From patchwork Wed Dec 13 07:15:08 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 32193 X-Patchwork-Delegate: pablo.de.lara.guarch@intel.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 4C0362030; Wed, 13 Dec 2017 08:18:47 +0100 (CET) Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0069.outbound.protection.outlook.com [104.47.36.69]) by dpdk.org (Postfix) with ESMTP id F39E91C00 for ; Wed, 13 Dec 2017 08:18:45 +0100 (CET) Received: from BN3PR03CA0076.namprd03.prod.outlook.com (2a01:111:e400:7a4d::36) by SN2PR03MB2366.namprd03.prod.outlook.com (2603:10b6:804:e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.302.9; Wed, 13 Dec 2017 07:18:44 +0000 Received: from BN1AFFO11FD007.protection.gbl (2a01:111:f400:7c10::103) by BN3PR03CA0076.outlook.office365.com (2a01:111:e400:7a4d::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.302.9 via Frontend Transport; Wed, 13 Dec 2017 07:18:44 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; NXP1.onmicrosoft.com; dkim=none (message not signed) header.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD007.mail.protection.outlook.com (10.58.52.67) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.282.5 via Frontend Transport; Wed, 13 Dec 2017 07:18:36 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id vBD7Idx2008217; Wed, 13 Dec 2017 00:18:39 -0700 From: Akhil Goyal To: CC: , , , , , , , Akhil Goyal Date: Wed, 13 Dec 2017 12:45:08 +0530 Message-ID: <20171213071508.12009-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131576231169133671; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(336005)(7966004)(39860400002)(376002)(346002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(199004)(189003)(54906003)(2906002)(36756003)(105606002)(106466001)(15650500001)(85426001)(1076002)(104016004)(8936002)(8656006)(6666003)(6916009)(8676002)(2351001)(81166006)(16586007)(305945005)(59450400001)(296002)(316002)(50226002)(5660300001)(86362001)(356003)(81156014)(97736004)(7416002)(68736007)(77096006)(53936002)(51416003)(48376002)(4326008)(47776003)(498600001)(50466002)(461764006); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR03MB2366; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD007; 1:0qpUpfNjzpQi7ziE/QJ62/UyM86B1sYWn9TIkQUWSrYI0p2sUyMRMhdZX0vurmMi5LV9AjdiVa+ww5rYd9gzkEvmB3z8pGZTW1WKcAERVswByAuo46v0jvXFjVEGt6RG MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 11c8ef30-64f5-4e4d-8c67-08d541f9ba2f X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(5600026)(4604075)(4534020)(4628075)(201703131517081)(2017052603307); SRVR:SN2PR03MB2366; X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2366; 3:wq++rK3h/b3YbOkYbxIwnMX6LnfteqSj4n7yQL/iCMWiOIREJClglPkmJECbPVtYKS6dolUbnfs+HMnqNPI5rZm1aEC6J0RthKYNC4iC3Z45cHJ/Q/n2/KhEFqOozwP4zx/vgKzZN9RUNbt57Q5fJbeoglyRibQ9dpoVDntScaNgKL8LE7HHH49b+zC+K4abPiAF/PSzLI6sIGzfquCpQlv2avp8GXJ/KeYzDxPQgdgQB5Kr7lU+hX+qx3LL9TXBcqYaAV9Wd1VQEK/YCqKgOpnP6B0kTWHPD7tGBUiceBxdBHknCJXb2c8yfH9lqCQ0fD1w9w3GAjqU1wCHo6HeNHO3BcYIOOUAPLWVPPyvgO4=; 25:1FgyUJ2gLjkIMRDyq0K9ADIWfHSyPUe/aVD/diSSWikR82A/KolFzSjvXov7Whmqs88sNlc2nqOgDHyPuf2h9u1A605/4tAXcQWlXfHsx0Typ+RuM/PvBYecu9M4CxYGx7lw0/g0AhqG4hFaTU2iW/p6mUMTTFqnQ5RmsA7c03PNjl2rBlxvxmxcBy3234U5xj8uUdMV8mbbxXJzlrz+7KoVtneeMcAPu6V3QLfP+vBfdjNNGgEQpPa0lcbcVnq1MC0LqOum+GPElLia4y6oQpOJdBAdt9z+qdxofZBkWkh/nZjrXUoVsuXv/UUvpP3erXmvlLne0dbR6/W2VAziBQ== X-MS-TrafficTypeDiagnostic: SN2PR03MB2366: X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2366; 31:YZoZF/Q9bLVN95VzoMVlLtdbVxaJBtMaKQBXpO/JmgWMcGSCml9CfM9WkHKWIYWNmkwX72LOg7iXQyPXPXQze9lgm3NZyi5nYLgK+Y14vO28d6bI62NfI0FOWbGRe1PYbrhSP+RUd/wx4vLT93EVEEw1tNzY5R/afuY9K+o0rK9TjAK4V21wVtzwqgRR4mZ1txRqbDxMp4ITUNEgu08LwNR+APWkL4jNIIjq8A8+dYQ=; 