|WARNING| pw111825-111838 [PATCH] [v2, 14/14] cryptodev: add asym algorithms capabilities
dpdklab at iol.unh.edu
dpdklab at iol.unh.edu
Wed May 25 19:18:56 CEST 2022
Test-Label: iol-testing
Test-Status: WARNING
http://dpdk.org/patch/111825
_apply patch failure_
Submitter: Arek Kusztal <arkadiuszx.kusztal at intel.com>
Date: Wednesday, May 25 2022 15:53:24
Applied on: CommitID:0354e8e860389cf412dd051626af39b9a01e6c9c
Apply patch set 111825-111838 failed:
Checking patch app/test-crypto-perf/main.c...
Checking patch app/test-eventdev/test_perf_common.c...
error: while searching for:
static void *
cryptodev_asym_sess_create(struct prod_data *p, struct test_perf *t)
{
const struct rte_cryptodev_asymmetric_xform_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform;
void *sess;
error: patch failed: app/test-eventdev/test_perf_common.c:846
Checking patch app/test/test_cryptodev_asym.c...
Checking patch app/test/test_event_crypto_adapter.c...
error: while searching for:
static int
test_asym_op_forward_mode(uint8_t session_less)
{
const struct rte_cryptodev_asymmetric_xform_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform_tc;
union rte_event_crypto_metadata m_data;
error: patch failed: app/test/test_event_crypto_adapter.c:450
error: while searching for:
struct rte_crypto_asym_op *asym_op;
struct rte_crypto_op *op;
uint8_t input[4096] = {0};
uint8_t *result = NULL;
struct rte_event ev;
void *sess = NULL;
error: patch failed: app/test/test_event_crypto_adapter.c:458
error: while searching for:
asym_op->modex.base.length = modex_test_case.base.len;
asym_op->modex.result.data = result;
asym_op->modex.result.length = modex_test_case.result_len;
if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
xform_tc.modex.modulus.length)) {
RTE_LOG(INFO, USER1,
"line %u FAILED: %s", __LINE__,
"Invalid MODULUS length specified");
error: patch failed: app/test/test_event_crypto_adapter.c:503
error: while searching for:
static int
test_asym_op_new_mode(uint8_t session_less)
{
const struct rte_cryptodev_asymmetric_xform_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform_tc;
union rte_event_crypto_metadata m_data;
error: patch failed: app/test/test_event_crypto_adapter.c:784
error: while searching for:
struct rte_crypto_asym_op *asym_op;
struct rte_crypto_op *op;
uint8_t input[4096] = {0};
uint8_t *result = NULL;
void *sess = NULL;
uint32_t cap;
error: patch failed: app/test/test_event_crypto_adapter.c:792
error: while searching for:
asym_op->modex.base.length = modex_test_case.base.len;
asym_op->modex.result.data = result;
asym_op->modex.result.length = modex_test_case.result_len;
if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
xform_tc.modex.modulus.length)) {
RTE_LOG(INFO, USER1,
"line %u FAILED: %s", __LINE__,
"Invalid MODULUS length specified");
error: patch failed: app/test/test_event_crypto_adapter.c:835
Checking patch drivers/crypto/openssl/rte_openssl_pmd_ops.c...
Checking patch drivers/crypto/qat/dev/qat_asym_pmd_gen1.c...
Checking patch lib/cryptodev/rte_crypto_asym.h...
Checking patch lib/cryptodev/rte_cryptodev.c...
Checking patch lib/cryptodev/rte_cryptodev.h...
Checking patch lib/cryptodev/version.map...
error: while searching for:
#added in 22.07
rte_cryptodev_session_event_mdata_set;
};
INTERNAL {
error: patch failed: lib/cryptodev/version.map:108
Applied patch app/test-crypto-perf/main.c cleanly.
Applying patch app/test-eventdev/test_perf_common.c with 1 reject...
Rejected hunk #1.
Applied patch app/test/test_cryptodev_asym.c cleanly.
Applying patch app/test/test_event_crypto_adapter.c with 6 rejects...
Rejected hunk #1.
Rejected hunk #2.
Rejected hunk #3.
Rejected hunk #4.
Rejected hunk #5.
Rejected hunk #6.
Applied patch drivers/crypto/openssl/rte_openssl_pmd_ops.c cleanly.
Applied patch drivers/crypto/qat/dev/qat_asym_pmd_gen1.c cleanly.
