From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 339364327C for ; Fri, 3 Nov 2023 16:46:29 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2D57C4014F; Fri, 3 Nov 2023 16:46:29 +0100 (CET) Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by mails.dpdk.org (Postfix) with ESMTP id ED82E4014F for ; Fri, 3 Nov 2023 16:46:26 +0100 (CET) Received: from loongson.cn (unknown [192.168.100.1]) by gateway (Coremail) with SMTP id _____8Cxh+jQFUVl3bs2AA--.6216S3; Fri, 03 Nov 2023 23:46:24 +0800 (CST) Received: from localhost.localdomain (unknown [192.168.100.1]) by localhost.localdomain (Coremail) with SMTP id AQAAf8DxS9zNFUVlFyg5AA--.57954S3; Fri, 03 Nov 2023 23:46:21 +0800 (CST) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by localhost.localdomain (8.15.2/8.15.2) with ESMTPS id 3A3FPIsV3341197 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Fri, 3 Nov 2023 23:25:18 +0800 Received: (from root@localhost) by localhost.localdomain (8.15.2/8.15.2/Submit) id 3A3FPIS63341196; Fri, 3 Nov 2023 23:25:18 +0800 Date: Fri, 3 Nov 2023 23:25:18 +0800 From: qemudev@loongson.cn Message-Id: <202311031525.3A3FPIS63341196@localhost.localdomain> Content-Type: text/plain; charset="utf-8" Subject: |WARNING| pw133842 [PATCH] crypto/openssl: fix asym memory leaks In-Reply-To: <20231103154516.3456536-1-ciara.power@intel.com> References: <20231103154516.3456536-1-ciara.power@intel.com> To: test-report@dpdk.org Cc: Ciara Power , zhoumin@loongson.cn X-CM-TRANSID: AQAAf8DxS9zNFUVlFyg5AA--.57954S3 Authentication-Results: localhost.localdomain; spf=neutral smtp.mail=q emudev@loongson.cn; X-CM-SenderInfo: pthp3vthy6z05rqj20fqof0/1tbiAQADD2VDFQ7k8wBEsj X-Coremail-Antispam: 1Uk129KBj93XoW7AFyDXw15Aw4fZw4DJFykCrX_yoW8ur1rpF s3Aa1kArW8Jr4kt343CFs5AFyrXF98ZryYqan8G34DWFnIqF10qayxCrW5ua98XF43C3W2 yF45X34jgFyrGagCm3ZEXasCq-sJn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUkFb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVW8Jr0_Cr1UM28EF7xvwVC2z280aVCY1x0267AK xVW8Jr0_Cr1UM2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12xvs2x26I8E6xACxx 1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1Y6r17McIj6I8E87Iv 67AKxVWxJVW8Jr1lOx8S6xCaFVCjc4AY6r1j6r4UM4kE6xkIj40Ew7xC0wCF04k20xvY0x 0EwIxGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E 7480Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_Jrv_JF1lIxkGc2Ij64vIr41lIxAIcV C0I7IYx2IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF 04k26cxKx2IYs7xG6r1j6r1xMIIF0xvEx4A2jsIE14v26r4j6F4UMIIF0xvEx4A2jsIEc7 CjxVAFwI0_Gr0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x07UWq2_UUUUU= X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Test-Label: loongarch-compilation Test-Status: WARNING http://dpdk.org/patch/133842 _apply patch failure_ Submitter: Ciara Power Date: Fri, 3 Nov 2023 15:45:16 +0000 DPDK git baseline: Repo:dpdk-next-crypto Branch: for-main CommitID: 11e5ca63c77b355d0397f642989f28a7a0318cbc Apply patch set 133842 failed: Checking patch drivers/crypto/openssl/openssl_pmd_private.h... Checking patch drivers/crypto/openssl/rte_openssl_pmd.c... error: while searching for: err_dsa_sign: if (params) OSSL_PARAM_free(params); if (key_ctx) EVP_PKEY_CTX_free(key_ctx); if (dsa_ctx) EVP_PKEY_CTX_free(dsa_ctx); EVP_PKEY_free(pkey); return ret; } error: patch failed: drivers/crypto/openssl/rte_openssl_pmd.c:1958 error: drivers/crypto/openssl/rte_openssl_pmd.c: patch does not apply Checking patch drivers/crypto/openssl/rte_openssl_pmd_ops.c... Hunk #1 succeeded at 1104 (offset -2 lines). Hunk #2 succeeded at 1129 (offset -2 lines). Hunk #3 succeeded at 1146 (offset -2 lines). error: while searching for: err_dh: OPENSSL_LOG(ERR, " failed to set dh params\n"); BN_free(p); BN_free(g); return -1; } case RTE_CRYPTO_ASYM_XFORM_DSA: { #if (OPENSSL_VERSION_NUMBER >= 0x30000000L) BIGNUM *p = NULL, *g = NULL; BIGNUM *q = NULL, *priv_key = NULL; BIGNUM *pub_key = NULL; OSSL_PARAM_BLD *param_bld = NULL; p = BN_bin2bn((const unsigned char *) xform->dsa.p.data, xform->dsa.p.length, p); g = BN_bin2bn((const unsigned char *) xform->dsa.g.data, xform->dsa.g.length, g); q = BN_bin2bn((const unsigned char *) xform->dsa.q.data, xform->dsa.q.length, q); if (!p || !q || !g) goto err_dsa; priv_key = BN_bin2bn((const unsigned char *) xform->dsa.x.data, xform->dsa.x.length, priv_key); if (priv_key == NULL) goto err_dsa; param_bld = OSSL_PARAM_BLD_new(); error: patch failed: drivers/crypto/openssl/rte_openssl_pmd_ops.c:1177 error: drivers/crypto/openssl/rte_openssl_pmd_ops.c: patch does not apply