|WARNING| pw111825-111838 [PATCH] [v2, 14/14] cryptodev: add asym algorithms capabilities

dpdklab at iol.unh.edu dpdklab at iol.unh.edu
Wed May 25 19:18:56 CEST 2022


Test-Label: iol-testing
Test-Status: WARNING
http://dpdk.org/patch/111825

_apply patch failure_

Submitter: Arek Kusztal <arkadiuszx.kusztal at intel.com>
Date: Wednesday, May 25 2022 15:53:24 
Applied on: CommitID:0354e8e860389cf412dd051626af39b9a01e6c9c
Apply patch set 111825-111838 failed:

Checking patch app/test-crypto-perf/main.c...
Checking patch app/test-eventdev/test_perf_common.c...
error: while searching for:
static void *
cryptodev_asym_sess_create(struct prod_data *p, struct test_perf *t)
{
	const struct rte_cryptodev_asymmetric_xform_capability *capability;
	struct rte_cryptodev_asym_capability_idx cap_idx;
	struct rte_crypto_asym_xform xform;
	void *sess;

error: patch failed: app/test-eventdev/test_perf_common.c:846
Checking patch app/test/test_cryptodev_asym.c...
Checking patch app/test/test_event_crypto_adapter.c...
error: while searching for:
static int
test_asym_op_forward_mode(uint8_t session_less)
{
	const struct rte_cryptodev_asymmetric_xform_capability *capability;
	struct rte_cryptodev_asym_capability_idx cap_idx;
	struct rte_crypto_asym_xform xform_tc;
	union rte_event_crypto_metadata m_data;

error: patch failed: app/test/test_event_crypto_adapter.c:450
error: while searching for:
	struct rte_crypto_asym_op *asym_op;
	struct rte_crypto_op *op;
	uint8_t input[4096] = {0};
	uint8_t *result = NULL;
	struct rte_event ev;
	void *sess = NULL;

error: patch failed: app/test/test_event_crypto_adapter.c:458
error: while searching for:
	asym_op->modex.base.length = modex_test_case.base.len;
	asym_op->modex.result.data = result;
	asym_op->modex.result.length = modex_test_case.result_len;
	if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
			xform_tc.modex.modulus.length)) {
		RTE_LOG(INFO, USER1,
			"line %u FAILED: %s", __LINE__,
			"Invalid MODULUS length specified");

error: patch failed: app/test/test_event_crypto_adapter.c:503
error: while searching for:
static int
test_asym_op_new_mode(uint8_t session_less)
{
	const struct rte_cryptodev_asymmetric_xform_capability *capability;
	struct rte_cryptodev_asym_capability_idx cap_idx;
	struct rte_crypto_asym_xform xform_tc;
	union rte_event_crypto_metadata m_data;

error: patch failed: app/test/test_event_crypto_adapter.c:784
error: while searching for:
	struct rte_crypto_asym_op *asym_op;
	struct rte_crypto_op *op;
	uint8_t input[4096] = {0};
	uint8_t *result = NULL;
	void *sess = NULL;
	uint32_t cap;

error: patch failed: app/test/test_event_crypto_adapter.c:792
error: while searching for:
	asym_op->modex.base.length = modex_test_case.base.len;
	asym_op->modex.result.data = result;
	asym_op->modex.result.length = modex_test_case.result_len;
	if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
			xform_tc.modex.modulus.length)) {
		RTE_LOG(INFO, USER1,
			"line %u FAILED: %s", __LINE__,
			"Invalid MODULUS length specified");

error: patch failed: app/test/test_event_crypto_adapter.c:835
Checking patch drivers/crypto/openssl/rte_openssl_pmd_ops.c...
Checking patch drivers/crypto/qat/dev/qat_asym_pmd_gen1.c...
Checking patch lib/cryptodev/rte_crypto_asym.h...
Checking patch lib/cryptodev/rte_cryptodev.c...
Checking patch lib/cryptodev/rte_cryptodev.h...
Checking patch lib/cryptodev/version.map...
error: while searching for:

	#added in 22.07
	rte_cryptodev_session_event_mdata_set;
};

