drivers/crypto: return error for not supported SA lifetime

dpaa, dpaa2 and caam_jr drivers do not support
SA expiry. This result in failure of test cases in
test app. This patch returns ENOTSUP to skip the
SA lifetime test cases.

Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
Acked-by: Akhil Goyal <gakhil@marvell.com>
This commit is contained in:
Gagandeep Singh 2021-11-18 13:00:30 +05:30 committed by Akhil Goyal
parent 0aa5986c28
commit 8f4125c1bf
3 changed files with 18 additions and 0 deletions

View File

@ -1756,6 +1756,12 @@ caam_jr_set_ipsec_session(__rte_unused struct rte_cryptodev *dev,
PMD_INIT_FUNC_TRACE();
if (ipsec_xform->life.bytes_hard_limit != 0 ||
ipsec_xform->life.bytes_soft_limit != 0 ||
ipsec_xform->life.packets_hard_limit != 0 ||
ipsec_xform->life.packets_soft_limit != 0)
return -ENOTSUP;
if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) {
cipher_xform = &conf->crypto_xform->cipher;
auth_xform = &conf->crypto_xform->next->auth;

View File

@ -2877,6 +2877,12 @@ dpaa2_sec_set_ipsec_session(struct rte_cryptodev *dev,
priv->fle_pool = dev_priv->fle_pool;
flc = &priv->flc_desc[0].flc;
if (ipsec_xform->life.bytes_hard_limit != 0 ||
ipsec_xform->life.bytes_soft_limit != 0 ||
ipsec_xform->life.packets_hard_limit != 0 ||
ipsec_xform->life.packets_soft_limit != 0)
return -ENOTSUP;
memset(session, 0, sizeof(dpaa2_sec_session));
if (conf->crypto_xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {

View File

@ -2820,6 +2820,12 @@ dpaa_sec_set_ipsec_session(__rte_unused struct rte_cryptodev *dev,
session->proto_alg = conf->protocol;
session->ctxt = DPAA_SEC_IPSEC;
if (ipsec_xform->life.bytes_hard_limit != 0 ||
ipsec_xform->life.bytes_soft_limit != 0 ||
ipsec_xform->life.packets_hard_limit != 0 ||
ipsec_xform->life.packets_soft_limit != 0)
return -ENOTSUP;
if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS)
session->dir = DIR_ENC;
else