This patch updates the xform with right configuration.
For session based ops, sym session pool is created with
valid userdata size.

Signed-off-by: Abhinandan Gujjar <abhinandan.guj...@intel.com>
---
 app/test/test_event_crypto_adapter.c | 24 +++++-------------------
 1 file changed, 5 insertions(+), 19 deletions(-)

diff --git a/app/test/test_event_crypto_adapter.c 
b/app/test/test_event_crypto_adapter.c
index 8d42462..530ce96 100644
--- a/app/test/test_event_crypto_adapter.c
+++ b/app/test/test_event_crypto_adapter.c
@@ -171,7 +171,6 @@ struct rte_event_crypto_request request_info = {
        struct rte_event ev;
        uint32_t cap;
        int ret;
-       uint8_t cipher_key[17];
 
        memset(&m_data, 0, sizeof(m_data));
 
@@ -183,14 +182,7 @@ struct rte_event_crypto_request request_info = {
        /* Setup Cipher Parameters */
        cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
        cipher_xform.next = NULL;
-
-       cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
-       cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
-
-       cipher_xform.cipher.key.data = cipher_key;
-       cipher_xform.cipher.key.length = 16;
-       cipher_xform.cipher.iv.offset = IV_OFFSET;
-       cipher_xform.cipher.iv.length = 16;
+       cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
 
        op = rte_crypto_op_alloc(params.op_mpool,
                        RTE_CRYPTO_OP_TYPE_SYMMETRIC);
@@ -378,7 +370,6 @@ struct rte_event_crypto_request request_info = {
        struct rte_mbuf *m;
        uint32_t cap;
        int ret;
-       uint8_t cipher_key[17];
 
        memset(&m_data, 0, sizeof(m_data));
 
@@ -390,14 +381,7 @@ struct rte_event_crypto_request request_info = {
        /* Setup Cipher Parameters */
        cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
        cipher_xform.next = NULL;
-
-       cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
-       cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
-
-       cipher_xform.cipher.key.data = cipher_key;
-       cipher_xform.cipher.key.length = 16;
-       cipher_xform.cipher.iv.offset = IV_OFFSET;
-       cipher_xform.cipher.iv.length = 16;
+       cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
 
        op = rte_crypto_op_alloc(params.op_mpool,
                        RTE_CRYPTO_OP_TYPE_SYMMETRIC);
@@ -564,7 +548,9 @@ struct rte_event_crypto_request request_info = {
 
        params.session_mpool = rte_cryptodev_sym_session_pool_create(
                        "CRYPTO_ADAPTER_SESSION_MP",
-                       MAX_NB_SESSIONS, 0, 0, 0, SOCKET_ID_ANY);
+                       MAX_NB_SESSIONS, 0, 0,
+                       sizeof(union rte_event_crypto_metadata),
+                       SOCKET_ID_ANY);
        TEST_ASSERT_NOT_NULL(params.session_mpool,
                        "session mempool allocation failed\n");
 
-- 
1.9.1

Reply via email to