From: Pablo de Lara Date: Thu, 31 Mar 2016 09:32:10 +0000 (+0100) Subject: examples/l2fwd-crypto: fix length of random IV/AAD X-Git-Tag: spdx-start~7119 X-Git-Url: http://git.droids-corp.org/?a=commitdiff_plain;h=a158899a8063cafb6709373a6ebcd66aa019f756;p=dpdk.git examples/l2fwd-crypto: fix length of random IV/AAD App was generating a random IV/AAD of only 4 bytes, instead of the actual length, since it was using sizeof(length). Fixes: 27cf2d1b18e1 ("examples/l2fwd-crypto: discover capabilities") Signed-off-by: Pablo de Lara Tested-by: Min Cao Acked-by: Declan Doherty --- diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c index 1b0c2290e1..c323b55d80 100644 --- a/examples/l2fwd-crypto/main.c +++ b/examples/l2fwd-crypto/main.c @@ -643,7 +643,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options) port_cparams[i].aad.phys_addr = options->aad.phys_addr; if (!options->aad_param) generate_random_key(port_cparams[i].aad.data, - sizeof(port_cparams[i].aad.length)); + port_cparams[i].aad.length); } @@ -661,7 +661,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options) port_cparams[i].iv.phys_addr = options->iv.phys_addr; if (!options->iv_param) generate_random_key(port_cparams[i].iv.data, - sizeof(port_cparams[i].iv.length)); + port_cparams[i].iv.length); port_cparams[i].cipher_algo = options->cipher_xform.cipher.algo; }