INTERNAL {

error: patch failed: lib/cryptodev/version.map:108
Applied patch app/test-crypto-perf/main.c cleanly.
Applying patch app/test-eventdev/test_perf_common.c with 1 reject...
Rejected hunk #1.
Applied patch app/test/test_cryptodev_asym.c cleanly.
Applying patch app/test/test_event_crypto_adapter.c with 6 rejects...
Rejected hunk #1.
Rejected hunk #2.
Rejected hunk #3.
Rejected hunk #4.
Rejected hunk #5.
Rejected hunk #6.
Applied patch drivers/crypto/openssl/rte_openssl_pmd_ops.c cleanly.
Applied patch drivers/crypto/qat/dev/qat_asym_pmd_gen1.c cleanly.
Applied patch lib/cryptodev/rte_crypto_asym.h cleanly.
Applied patch lib/cryptodev/rte_cryptodev.c cleanly.
Applied patch lib/cryptodev/rte_cryptodev.h cleanly.
Applying patch lib/cryptodev/version.map with 1 reject...
Rejected hunk #1.
diff a/app/test-eventdev/test_perf_common.c b/app/test-eventdev/test_perf_common.c	(rejected hunks)
@@ -846,7 +846,7 @@ cryptodev_sym_sess_create(struct prod_data *p, struct test_perf *t)
 static void *
 cryptodev_asym_sess_create(struct prod_data *p, struct test_perf *t)
 {
-	const struct rte_cryptodev_asymmetric_xform_capability *capability;
+	const struct rte_cryptodev_asymmetric_capability *capability;
 	struct rte_cryptodev_asym_capability_idx cap_idx;
 	struct rte_crypto_asym_xform xform;
 	void *sess;
diff a/app/test/test_event_crypto_adapter.c b/app/test/test_event_crypto_adapter.c	(rejected hunks)
@@ -450,7 +450,7 @@ test_session_with_op_forward_mode(void)
 static int
 test_asym_op_forward_mode(uint8_t session_less)
 {
-	const struct rte_cryptodev_asymmetric_xform_capability *capability;
+	const struct rte_cryptodev_asymmetric_capability *capability;
 	struct rte_cryptodev_asym_capability_idx cap_idx;
 	struct rte_crypto_asym_xform xform_tc;
 	union rte_event_crypto_metadata m_data;
@@ -458,6 +458,7 @@ test_asym_op_forward_mode(uint8_t session_less)
 	struct rte_crypto_asym_op *asym_op;
 	struct rte_crypto_op *op;
 	uint8_t input[4096] = {0};
+	struct rte_crypto_mod_capability mod_capa = {0};
 	uint8_t *result = NULL;
 	struct rte_event ev;
 	void *sess = NULL;
@@ -503,8 +504,9 @@ test_asym_op_forward_mode(uint8_t session_less)
 	asym_op->modex.base.length = modex_test_case.base.len;
 	asym_op->modex.result.data = result;
 	asym_op->modex.result.length = modex_test_case.result_len;
-	if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
-			xform_tc.modex.modulus.length)) {
+
+	mod_capa.max_mod_size = xform_tc.modex.modulus.length;
+	if  (!rte_cryptodev_capa_check_mod(capability, mod_capa)) {
 		RTE_LOG(INFO, USER1,
 			"line %u FAILED: %s", __LINE__,
 			"Invalid MODULUS length specified");
@@ -784,7 +786,7 @@ test_session_with_op_new_mode(void)
 static int
 test_asym_op_new_mode(uint8_t session_less)
 {
-	const struct rte_cryptodev_asymmetric_xform_capability *capability;
+	const struct rte_cryptodev_asymmetric_capability *capability;
 	struct rte_cryptodev_asym_capability_idx cap_idx;
 	struct rte_crypto_asym_xform xform_tc;
 	union rte_event_crypto_metadata m_data;
@@ -792,6 +794,7 @@ test_asym_op_new_mode(uint8_t session_less)
 	struct rte_crypto_asym_op *asym_op;
 	struct rte_crypto_op *op;
 	uint8_t input[4096] = {0};
+	struct rte_crypto_mod_capability mod_capa = {0};
 	uint8_t *result = NULL;
 	void *sess = NULL;
 	uint32_t cap;
@@ -835,8 +838,9 @@ test_asym_op_new_mode(uint8_t session_less)
 	asym_op->modex.base.length = modex_test_case.base.len;
 	asym_op->modex.result.data = result;
 	asym_op->modex.result.length = modex_test_case.result_len;
-	if (rte_cryptodev_asym_xform_capability_check_modlen(capability,
-			xform_tc.modex.modulus.length)) {
+
+	mod_capa.max_mod_size = xform_tc.modex.modulus.length;
+	if  (!rte_cryptodev_capa_check_mod(capability, mod_capa)) {
 		RTE_LOG(INFO, USER1,
 			"line %u FAILED: %s", __LINE__,
 			"Invalid MODULUS length specified");
diff a/lib/cryptodev/version.map b/lib/cryptodev/version.map	(rejected hunks)
@@ -108,6 +108,10 @@ EXPERIMENTAL {
 
 	#added in 22.07
 	rte_cryptodev_session_event_mdata_set;
+	rte_cryptodev_capa_check_mod;
+	rte_cryptodev_capa_check_rsa;
+	rte_cryptodev_capa_check_ecdsa;
+	rte_cryptodev_capa_check_ecpm;
 };
 
 INTERNAL {

https://lab.dpdk.org/results/dashboard/patchsets/22298/

UNH-IOL DPDK Community Lab


More information about the test-report mailing list