From a158899a8063cafb6709373a6ebcd66aa019f756 Mon Sep 17 00:00:00 2001 From: Pablo de Lara Date: Thu, 31 Mar 2016 10:32:10 +0100 Subject: [PATCH] examples/l2fwd-crypto: fix length of random IV/AAD App was generating a random IV/AAD of only 4 bytes, instead of the actual length, since it was using sizeof(length). Fixes: 27cf2d1b18e1 ("examples/l2fwd-crypto: discover capabilities") Signed-off-by: Pablo de Lara Tested-by: Min Cao Acked-by: Declan Doherty --- examples/l2fwd-crypto/main.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c index 1b0c2290e1..c323b55d80 100644 --- a/examples/l2fwd-crypto/main.c +++ b/examples/l2fwd-crypto/main.c @@ -643,7 +643,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options) port_cparams[i].aad.phys_addr = options->aad.phys_addr; if (!options->aad_param) generate_random_key(port_cparams[i].aad.data, - sizeof(port_cparams[i].aad.length)); + port_cparams[i].aad.length); } @@ -661,7 +661,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options) port_cparams[i].iv.phys_addr = options->iv.phys_addr; if (!options->iv_param) generate_random_key(port_cparams[i].iv.data, - sizeof(port_cparams[i].iv.length)); + port_cparams[i].iv.length); port_cparams[i].cipher_algo = options->cipher_xform.cipher.algo; } -- 2.20.1