From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id E158BA0613 for ; Fri, 27 Sep 2019 12:11:54 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B3CFD1BEBA; Fri, 27 Sep 2019 12:11:54 +0200 (CEST) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by dpdk.org (Postfix) with ESMTP id EFA381BEB2 for ; Fri, 27 Sep 2019 12:11:52 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Sep 2019 03:11:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,555,1559545200"; d="scan'208";a="201968452" Received: from kmsmsx151.gar.corp.intel.com ([172.21.73.86]) by orsmga002.jf.intel.com with ESMTP; 27 Sep 2019 03:11:51 -0700 Received: from pgsmsx102.gar.corp.intel.com ([169.254.6.203]) by KMSMSX151.gar.corp.intel.com ([169.254.10.225]) with mapi id 14.03.0439.000; Fri, 27 Sep 2019 18:11:50 +0800 From: "Gujjar, Abhinandan S" To: Hemant Agrawal , "dev@dpdk.org" Thread-Topic: [PATCH] test/event_crypto: change the SEC cipher algo Thread-Index: AQHVdQwnJ3IMJ0y5xE+cd0l4F1Ph46c/TdLA Date: Fri, 27 Sep 2019 10:11:49 +0000 Message-ID: <5612CB344B05EE4F95FC5B729939F7807954A60F@PGSMSX102.gar.corp.intel.com> References: <20190927081606.22931-1-hemant.agrawal@nxp.com> <20190927081606.22931-2-hemant.agrawal@nxp.com> In-Reply-To: <20190927081606.22931-2-hemant.agrawal@nxp.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ctpclassification: CTP_NT x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiZTQ5MmM4NjMtM2NkOC00MmVjLThiOTktZjkwYzk4ZTEzZWE4IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiNDYyS2VWc0lra3VESWNEYlhVZjkzdVNXVGFKakdKMUNOOGRcL3VcL2dhcVNYeFVcL1hEeTZsVUFIM0ZUNXBybTZhZCJ9 dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [172.30.20.206] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dpdk-dev] [PATCH] test/event_crypto: change the SEC cipher algo X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Acked-by: abhinandan.gujjar@intel.com > -----Original Message----- > From: Hemant Agrawal > Sent: Friday, September 27, 2019 1:46 PM > To: dev@dpdk.org; Gujjar, Abhinandan S > Cc: Hemant Agrawal > Subject: [PATCH] test/event_crypto: change the SEC cipher algo >=20 > The existing code usages NULL as the cipher algo for testing crypto event > adapter. > DPAA1/DPAA2 do not support NULL algo. Hence changing is to the most > common algo AES-CBC, which is supported by all crypto drivers implementin= g > event crypto adapter. >=20 > Signed-off-by: Hemant Agrawal > --- > app/test/test_event_crypto_adapter.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) >=20 > diff --git a/app/test/test_event_crypto_adapter.c > b/app/test/test_event_crypto_adapter.c > index cff7ad61f..83f3214ca 100644 > --- a/app/test/test_event_crypto_adapter.c > +++ b/app/test/test_event_crypto_adapter.c > @@ -183,7 +183,7 @@ test_op_forward_mode(uint8_t session_less) > cipher_xform.type =3D RTE_CRYPTO_SYM_XFORM_CIPHER; > cipher_xform.next =3D NULL; >=20 > - cipher_xform.cipher.algo =3D RTE_CRYPTO_CIPHER_NULL; > + cipher_xform.cipher.algo =3D RTE_CRYPTO_CIPHER_AES_CBC; > cipher_xform.cipher.op =3D RTE_CRYPTO_CIPHER_OP_ENCRYPT; >=20 > op =3D rte_crypto_op_alloc(params.op_mpool, > @@ -373,7 +373,7 @@ test_op_new_mode(uint8_t session_less) > cipher_xform.type =3D RTE_CRYPTO_SYM_XFORM_CIPHER; > cipher_xform.next =3D NULL; >=20 > - cipher_xform.cipher.algo =3D RTE_CRYPTO_CIPHER_NULL; > + cipher_xform.cipher.algo =3D RTE_CRYPTO_CIPHER_AES_CBC; > cipher_xform.cipher.op =3D RTE_CRYPTO_CIPHER_OP_ENCRYPT; >=20 > op =3D rte_crypto_op_alloc(params.op_mpool, > -- > 2.17.1