From: Gagandeep Singh <g.si...@nxp.com>

The current crypto raw data vectors is extended to support
rte_security usecases, where we need total data length to know
how much additional memory space is available in buffer other
than data length so that driver/HW can write expanded size
data after encryption.

Signed-off-by: Gagandeep Singh <g.si...@nxp.com>
Acked-by: Akhil Goyal <gak...@marvell.com>
---
 doc/guides/rel_notes/deprecation.rst | 7 -------
 lib/cryptodev/rte_crypto_sym.h       | 6 ++++++
 2 files changed, 6 insertions(+), 7 deletions(-)

diff --git a/doc/guides/rel_notes/deprecation.rst 
b/doc/guides/rel_notes/deprecation.rst
index f3c998a655..4b26ef6747 100644
--- a/doc/guides/rel_notes/deprecation.rst
+++ b/doc/guides/rel_notes/deprecation.rst
@@ -211,13 +211,6 @@ Deprecation Notices
   This field will be null for inplace processing.
   This change is targeted for DPDK 21.11.
 
-* cryptodev: The structure ``rte_crypto_vec`` would be updated to add
-  ``tot_len`` to support total buffer length.
-  This is required for security cases like IPsec and PDCP encryption offload
-  to know how much additional memory space is available in buffer other than
-  data length so that driver/HW can write expanded size data after encryption.
-  This change is targeted for DPDK 21.11.
-
 * cryptodev: Hide structures ``rte_cryptodev_sym_session`` and
   ``rte_cryptodev_asym_session`` to remove unnecessary indirection between
   session and the private data of session. An opaque pointer can be exposed
diff --git a/lib/cryptodev/rte_crypto_sym.h b/lib/cryptodev/rte_crypto_sym.h
index dcc0bd5933..e5cef1fb72 100644
--- a/lib/cryptodev/rte_crypto_sym.h
+++ b/lib/cryptodev/rte_crypto_sym.h
@@ -37,6 +37,8 @@ struct rte_crypto_vec {
        rte_iova_t iova;
        /** length of the data buffer */
        uint32_t len;
+       /** total buffer length*/
+       uint32_t tot_len;
 };
 
 /**
@@ -980,12 +982,14 @@ rte_crypto_mbuf_to_vec(const struct rte_mbuf *mb, 
uint32_t ofs, uint32_t len,
        seglen = mb->data_len - ofs;
        if (len <= seglen) {
                vec[0].len = len;
+               vec[0].tot_len = mb->buf_len;
                return 1;
        }
 
        /* data spread across segments */
        vec[0].len = seglen;
        left = len - seglen;
+       vec[0].tot_len = mb->buf_len;
        for (i = 1, nseg = mb->next; nseg != NULL; nseg = nseg->next, i++) {
 
                vec[i].base = rte_pktmbuf_mtod(nseg, void *);
@@ -995,6 +999,7 @@ rte_crypto_mbuf_to_vec(const struct rte_mbuf *mb, uint32_t 
ofs, uint32_t len,
                if (left <= seglen) {
                        /* whole requested data is completed */
                        vec[i].len = left;
+                       vec[i].tot_len = mb->buf_len;
                        left = 0;
                        break;
                }
@@ -1002,6 +1007,7 @@ rte_crypto_mbuf_to_vec(const struct rte_mbuf *mb, 
uint32_t ofs, uint32_t len,
                /* use whole segment */
                vec[i].len = seglen;
                left -= seglen;
+               vec[i].tot_len = mb->buf_len;
        }
 
        RTE_ASSERT(left == 0);
-- 
2.17.1

Reply via email to