[dpdk-dev] [PATCH] app/crypto-perf: fix for segfault when bad optype is used with gcm alghorithms

De Lara Guarch, Pablo pablo.de.lara.guarch at intel.com
Thu Feb 16 11:55:05 CET 2017


Hi Daniel,

> -----Original Message-----
> From: Mrzyglod, DanielX T
> Sent: Thursday, February 16, 2017 10:49 AM
> To: Mrozowicz, SlawomirX; Doherty, Declan; De Lara Guarch, Pablo
> Cc: dev at dpdk.org; Mrzyglod, DanielX T
> Subject: [PATCH] app/crypto-perf: fix for segfault when bad optype is used
> with gcm alghorithms
> 
> When somebody use bad --optype with aead alghorithms
> segmentation fault could happen.
> 
> Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test
> application")
> 
> Signed-off-by: Daniel Mrzyglod <danielx.t.mrzyglod at intel.com>

There is a checkpatch error:

ERROR:SPACING: space prohibited before that close parenthesis ')'
#75: FILE: app/test-crypto-perf/cperf_options_parsing.c:834:
+			options->auth_algo == RTE_CRYPTO_AUTH_AES_GMAC ) {

Thanks,
Pablo


More information about the dev mailing list