Skip to content

Comments

Proposal for MACSec SAI Attribute enhancements#2213

Open
rushanmu-cisco wants to merge 1 commit intoopencomputeproject:masterfrom
rushanmu-cisco:macsec_secure_policy
Open

Proposal for MACSec SAI Attribute enhancements#2213
rushanmu-cisco wants to merge 1 commit intoopencomputeproject:masterfrom
rushanmu-cisco:macsec_secure_policy

Conversation

@rushanmu-cisco
Copy link

@rushanmu-cisco rushanmu-cisco commented Sep 29, 2025

This PR brings support for Configuration of MACSec security modes, Confidentiality offset and extended TCI configuration

@rushanmu-cisco rushanmu-cisco marked this pull request as draft September 29, 2025 23:52
@rushanmu-cisco rushanmu-cisco marked this pull request as ready for review October 1, 2025 18:26
@rushanmu-cisco rushanmu-cisco changed the title Configuration of MACSec secure policy Proposal for MACSec SAI Attribute enhancements Oct 5, 2025
@rushanmu-cisco
Copy link
Author

/azp run

@azure-pipelines
Copy link

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@rushanmu-cisco
Copy link
Author

/azp run

@azure-pipelines
Copy link

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Collaborator

@rushanmu-cisco - please squash your commits

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@rushanmu-cisco
Copy link
Author

@tjchadaga, can you please help trigger azp? Thank you!

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga tjchadaga added the reviewed PR is discussed in SAI Meeting label Oct 9, 2025
@tjchadaga
Copy link
Collaborator

@JaiOCP , @judyjoseph - could you please help review?

1 similar comment
@rushanmu-cisco
Copy link
Author

@JaiOCP , @judyjoseph - could you please help review?

@rushanmu-cisco
Copy link
Author

/azp run

@azure-pipelines
Copy link

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga
Copy link
Collaborator

/azp run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request proposes enhancements to the SAI MACsec API to support additional configuration options as defined in IEEE 802.1AE standard. The changes add three major capabilities: security mode configuration (Must Secure/Should Secure), confidentiality offset configuration, and Tag Control Information (TCI) field configuration for End Station (ES) and Single Copy Broadcast (SCB) bits.

Changes:

  • Added sai_macsec_port_security_mode_t enum and SAI_MACSEC_PORT_ATTR_SECURITY_MODE attribute to configure whether the port operates in fail-open (Should Secure) or fail-closed (Must Secure) mode
  • Added SAI_MACSEC_SC_ATTR_CONFIDENTIALITY_OFFSET attribute to allow selective unencrypted bytes in the payload while maintaining integrity protection
  • Added SAI_MACSEC_SC_ATTR_USE_ES and SAI_MACSEC_SC_ATTR_USE_SCB attributes for TCI field configuration

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 9 comments.

File Description
inc/saimacsec.h Adds new enum for security modes, new port attribute for security mode configuration, and new SC attributes for confidentiality offset and TCI bits (ES/SCB)
doc/SAI-Proposal-MACSec-Enhancements.md Provides detailed technical documentation explaining the rationale, usage, and API workflow for the new MACsec enhancements with code examples

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Signed-off-by: rushanmu <rushanmu@cisco.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

reviewed PR is discussed in SAI Meeting

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants