@@ -148,8 +148,8 @@ initialize_ipv6_header(struct rte_ipv6_hdr *ip_hdr, uint8_t *src_addr,
ip_hdr->proto = IPPROTO_UDP;
ip_hdr->hop_limits = IP_DEFTTL;
- rte_memcpy(ip_hdr->src_addr, src_addr, sizeof(ip_hdr->src_addr));
- rte_memcpy(ip_hdr->dst_addr, dst_addr, sizeof(ip_hdr->dst_addr));
+ memcpy(ip_hdr->src_addr, src_addr, sizeof(ip_hdr->src_addr));
+ memcpy(ip_hdr->dst_addr, dst_addr, sizeof(ip_hdr->dst_addr));
return (uint16_t) (pkt_data_len + sizeof(struct rte_ipv6_hdr));
}
@@ -83,7 +83,7 @@ test_crc_calc(void)
return -7;
for (i = 0; i < CRC32_VEC_LEN1; i += 12)
- rte_memcpy(&test_data[i], crc32_vec1, 12);
+ memcpy(&test_data[i], crc32_vec1, 12);
result = crc_calc(test_data, CRC32_VEC_LEN1, type);
if (result != crc32_vec1_res) {
@@ -93,7 +93,7 @@ test_crc_calc(void)
/* 32-bit ethernet CRC: Test 3 */
for (i = 0; i < CRC32_VEC_LEN2; i += 12)
- rte_memcpy(&test_data[i], crc32_vec1, 12);
+ memcpy(&test_data[i], crc32_vec1, 12);
result = crc_calc(test_data, CRC32_VEC_LEN2, type);
if (result != crc32_vec2_res) {
@@ -2345,8 +2345,8 @@ test_AES_CBC_HMAC_SHA1_encrypt_digest(void)
sym_op->auth.data.length = QUOTE_512_BYTES;
/* Copy IV at the end of the crypto operation */
- rte_memcpy(rte_crypto_op_ctod_offset(ut_params->op, uint8_t *, IV_OFFSET),
- aes_cbc_iv, CIPHER_IV_LENGTH_AES_CBC);
+ memcpy(rte_crypto_op_ctod_offset(ut_params->op, uint8_t *, IV_OFFSET),
+ aes_cbc_iv, CIPHER_IV_LENGTH_AES_CBC);
/* Set crypto operation cipher parameters */
sym_op->cipher.data.offset = 0;
@@ -2480,9 +2480,7 @@ test_AES_CBC_HMAC_SHA512_decrypt_perform(void *sess,
DIGEST_BYTE_LENGTH_SHA512);
TEST_ASSERT_NOT_NULL(ut_params->digest, "no room to append digest");
- rte_memcpy(ut_params->digest,
- digest,
- DIGEST_BYTE_LENGTH_SHA512);
+ memcpy(ut_params->digest, digest, DIGEST_BYTE_LENGTH_SHA512);
/* Generate Crypto op data structure */
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
@@ -2505,8 +2503,8 @@ test_AES_CBC_HMAC_SHA512_decrypt_perform(void *sess,
sym_op->auth.data.length = QUOTE_512_BYTES;
/* Copy IV at the end of the crypto operation */
- rte_memcpy(rte_crypto_op_ctod_offset(ut_params->op, uint8_t *, IV_OFFSET),
- iv, CIPHER_IV_LENGTH_AES_CBC);
+ memcpy(rte_crypto_op_ctod_offset(ut_params->op, uint8_t *, IV_OFFSET),
+ iv, CIPHER_IV_LENGTH_AES_CBC);
sym_op->cipher.data.offset = 0;
sym_op->cipher.data.length = QUOTE_512_BYTES;
@@ -8863,7 +8861,7 @@ create_aead_operation(enum rte_crypto_aead_operation op,
uint8_t *, IV_OFFSET);
if (tdata->iv.len == 0) {
- rte_memcpy(iv_ptr, tdata->iv.data, AES_GCM_J0_LENGTH);
+ memcpy(iv_ptr, tdata->iv.data, AES_GCM_J0_LENGTH);
debug_hexdump(stdout, "iv:", iv_ptr,
AES_GCM_J0_LENGTH);
} else {
@@ -13659,8 +13657,8 @@ test_multi_session_random_usage(void)
for (i = 0; i < MB_SESSION_NUMBER; i++) {
- rte_memcpy(&ut_paramz[i].ut_params, &unittest_params,
- sizeof(struct crypto_unittest_params));
+ memcpy(&ut_paramz[i].ut_params, &unittest_params,
+ sizeof(struct crypto_unittest_params));
test_AES_CBC_HMAC_SHA512_decrypt_create_session_params(
&ut_paramz[i].ut_params,
@@ -454,7 +454,7 @@ test_op_forward_mode(uint8_t session_less)
m_data.request_info.cdev_id = request_info.cdev_id;
