From patchwork Fri May 20 05:54:19 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arkadiusz Kusztal X-Patchwork-Id: 111498 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 126A8A0503; Fri, 20 May 2022 09:04:02 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 0095F42BBB; Fri, 20 May 2022 09:03:10 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id CA9054280B for ; Fri, 20 May 2022 09:03:07 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030188; x=1684566188; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=J9IHyYA7odwCq8ogcYUhvHSOGevTQiSW4/d0lFveH1A=; b=YXH3mw6UNfbK0JSWtwH4o01sXtzJUoyFQhw6VVbbLF9TUXTOO08clCk3 /066PZ38u7yCaXv81GiG91mVcnFuToMbmxic6KQcYxgrI1L83cgVOv4cD DTCsp51s3WhRMlYjcpyAXUtK6bnVRcNaImNJQpLg8srdwbZ9BD8hH13gk T4mrEcd3EAm7xV/sLMJtRLcNBvqc+3mpqVvT7hvtRVTmpIKkqINejicoW pd0MNx6Ur/71mX7MXuq70GcJC5ICwvmKYzBO66iGnhF4NCwMMRC6mRa8X thzPQrm/xtA7IBG5+022mBxJoMchG5c3A9zx7v8eCB2WZjZiQpV4Mf3UA Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140323" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140323" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:03:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058260" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:03:05 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 14/40] app/test-crypto-perf: remove asym crypto next xform Date: Fri, 20 May 2022 06:54:19 +0100 Message-Id: <20220520055445.40063-15-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - removed asymnetric crypto xform next field. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- app/test-crypto-perf/cperf_ops.c | 1 - 1 file changed, 1 deletion(-) diff --git a/app/test-crypto-perf/cperf_ops.c b/app/test-crypto-perf/cperf_ops.c index cbefce8d6c..8371af301a 100644 --- a/app/test-crypto-perf/cperf_ops.c +++ b/app/test-crypto-perf/cperf_ops.c @@ -786,7 +786,6 @@ cperf_create_session(struct rte_mempool *sess_mp, int ret; if (options->op_type == CPERF_ASYM_MODEX) { - xform.next = NULL; xform.xform_type = RTE_CRYPTO_ASYM_XFORM_MODEX; xform.modex.modulus.data = options->modex_data->modulus.data; xform.modex.modulus.length = options->modex_data->modulus.len;