Applied patch lib/cryptodev/rte_crypto_asym.h cleanly.
Applied patch lib/cryptodev/rte_cryptodev.c cleanly.
Applied patch lib/cryptodev/rte_cryptodev.h cleanly.
Applying patch lib/cryptodev/version.map with 1 reject...
Rejected hunk #1.
diff a/app/test-eventdev/test_perf_common.c b/app/test-eventdev/test_perf_common.c (rejected hunks)
@@ -846,7 +846,7 @@ cryptodev_sym_sess_create(struct prod_data *p, struct test_perf *t)
static void *
cryptodev_asym_sess_create(struct prod_data *p, struct test_perf *t)
{
- const struct rte_cryptodev_asymmetric_xform_capability *capability;
+ const struct rte_cryptodev_asymmetric_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform;
void *sess;
diff a/app/test/test_event_crypto_adapter.c b/app/test/test_event_crypto_adapter.c (rejected hunks)
@@ -450,7 +450,7 @@ test_session_with_op_forward_mode(void)
static int
test_asym_op_forward_mode(uint8_t session_less)
{
- const struct rte_cryptodev_asymmetric_xform_capability *capability;
+ const struct rte_cryptodev_asymmetric_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform_tc;
union rte_event_crypto_metadata m_data;
@@ -458,6 +458,7 @@ test_asym_op_forward_mode(uint8_t session_less)
struct rte_crypto_asym_op *asym_op;
struct rte_crypto_op *op;
uint8_t input[4096] = {0};
+ struct rte_crypto_mod_capability mod_capa = {0};
uint8_t *result = NULL;
struct rte_event ev;
void *sess = NULL;
@@ -503,8 +504,9 @@ test_asym_op_forward_mode(uint8_t session_less)
asym_op->modex.base.length = modex_test_case.base.len;
asym_op->modex.result.data = result;
asym_op->modex.result.length = modex_test_case.result_len;
- if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
- xform_tc.modex.modulus.length)) {
+
+ mod_capa.max_mod_size = xform_tc.modex.modulus.length;
+ if (!rte_cryptodev_capa_check_mod(capability, mod_capa)) {
RTE_LOG(INFO, USER1,
"line %u FAILED: %s", __LINE__,
"Invalid MODULUS length specified");
@@ -784,7 +786,7 @@ test_session_with_op_new_mode(void)
static int
test_asym_op_new_mode(uint8_t session_less)
{
- const struct rte_cryptodev_asymmetric_xform_capability *capability;
+ const struct rte_cryptodev_asymmetric_capability *capability;
struct rte_cryptodev_asym_capability_idx cap_idx;
struct rte_crypto_asym_xform xform_tc;
union rte_event_crypto_metadata m_data;
@@ -792,6 +794,7 @@ test_asym_op_new_mode(uint8_t session_less)
struct rte_crypto_asym_op *asym_op;
struct rte_crypto_op *op;
uint8_t input[4096] = {0};
+ struct rte_crypto_mod_capability mod_capa = {0};
uint8_t *result = NULL;
void *sess = NULL;
uint32_t cap;
@@ -835,8 +838,9 @@ test_asym_op_new_mode(uint8_t session_less)
asym_op->modex.base.length = modex_test_case.base.len;
asym_op->modex.result.data = result;
asym_op->modex.result.length = modex_test_case.result_len;
- if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
- xform_tc.modex.modulus.length)) {
+
+ mod_capa.max_mod_size = xform_tc.modex.modulus.length;
+ if (!rte_cryptodev_capa_check_mod(capability, mod_capa)) {
RTE_LOG(INFO, USER1,
"line %u FAILED: %s", __LINE__,
"Invalid MODULUS length specified");
diff a/lib/cryptodev/version.map b/lib/cryptodev/version.map (rejected hunks)
@@ -108,6 +108,10 @@ EXPERIMENTAL {
#added in 22.07
rte_cryptodev_session_event_mdata_set;
+ rte_cryptodev_capa_check_mod;
+ rte_cryptodev_capa_check_rsa;
+ rte_cryptodev_capa_check_ecdsa;
+ rte_cryptodev_capa_check_ecpm;
};
INTERNAL {
https://lab.dpdk.org/results/dashboard/patchsets/22298/
UNH-IOL DPDK Community Lab
More information about the test-report
mailing list