m_data.request_info.queue_pair_id = request_info.queue_pair_id;
m_data.response_info.event = response_info.event;
- rte_memcpy((uint8_t *)op + len, &m_data, sizeof(m_data));
+ memcpy((uint8_t *)op + len, &m_data, sizeof(m_data));
}
sym_op->m_src = m;
@@ -653,8 +653,8 @@ test_asym_op_forward_mode(uint8_t session_less)
m_data.request_info.cdev_id = request_info.cdev_id;
m_data.request_info.queue_pair_id = request_info.queue_pair_id;
m_data.response_info.event = response_info.event;
- rte_memcpy((uint8_t *)op + op->private_data_offset,
- &m_data, sizeof(m_data));
+ memcpy((uint8_t *)op + op->private_data_offset, &m_data,
+ sizeof(m_data));
}
/* Fill in event info and update event_ptr with rte_crypto_op */
memset(&ev, 0, sizeof(ev));
@@ -820,7 +820,7 @@ test_op_new_mode(uint8_t session_less)
op->private_data_offset = len;
/* Fill in private data information */
m_data.response_info.event = response_info.event;
- rte_memcpy((uint8_t *)op + len, &m_data, sizeof(m_data));
+ memcpy((uint8_t *)op + len, &m_data, sizeof(m_data));
}
sym_op->m_src = m;
@@ -977,8 +977,8 @@ test_asym_op_new_mode(uint8_t session_less)
sizeof(struct rte_crypto_asym_xform));
/* Fill in private data information */
m_data.response_info.event = response_info.event;
- rte_memcpy((uint8_t *)op + op->private_data_offset,
- &m_data, sizeof(m_data));
+ memcpy((uint8_t *)op + op->private_data_offset, &m_data,
+ sizeof(m_data));
}
ret = send_op_recv_ev(op);
@@ -269,8 +269,8 @@ test_op_forward_mode(void)
op->vchan = TEST_DMA_VCHAN_ID;
response_info.event = dma_response_info.event;
- rte_memcpy((uint8_t *)op + sizeof(struct rte_event_dma_adapter_op), &response_info,
- sizeof(struct rte_event));
+ memcpy((uint8_t *)op + sizeof(struct rte_event_dma_adapter_op),
+ &response_info, sizeof(struct rte_event));
/* Fill in event info and update event_ptr with rte_event_dma_adapter_op */
memset(&ev[i], 0, sizeof(struct rte_event));
@@ -601,10 +601,10 @@ setup_test_string_tunneled(struct rte_mempool *mpool, const char *string,
/* copy outer IP and ESP header */
ipv4_outer.total_length = rte_cpu_to_be_16(t_len);
ipv4_outer.packet_id = rte_cpu_to_be_16(seq);
- rte_memcpy(dst, &ipv4_outer, sizeof(ipv4_outer));
+ memcpy(dst, &ipv4_outer, sizeof(ipv4_outer));
dst += sizeof(ipv4_outer);
m->l3_len = sizeof(ipv4_outer);
- rte_memcpy(dst, &esph, sizeof(esph));
+ memcpy(dst, &esph, sizeof(esph));
dst += sizeof(esph);
if (string != NULL) {
@@ -616,7 +616,7 @@ setup_test_string_tunneled(struct rte_mempool *mpool, const char *string,
sizeof(esp_pad_bytes)));
dst += padlen;
/* copy ESP tail header */
- rte_memcpy(dst, &espt, sizeof(espt));
+ memcpy(dst, &espt, sizeof(espt));
} else
memset(dst, 0, t_len);
@@ -1399,8 +1399,8 @@ test_mode4_ext_ctrl(void)
for (i = 0; i < MEMBER_COUNT; i++) {
lacp_tx_buf[i] = rte_pktmbuf_alloc(test_params.mbuf_pool);
- rte_memcpy(rte_pktmbuf_mtod(lacp_tx_buf[i], char *),
- &lacpdu, sizeof(lacpdu));
+ memcpy(rte_pktmbuf_mtod(lacp_tx_buf[i], char *), &lacpdu,
+ sizeof(lacpdu));
rte_pktmbuf_pkt_len(lacp_tx_buf[i]) = sizeof(lacpdu);
}
@@ -1453,8 +1453,8 @@ test_mode4_ext_lacp(void)
for (i = 0; i < MEMBER_COUNT; i++) {
lacp_tx_buf[i] = rte_pktmbuf_alloc(test_params.mbuf_pool);
