
+ HMAC-SHA256, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305
+ and NULL.
* Each SA must be handle by a unique lcore (*1 RX queue per port*).
@@ -587,4 +588,5 @@ where each options means:
* *null*: NULL algorithm
* *sha1-hmac*: HMAC SHA1 algorithm
+ * *sha256-hmac*: HMAC SHA256 algorithm
``<auth_key>``
--
2.34.3
---
Diff of the applied patch vs upstream commit (please double-check if non-empty:
---
--- - 2022-06-09 12:34:30.178209102 +0100
+++ 0017-doc-add-missing-auth-algo-for-IPsec-example.patch 2022-06-09 12:34:29.651980480 +0100
@@ -1 +1 @@
-From d05828ac583876f05590ac14136c398a54014bc6 Mon Sep 17 00:00:00 2001
+From 9bd73e2c323bbe61fcc5c1a1625e00174273a86c Mon Sep 17 00:00:00 2001
@@ -5,0 +6,2 @@
+[ upstream commit d05828ac583876f05590ac14136c398a54014bc6 ]
+
@@ -10 +11,0 @@
-Cc: stable at dpdk.org
@@ -15,2 +16,2 @@
- doc/guides/sample_app_ug/ipsec_secgw.rst | 5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
+ doc/guides/sample_app_ug/ipsec_secgw.rst | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
@@ -19 +20 @@
-index 5cb6a69a27..94197a34f0 100644
+index c53ee7c386..468a977478 100644
@@ -22 +23 @@
-@@ -117,6 +117,6 @@ Constraints
+@@ -117,5 +117,6 @@ Constraints
@@ -24,5 +25,4 @@
- * Supported algorithms: AES-CBC, AES-CTR, AES-GCM, 3DES-CBC, DES-CBC,
-- HMAC-SHA1, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305
-- and NULL.
-+ HMAC-SHA1, HMAC-SHA256, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM,
-+ CHACHA20_POLY1305 and NULL.
+ * Supported algorithms: AES-CBC, AES-CTR, AES-GCM, 3DES-CBC, HMAC-SHA1,
+- AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305 and NULL.
++ HMAC-SHA256, AES-GMAC, AES_CTR, AES_XCBC_MAC, AES_CCM, CHACHA20_POLY1305
++ and NULL.
@@ -31 +31 @@
-@@ -596,4 +596,5 @@ where each options means:
+@@ -587,4 +588,5 @@ where each options means:
@@ -35 +34,0 @@
- * *aes-xcbc-mac*: AES XCBC MAC algorithm
@@ -36,0 +36 @@
+ ``<auth_key>``
More information about the stable
mailing list