[dpdk-dev] [PATCH] app/crypto-perf: fix for segfault when bad optype is used with gcm alghorithms
De Lara Guarch, Pablo
pablo.de.lara.guarch at intel.com
Thu Feb 16 11:55:05 CET 2017
Hi Daniel,
> -----Original Message-----
> From: Mrzyglod, DanielX T
> Sent: Thursday, February 16, 2017 10:49 AM
> To: Mrozowicz, SlawomirX; Doherty, Declan; De Lara Guarch, Pablo
> Cc: dev at dpdk.org; Mrzyglod, DanielX T
> Subject: [PATCH] app/crypto-perf: fix for segfault when bad optype is used
> with gcm alghorithms
>
> When somebody use bad --optype with aead alghorithms
> segmentation fault could happen.
>
> Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test
> application")
>
> Signed-off-by: Daniel Mrzyglod <danielx.t.mrzyglod at intel.com>
There is a checkpatch error:
ERROR:SPACING: space prohibited before that close parenthesis ')'
#75: FILE: app/test-crypto-perf/cperf_options_parsing.c:834:
+ options->auth_algo == RTE_CRYPTO_AUTH_AES_GMAC ) {
Thanks,
Pablo
More information about the dev
mailing list