4:6GSz2+60/ygXUc+4URTHp1jcJF0l+WXWNBxmaV2khfIxTubLwmiR7xnmxyXaAY8wgd46r65CC/UHSTE3YAJu3PpQT+x5Czu8tKQ2jGt1qKsmAoNn8JGyS+4DlWkN87/cvShL5R48Lsp2I+gP66NMivPEqG4NSjiCJQoLDEyI1XllZ+rdlVifTJcheWpRlcfxCq8kNNGEwUTuWApPWgr3R2RDvQsX93yNn/VrGE1553qbqswFMG9Hl15NFX73f9HOdCF6pZl452Yvo91c0Hzu0AOaXp4J4OaGV/AHBsFv1Sa4/+BKKjY5lC347RSAk+HnHPop67xAKcqB3vb2OHdpZc3RwKt+GSRmZ4Y326/SKPQ= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(3231023)(10201501046)(6055026)(6096035)(20161123559100)(20161123565025)(20161123561025)(20161123556025)(201703131430075)(201703131520075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(20161123563025)(201708071742011); SRVR:SN2PR03MB2366; BCL:0; PCL:0; RULEID:(100000803101)(100110400095)(400006); SRVR:SN2PR03MB2366; X-Forefront-PRVS: 052017CAF1 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN2PR03MB2366; 23:TO5+xEl4ngghDLEuVwOM/3P6DBC1kD0jGc2C830/Q?= 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 X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2366; 6:fcCIoqi2xZjn+agsZwTo1mIe7h1G467Ax/bVb+ExS+Gr4zbj5/miojnPRLC1qjlVFcHI9F2Xwe6qCov1oJ6COafic5jeZL5n7y8OOdeO5jq1/hwmRfk4EomwZhTEdlAXWZockqvHWzs+A3w+5wWn8DrwJA6beQLBqv4PdEdFZ5/4gvMx+VOOr7scsrzHArRXJwjmKbHoIIQyXwtlgdp9goAFOfBoRQB4jGHTlTQ3ieRP36Wk8j2QvQJJINKiPk5FjK6+FRTU0SSMLgPsmUs7dDz0hs+Rh6DzwBwXcOF/p7j0ZexZZcrnJ0urg8YXxSTH1f9n2dx29hdL7UCGAlPlBsNYBIN17+KeiTiSGgZFDz8=; 5:FyHga2o7w6UK8dYFM5qVDSAavslNPjeV0cYXCkbtQZYs/PaxHT+B68tw5wXf5sJ+u7d0uGohX1UR2RVQVRdzwvH5dbm0Q01ZUIzJYPkVbg0GFqvVcP0ZqbSZvJJL5Ymms2FU7K5o/nemyfVXKz5+omRyoaS+2SDaUe1YSPUSxm0=; 24:J2pu6doi5dt70HX8tDT3h8REE91lUgEKBztUVAmu9E/Av5TWmcvG+m6sIsOKCI/ABxgwapxs4C0M4IMR88GN8oSrSOYiruKNJK8LkeYjlag=; 7:HCqc3NPqVd0C2Y4pE0dcLZa4ogoZ3PXP5MJVIa/TaKaYidFBplnojHE7EsLWY8MwXgRkBlS00l6GR4LP4GJaJ5ZvmdJgh+Sqjr3z34Om0vTYIYXv0j/qREC8za6GCUCGvDZV75T6pdi2ilXpqs1X2bAm4wyzqyX/Omf3knRAzxIQMCNpEnO9Qgfd47aj79/O2ik7QB6+vMNsqa5PKyBFSRFGSQWexpjOFWFv/INWlcYN2afl2NX0Vdu8t+XO5WrJ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Dec 2017 07:18:36.7261 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 11c8ef30-64f5-4e4d-8c67-08d541f9ba2f X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR03MB2366 Subject: [dpdk-dev] [PATCH] security: fix enum start value X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" enum should be initialized with 1 so that unitialized(memset) memory may not be treated as a valid enum value. Fixes: c261d1431bd8 ("security: introduce security API and framework") Signed-off-by: Akhil Goyal Acked-by: Radu Nicolau --- lib/librte_security/rte_security.h | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h index 653929b..39b624b 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -60,7 +60,7 @@ extern "C" { /** IPSec protocol mode */ enum rte_security_ipsec_sa_mode { - RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT, + RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT = 1, /**< IPSec Transport mode */ RTE_SECURITY_IPSEC_SA_MODE_TUNNEL, /**< IPSec Tunnel mode */ @@ -68,7 +68,7 @@ enum rte_security_ipsec_sa_mode { /** IPSec Protocol */ enum rte_security_ipsec_sa_protocol { - RTE_SECURITY_IPSEC_SA_PROTO_AH, + RTE_SECURITY_IPSEC_SA_PROTO_AH = 1, /**< AH protocol */ RTE_SECURITY_IPSEC_SA_PROTO_ESP, /**< ESP protocol */ @@ -76,7 +76,7 @@ enum rte_security_ipsec_sa_protocol { /** IPSEC tunnel type */ enum rte_security_ipsec_tunnel_type { - RTE_SECURITY_IPSEC_TUNNEL_IPV4, + RTE_SECURITY_IPSEC_TUNNEL_IPV4 = 1, /**< Outer header is IPv4 */ RTE_SECURITY_IPSEC_TUNNEL_IPV6, /**< Outer header is IPv6 */ @@ -252,7 +252,7 @@ enum rte_security_session_action_type { /** Security session protocol definition */ enum rte_security_session_protocol { - RTE_SECURITY_PROTOCOL_IPSEC, + RTE_SECURITY_PROTOCOL_IPSEC = 1, /**< IPsec Protocol */ RTE_SECURITY_PROTOCOL_MACSEC, /**< MACSec Protocol */