Hi Akhil and Hemant,

This is a generic problem to raw_api applies either with dst_buf added or not.

The idea is for SGL test when Wireless algo digest encrypted case is tested and
RTE_MAX(cipher_off + cipher len, auth_off + auth_len) is smaller than 
RTE_MAX(cipher_off + cipher len, auth_off + auth_len + digest_len), the original
code will not add digest data SGL info into rte_crypto_sgl, leave alone the 
4-byte
digest is split into 2 2-byte segments.

This patch only try to address the problem and as far as I can see from the 
patch
https://patchwork.dpdk.org/project/dpdk/patch/20210907075957.28848-15-hemant.agra...@nxp.com/
the problem is not touched.

Regards,
Fan


> -----Original Message-----
> From: Akhil Goyal <gak...@marvell.com>
> Sent: Thursday, October 7, 2021 1:47 PM
> To: Ji, Kai <kai...@intel.com>; dev@dpdk.org
> Cc: Zhang, Roy Fan <roy.fan.zh...@intel.com>; hemant.agra...@nxp.com;
> g.si...@nxp.com
> Subject: RE: [EXT] [dpdk-dev] [dpdk-dev v1] test/crypto: maxlen calculation
> update
> 
> > Update the calculation of the max length needed when converting mbuf to
> > data vec in partial digest test case. This update make sure the enough
> > vec buffers are allocated for the appended digest in sgl op for QAT raw
> > datapath api.
> >
> > Fixes: 4868f6591c6f ("test/crypto: add cases for raw datapath API")
> > Cc: roy.fan.zh...@intel.com
> >
> > Signed-off-by: Kai Ji <kai...@intel.com>
> > ---
> >  app/test/test_cryptodev.c | 35 +++++++++++++++++++++++++++++++---
> -
> >  1 file changed, 31 insertions(+), 4 deletions(-)
> >
> > diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
> > index 16d770a17f..ea46911648 100644
> > --- a/app/test/test_cryptodev.c
> > +++ b/app/test/test_cryptodev.c
> > @@ -167,6 +167,10 @@ post_process_raw_dp_op(void *user_data,
> >     uint32_t index __rte_unused,
> >                     RTE_CRYPTO_OP_STATUS_ERROR;
> >  }
> >
> > +static struct crypto_testsuite_params testsuite_params = { NULL };
> > +struct crypto_testsuite_params *p_testsuite_params =
> &testsuite_params;
> > +static struct crypto_unittest_params unittest_params;
> > +
> >  void
> >  process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,
> >             struct rte_crypto_op *op, uint8_t is_cipher, uint8_t is_auth,
> > @@ -181,6 +185,7 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t
> > qp_id,
> >     struct rte_crypto_sgl sgl;
> >     uint32_t max_len;
> >     union rte_cryptodev_session_ctx sess;
> > +   uint64_t auth_end_iova;
> >     uint32_t count = 0;
> >     struct rte_crypto_raw_dp_ctx *ctx;
> >     uint32_t cipher_offset = 0, cipher_len = 0, auth_offset = 0,
> > @@ -190,6 +195,9 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t
> > qp_id,
> >     int ctx_service_size;
> >     int32_t status = 0;
> >     int enqueue_status, dequeue_status;
> > +   struct crypto_unittest_params *ut_params = &unittest_params;
> > +   /* oop is not supported in raw hw dp api*/
> > +   int is_sgl = sop->m_src->nb_segs > 1;
> 
> There is a patch series pending to be merged which support oop in raw dp api.
> Can we sync this patch based on that?
> https://patchwork.dpdk.org/project/dpdk/patch/20210907075957.28848-4-
> hemant.agra...@nxp.com/
> 
> >
> >     ctx_service_size = rte_cryptodev_get_raw_dp_ctx_size(dev_id);
> >     if (ctx_service_size < 0) {
> > @@ -255,6 +263,29 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t
> > qp_id,
> >             digest.va = (void *)sop->auth.digest.data;
> >             digest.iova = sop->auth.digest.phys_addr;
> >
> > +           if (is_sgl) {
> > +                   uint32_t remaining_off = auth_offset + auth_len;
> > +                   struct rte_mbuf *sgl_buf = sop->m_src;
> > +
> > +                   while (remaining_off >=
> > rte_pktmbuf_data_len(sgl_buf)
> > +                                   && sgl_buf->next != NULL) {
> > +                           remaining_off -=
> > rte_pktmbuf_data_len(sgl_buf);
> > +                           sgl_buf = sgl_buf->next;
> > +                   }
> > +
> > +                   auth_end_iova =
> (uint64_t)rte_pktmbuf_iova_offset(
> > +                           sgl_buf, remaining_off);
> > +           } else {
> > +                   /* oop is not supported in raw hw dp api */
> > +                   auth_end_iova = rte_pktmbuf_iova(op->sym-
> >m_src)
> > +
> > +                                                    auth_offset +
> > auth_len;
> > +           }
> > +           /* Then check if digest-encrypted conditions are met */
> > +           if ((auth_offset + auth_len < cipher_offset + cipher_len) &&
> > +                           (digest.iova == auth_end_iova) && is_sgl)
> > +                   max_len = RTE_MAX(max_len, auth_offset +
> > auth_len +
> > +                           ut_params->auth_xform.auth.digest_length);
> > +
> >     } else if (is_cipher) {
> >             cipher_offset = sop->cipher.data.offset;
> >             cipher_len = sop->cipher.data.length;
> > @@ -477,10 +508,6 @@ process_crypto_request(uint8_t dev_id, struct
> > rte_crypto_op *op)
> >     return op;
> >  }
> >
> > -static struct crypto_testsuite_params testsuite_params = { NULL };
> > -struct crypto_testsuite_params *p_testsuite_params =
> &testsuite_params;
> > -static struct crypto_unittest_params unittest_params;
> > -
> >  static int
> >  testsuite_setup(void)
> >  {
> > --
> > 2.17.1

Reply via email to