App was generating a random IV/AAD of only 4 bytes,
instead of the actual length, since it was using sizeof(length).

Fixes: 27cf2d1b18e1 ("examples/l2fwd-crypto: discover capabilities")

Signed-off-by: Pablo de Lara <pablo.de.lara.guarch at intel.com>
---
 examples/l2fwd-crypto/main.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c
index 1b0c229..c323b55 100644
--- a/examples/l2fwd-crypto/main.c
+++ b/examples/l2fwd-crypto/main.c
@@ -643,7 +643,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                                port_cparams[i].aad.phys_addr = 
options->aad.phys_addr;
                                if (!options->aad_param)
                                        
generate_random_key(port_cparams[i].aad.data,
-                                               
sizeof(port_cparams[i].aad.length));
+                                               port_cparams[i].aad.length);

                        }

@@ -661,7 +661,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                        port_cparams[i].iv.phys_addr = options->iv.phys_addr;
                        if (!options->iv_param)
                                generate_random_key(port_cparams[i].iv.data,
-                                               
sizeof(port_cparams[i].iv.length));
+                                               port_cparams[i].iv.length);

                        port_cparams[i].cipher_algo = 
options->cipher_xform.cipher.algo;
                }
-- 
2.5.5

Reply via email to