From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E0382464CC for ; Mon, 31 Mar 2025 23:32:25 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D828F40A6C; Mon, 31 Mar 2025 23:32:25 +0200 (CEST) Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.10]) by mails.dpdk.org (Postfix) with ESMTP id 6F77840A6C for ; Mon, 31 Mar 2025 23:32:24 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1743456745; x=1774992745; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=e7NUSlISMo5o/q36Fd0dBWOF1ll8OA0xTufs+kvctuM=; b=GqVEdRIZUua31oIhlQi5ArrbzotOclJcSE+UmA77obHuQ0y8vWK2Abko 5uKk7UTyOusdJNAViOfm1RMekciyRvrqkg288T/fmtk0JD7OlgFfhD1nZ kIpvG5g1qd8fCUHjStQd9Oe5+dvCQp3hSbgixTdwptjzmhM/xeBIO/q9R F2RxmmcwQmDuCQgd/HqTRKcyEnPx6LnRl/aQh6zOckHKrTFDUZPjDQvXU BEq14TeXF+g1RuTuDkDbIwxO7z8UNPCBEEOP6vs5WWpVNqW6/6hnxFD73 dce/jAHm3rMPa7RXZmCna7yN/NTVlX3FmNR0U+kVsRc4Ft3LqWC0RYGoH w==; X-CSE-ConnectionGUID: HaCRGQmcTOuD64/W+qhREg== X-CSE-MsgGUID: Wyw0iczgQZ+t5KGQpLPmOw== X-IronPort-AV: E=McAfee;i="6700,10204,11390"; a="62153209" X-IronPort-AV: E=Sophos;i="6.14,291,1736841600"; d="scan'208";a="62153209" Received: from orviesa009.jf.intel.com ([10.64.159.149]) by orvoesa102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Mar 2025 14:32:24 -0700 X-CSE-ConnectionGUID: 5i6pC0UbRceixomynGGmDg== X-CSE-MsgGUID: XjEGXDGbQEKt6lRMPakoAw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.14,291,1736841600"; d="scan'208";a="125953997" Received: from silpixa00400465.ir.intel.com ([10.55.129.27]) by orviesa009.jf.intel.com with ESMTP; 31 Mar 2025 14:32:23 -0700 From: Arkadiusz Kusztal To: stable@dpdk.org Cc: kai.ji@intel.com, Arkadiusz Kusztal Subject: [PATCH 22.11] app/test: fix a merge problem in oop patch Date: Mon, 31 Mar 2025 21:32:20 +0000 Message-ID: <20250331213220.3268748-1-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Fix "app/test: fix the check of the oop header data" was incorrectly applied: code was added into the wrong functions. This fix addresses this issue. Bugzilla ID: 1686 Fixes: bb8feaacb489 ("test/crypto: fix check for OOP header data") Signed-off-by: Arkadiusz Kusztal --- app/test/test_cryptodev.c | 58 +++++++++++++++++++-------------------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index ac477431c4..92113a55d2 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -11453,8 +11453,9 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) struct crypto_testsuite_params *ts_params = &testsuite_params; struct crypto_unittest_params *ut_params = &unittest_params; + uint32_t i; int retval; - uint8_t *ciphertext, *auth_tag; + uint8_t *ciphertext, *auth_tag, *buffer_oop; uint16_t plaintext_pad_len; struct rte_cryptodev_info dev_info; @@ -11526,6 +11527,18 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); + /* Check if the data within the offset range is not overwritten in the OOP */ + buffer_oop = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *); + for (i = 0; i < ut_params->op->sym->cipher.data.offset; i++) { + if (buffer_oop[i]) { + RTE_LOG(ERR, USER1, + "Incorrect value of the output buffer header\n"); + debug_hexdump(stdout, "Incorrect value:", buffer_oop, + ut_params->op->sym->cipher.data.offset); + return TEST_FAILED; + } + } + /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( ciphertext, @@ -11555,8 +11568,9 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) struct crypto_testsuite_params *ts_params = &testsuite_params; struct crypto_unittest_params *ut_params = &unittest_params; + uint32_t i; int retval; - uint8_t *plaintext; + uint8_t *plaintext, *buffer_oop; struct rte_cryptodev_info dev_info; rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); @@ -11626,6 +11640,17 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); + /* Check if the data within the offset range is not overwritten in the OOP */ + buffer_oop = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *); + for (i = 0; i < ut_params->op->sym->cipher.data.offset; i++) { + if (buffer_oop[i]) { + RTE_LOG(ERR, USER1, + "Incorrect value of the output buffer header\n"); + debug_hexdump(stdout, "Incorrect value:", buffer_oop, + ut_params->op->sym->cipher.data.offset); + return TEST_FAILED; + } + } /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( plaintext, @@ -11652,9 +11677,8 @@ test_authenticated_encryption_sessionless( struct crypto_testsuite_params *ts_params = &testsuite_params; struct crypto_unittest_params *ut_params = &unittest_params; - uint32_t i; int retval; - uint8_t *ciphertext, *auth_tag, *buffer_oop; + uint8_t *ciphertext, *auth_tag; uint16_t plaintext_pad_len; uint8_t key[tdata->key.len + 1]; struct rte_cryptodev_info dev_info; @@ -11722,18 +11746,6 @@ test_authenticated_encryption_sessionless( ut_params->op->sym->cipher.data.offset); auth_tag = ciphertext + plaintext_pad_len; - /* Check if the data within the offset range is not overwritten in the OOP */ - buffer_oop = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *); - for (i = 0; i < ut_params->op->sym->cipher.data.offset; i++) { - if (buffer_oop[i]) { - RTE_LOG(ERR, USER1, - "Incorrect value of the output buffer header\n"); - debug_hexdump(stdout, "Incorrect value:", buffer_oop, - ut_params->op->sym->cipher.data.offset); - return TEST_FAILED; - } - } - debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); @@ -11768,9 +11780,8 @@ test_authenticated_decryption_sessionless( struct crypto_testsuite_params *ts_params = &testsuite_params; struct crypto_unittest_params *ut_params = &unittest_params; - uint32_t i; int retval; - uint8_t *plaintext, *buffer_oop; + uint8_t *plaintext; uint8_t key[tdata->key.len + 1]; struct rte_cryptodev_info dev_info; @@ -11847,17 +11858,6 @@ test_authenticated_decryption_sessionless( debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); - /* Check if the data within the offset range is not overwritten in the OOP */ - buffer_oop = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *); - for (i = 0; i < ut_params->op->sym->cipher.data.offset; i++) { - if (buffer_oop[i]) { - RTE_LOG(ERR, USER1, - "Incorrect value of the output buffer header\n"); - debug_hexdump(stdout, "Incorrect value:", buffer_oop, - ut_params->op->sym->cipher.data.offset); - return TEST_FAILED; - } - } /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( plaintext, -- 2.43.0