Skip to content

Proposal for MACSec SAI Attribute enhancements#2213

Merged
tjchadaga merged 1 commit intoopencomputeproject:masterfrom
rushanmu-cisco:macsec_secure_policy
Mar 11, 2026
Merged

Proposal for MACSec SAI Attribute enhancements#2213
tjchadaga merged 1 commit intoopencomputeproject:masterfrom
rushanmu-cisco:macsec_secure_policy

Conversation

@rushanmu-cisco
Copy link
Copy Markdown
Contributor

@rushanmu-cisco rushanmu-cisco commented Sep 29, 2025

This PR brings support for Configuration of MACSec security modes, Confidentiality offset and extended TCI configuration

@rushanmu-cisco rushanmu-cisco marked this pull request as draft September 29, 2025 23:52
@rushanmu-cisco rushanmu-cisco marked this pull request as ready for review October 1, 2025 18:26
@rushanmu-cisco rushanmu-cisco changed the title Configuration of MACSec secure policy Proposal for MACSec SAI Attribute enhancements Oct 5, 2025
@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Copy Markdown
Collaborator

@rushanmu-cisco - please squash your commits

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

@tjchadaga, can you please help trigger azp? Thank you!

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga tjchadaga added the reviewed PR is discussed in SAI Meeting label Oct 9, 2025
@tjchadaga
Copy link
Copy Markdown
Collaborator

@JaiOCP , @judyjoseph - could you please help review?

1 similar comment
@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

@JaiOCP , @judyjoseph - could you please help review?

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request proposes enhancements to the SAI MACsec API to support additional configuration options as defined in IEEE 802.1AE standard. The changes add three major capabilities: security mode configuration (Must Secure/Should Secure), confidentiality offset configuration, and Tag Control Information (TCI) field configuration for End Station (ES) and Single Copy Broadcast (SCB) bits.

Changes:

  • Added sai_macsec_port_security_mode_t enum and SAI_MACSEC_PORT_ATTR_SECURITY_MODE attribute to configure whether the port operates in fail-open (Should Secure) or fail-closed (Must Secure) mode
  • Added SAI_MACSEC_SC_ATTR_CONFIDENTIALITY_OFFSET attribute to allow selective unencrypted bytes in the payload while maintaining integrity protection
  • Added SAI_MACSEC_SC_ATTR_USE_ES and SAI_MACSEC_SC_ATTR_USE_SCB attributes for TCI field configuration

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 9 comments.

File Description
inc/saimacsec.h Adds new enum for security modes, new port attribute for security mode configuration, and new SC attributes for confidentiality offset and TCI bits (ES/SCB)
doc/SAI-Proposal-MACSec-Enhancements.md Provides detailed technical documentation explaining the rationale, usage, and API workflow for the new MACsec enhancements with code examples

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread doc/SAI-Proposal-MACSec-Enhancements.md Outdated
Comment thread inc/saimacsec.h
Comment thread inc/saimacsec.h
Comment thread doc/SAI-Proposal-MACSec-Enhancements.md Outdated
Comment thread inc/saimacsec.h
Comment thread doc/SAI-Proposal-MACSec-Enhancements.md Outdated
Comment thread doc/SAI-Proposal-MACSec-Enhancements.md Outdated
Comment thread inc/saimacsec.h
Comment thread doc/SAI-Proposal-MACSec-Enhancements.md Outdated
@rushanmu-cisco rushanmu-cisco force-pushed the macsec_secure_policy branch 2 times, most recently from 59dcded to 78781ab Compare February 20, 2026 20:29
@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Commenter does not have sufficient privileges for PR 2213 in repo opencomputeproject/SAI

Signed-off-by: rushanmu <rushanmu@cisco.com>
@rajkumar38
Copy link
Copy Markdown
Contributor

@AnandhiDhanabalan, Pls review this PR

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

@tjchadaga Can you please help trigger azure pipelines?

@tjchadaga
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@tjchadaga
Copy link
Copy Markdown
Collaborator

@JaiOCP ,@AnandhiDhanabalan - please help review this PR

@AnandhiDhanabalan
Copy link
Copy Markdown
Contributor

Changes looks good to me. I approve the changes.

Copy link
Copy Markdown
Contributor

@AnandhiDhanabalan AnandhiDhanabalan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes look good.

@rushanmu-cisco
Copy link
Copy Markdown
Contributor Author

@tjchadaga Can you please help merge/integrate?

@tjchadaga tjchadaga merged commit 773925e into opencomputeproject:master Mar 11, 2026
3 checks passed
tjchadaga pushed a commit that referenced this pull request Mar 31, 2026
Signed-off-by: rushanmu <rushanmu@cisco.com>
cursor Bot pushed a commit to yuriilisovskyi/SAI that referenced this pull request Apr 7, 2026
Signed-off-by: rushanmu <rushanmu@cisco.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

reviewed PR is discussed in SAI Meeting

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants