When test vector plaintext exceeds buffer size, only the first
max_buffer_size bytes are processed, causing incorrect digest
verification (computed vs expected mismatch).

This patch fixes this issue by checking that the plaintext size is
larger than the buffer size and returns an error with a log.

Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application")
Cc: sta...@dpdk.org

Signed-off-by: Shani Peretz <shper...@nvidia.com>
---
 app/test-crypto-perf/cperf_test_vector_parsing.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/app/test-crypto-perf/cperf_test_vector_parsing.c 
b/app/test-crypto-perf/cperf_test_vector_parsing.c
index 737d61d4af..04ca9cf019 100644
--- a/app/test-crypto-perf/cperf_test_vector_parsing.c
+++ b/app/test-crypto-perf/cperf_test_vector_parsing.c
@@ -308,6 +308,12 @@ parse_entry(char *entry, struct cperf_test_vector *vector,
        if (strstr(key_token, "plaintext")) {
                rte_free(vector->plaintext.data);
                vector->plaintext.data = data;
+
+               if (opts->test == CPERF_TEST_TYPE_VERIFY && data_length > 
opts->max_buffer_size) {
+                       printf("Global plaintext larger than buffer_sz\n");
+                       return -1;
+               }
+
                if (tc_found)
                        vector->plaintext.length = data_length;
                else {
-- 
2.34.1

Reply via email to