diff mbox series

[API-NEXT,v3,5/9] api: ipsec: ignore aad capability

Message ID 20170712135438.22191-5-petri.savolainen@linaro.org
State Accepted
Commit e884f6db879d8c2c208892728580da13a73f1ecd
Headers show
Series [API-NEXT,v3,1/9] api: ipsec: add salt parameter | expand

Commit Message

Petri Savolainen July 12, 2017, 1:54 p.m. UTC
AAD lengths are needed in crypto API but not in IPSEC API.
So, application should ignore AAD capability values in IPSEC
API.

Signed-off-by: Petri Savolainen <petri.savolainen@linaro.org>

---
 include/odp/api/spec/ipsec.h | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

-- 
2.13.0
diff mbox series

Patch

diff --git a/include/odp/api/spec/ipsec.h b/include/odp/api/spec/ipsec.h
index f3e5c3ae..794a9c21 100644
--- a/include/odp/api/spec/ipsec.h
+++ b/include/odp/api/spec/ipsec.h
@@ -752,7 +752,9 @@  int odp_ipsec_cipher_capability(odp_cipher_alg_t cipher,
  * Outputs all supported configuration options for the algorithm. Output is
  * sorted (from the smallest to the largest) first by digest length, then by key
  * length. Use this information to select key lengths, etc authentication
- * algorithm options for SA creation (odp_ipsec_crypto_param_t).
+ * algorithm options for SA creation (odp_ipsec_crypto_param_t). Application
+ * must ignore values for AAD length capabilities as those are not relevant for
+ * IPSEC API (fixed in IPSEC RFCs).
  *
  * @param      auth         Authentication algorithm
  * @param[out] capa         Array of capability structures for output