- rte_memcpy(rte_pktmbuf_mtod(lacp_tx_buf[i], char *),
- &lacpdu, sizeof(lacpdu));
+ memcpy(rte_pktmbuf_mtod(lacp_tx_buf[i], char *), &lacpdu,
+ sizeof(lacpdu));
rte_pktmbuf_pkt_len(lacp_tx_buf[i]) = sizeof(lacpdu);
}
@@ -245,8 +245,8 @@ create_inline_ipsec_session(struct ipsec_test_data *sa, uint16_t portid,
/* Copy cipher session parameters */
if (sa->aead) {
- rte_memcpy(sess_conf->crypto_xform, &sa->xform.aead,
- sizeof(struct rte_crypto_sym_xform));
+ memcpy(sess_conf->crypto_xform, &sa->xform.aead,
+ sizeof(struct rte_crypto_sym_xform));
sess_conf->crypto_xform->aead.key.data = sa->key.data;
/* Verify crypto capabilities */
if (test_sec_crypto_caps_aead_verify(sec_cap, sess_conf->crypto_xform) != 0) {
@@ -256,13 +256,13 @@ create_inline_ipsec_session(struct ipsec_test_data *sa, uint16_t portid,
}
} else {
if (dir == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) {
- rte_memcpy(&sess_conf->crypto_xform->cipher,
- &sa->xform.chain.cipher.cipher,
- sizeof(struct rte_crypto_cipher_xform));
+ memcpy(&sess_conf->crypto_xform->cipher,
+ &sa->xform.chain.cipher.cipher,
+ sizeof(struct rte_crypto_cipher_xform));
- rte_memcpy(&sess_conf->crypto_xform->next->auth,
- &sa->xform.chain.auth.auth,
- sizeof(struct rte_crypto_auth_xform));
+ memcpy(&sess_conf->crypto_xform->next->auth,
+ &sa->xform.chain.auth.auth,
+ sizeof(struct rte_crypto_auth_xform));
sess_conf->crypto_xform->cipher.key.data =
sa->key.data;
sess_conf->crypto_xform->next->auth.key.data =
@@ -282,12 +282,12 @@ create_inline_ipsec_session(struct ipsec_test_data *sa, uint16_t portid,
return TEST_SKIPPED;
}
} else {
- rte_memcpy(&sess_conf->crypto_xform->next->cipher,
- &sa->xform.chain.cipher.cipher,
- sizeof(struct rte_crypto_cipher_xform));
- rte_memcpy(&sess_conf->crypto_xform->auth,
- &sa->xform.chain.auth.auth,
- sizeof(struct rte_crypto_auth_xform));
+ memcpy(&sess_conf->crypto_xform->next->cipher,
+ &sa->xform.chain.cipher.cipher,
+ sizeof(struct rte_crypto_cipher_xform));
+ memcpy(&sess_conf->crypto_xform->auth,
+ &sa->xform.chain.auth.auth,
+ sizeof(struct rte_crypto_auth_xform));
sess_conf->crypto_xform->auth.key.data =
sa->auth_key.data;
sess_conf->crypto_xform->next->cipher.key.data =
@@ -463,12 +463,12 @@ init_packet(struct rte_mempool *mp, const uint8_t *data, unsigned int len, bool
return NULL;
if (outer_ipv4) {
- rte_memcpy(rte_pktmbuf_append(pkt, RTE_ETHER_HDR_LEN),
- &dummy_ipv4_eth_hdr, RTE_ETHER_HDR_LEN);
+ memcpy(rte_pktmbuf_append(pkt, RTE_ETHER_HDR_LEN),
+ &dummy_ipv4_eth_hdr, RTE_ETHER_HDR_LEN);
pkt->l3_len = sizeof(struct rte_ipv4_hdr);
} else {
- rte_memcpy(rte_pktmbuf_append(pkt, RTE_ETHER_HDR_LEN),
- &dummy_ipv6_eth_hdr, RTE_ETHER_HDR_LEN);
+ memcpy(rte_pktmbuf_append(pkt, RTE_ETHER_HDR_LEN),
+ &dummy_ipv6_eth_hdr, RTE_ETHER_HDR_LEN);
pkt->l3_len = sizeof(struct rte_ipv6_hdr);
}
pkt->l2_len = RTE_ETHER_HDR_LEN;
@@ -186,7 +186,7 @@ virtual_ethdev_stats_get(struct rte_eth_dev *dev, struct rte_eth_stats *stats)
struct virtual_ethdev_private *dev_private = dev->data->dev_private;
if (stats)
- rte_memcpy(stats, &dev_private->eth_stats, sizeof(*stats));
+ memcpy(stats, &dev_private->eth_stats, sizeof(*stats));
return 0;
}