From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 268CDA0544; Fri, 23 Sep 2022 15:01:26 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id CE4FD4003F; Fri, 23 Sep 2022 15:01:25 +0200 (CEST) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 846C44003C for ; Fri, 23 Sep 2022 15:01:23 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1663938083; x=1695474083; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=kYpPSzYZkWOahEcqBXFcwD33AAfublXl/G610Jnh8hg=; b=P82H3Dfa4lms/b0ERCs3QGPBnmIPNCSnbACfuiV/wD8P4HoVH1ZHoyWo 8FJUlY0iBamxtKjmL4kYLAH+n+emT6McjVD2olXc1fdJTimtraF4XccPz gV1w+VamAUjj/tEKeIF6oNpL18ahDsjJgmKNbgX2xCgd6RHuH1ep+CBh2 dYvkHXdDvUwwq5ifNhVlGynwkIBis82+e8W9d4fj9MFjioTkKEECxrT03 ld29428Iw/1p+7oucUl53J8ZHdLUNtjiT1Wl7CXkgRtiFepdmGN0x0Up8 ue4pB8yBzZXYAMuw28pCitDl4XLB4Rv8ThW5CToZ9RJUBugaV6eCatzWT Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10479"; a="283683226" X-IronPort-AV: E=Sophos;i="5.93,339,1654585200"; d="scan'208";a="283683226" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Sep 2022 06:00:57 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.93,339,1654585200"; d="scan'208";a="745787993" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orsmga004.jf.intel.com with ESMTP; 23 Sep 2022 06:00:57 -0700 Received: from fmsmsx609.amr.corp.intel.com (10.18.126.89) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 23 Sep 2022 06:00:56 -0700 Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx609.amr.corp.intel.com (10.18.126.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31 via Frontend Transport; Fri, 23 Sep 2022 06:00:56 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.168) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.31; Fri, 23 Sep 2022 06:00:56 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gKt8E/ppSRAd3HqNTich5isWridiNLahR+EETvkKvOgR4e2+w7DXPI+pZqQDRNKRiW3BrcG9pX1XlQ2oag+/QIlP3MQqInGrXLSaCmE0bd681QFUeb3/OuU8CxIe9ADrxupszsoPSwO6guw3fGbu0pqJH/VZy0EHqJ1qpNm3hdtIGw3StDZpFKvFSTBaPyRmpFtv5yVo4iYNiuaYF6P57TTR/3WZsPYdKzMSbrR8zuDcD3bsZ6QvSPNJqsiXXntDB+Nprx+oyWZsAIeLE0W/ed15q26Y2MaCpGqazP+qvYk90e8VR99jn/nznqYlKV8gSGCQThXxxdM6bd9Z4dn2vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oy2Qtjq4vbXMC+1kccDubaZO/zMAWLIXGt5ppae3Ck8=; b=bSVA8JkrJIwAFdSfMcvL0C4uco26jAqcwubY8rwAFLnBczH16Z+FZ5ujviUGIifNDCE6dCM0S5R2tx+ix+v9ZLLleBCP6geCH/n+MgPTcUKWYACRQWGLn2VeXU6JM4Ai3AiF/8kz+dDQ++LMGZbFyNmh9jHRaPX84R+rhOmQ3XvCc0pUKQwiSi2jQi11poOWf4JX6WTSxjx2THiiQOqvhwUY7mLJAroVWtkF5FG4gdB0bIA42cBGxWJN1On/TBIIvfuMnJJQQR9io3o5Ui5QmF5WtD0UJr5bBGLQ5c3wkaHB1cI7rchY6DZLO3uUFHRosLxRFlBSTOuG5gihHxp00Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from CO6PR11MB5604.namprd11.prod.outlook.com (2603:10b6:303:138::10) by CO1PR11MB5044.namprd11.prod.outlook.com (2603:10b6:303:92::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.20; Fri, 23 Sep 2022 13:00:53 +0000 Received: from CO6PR11MB5604.namprd11.prod.outlook.com ([fe80::7448:315a:6da6:628c]) by CO6PR11MB5604.namprd11.prod.outlook.com ([fe80::7448:315a:6da6:628c%6]) with mapi id 15.20.5654.020; Fri, 23 Sep 2022 13:00:53 +0000 From: "Coyle, David" To: Akhil Goyal , "dev@dpdk.org" , "Zhang, Roy Fan" CC: "thomas@monjalon.net" , "david.marchand@redhat.com" , "hemant.agrawal@nxp.com" , Vamsi Krishna Attunuru , "ferruh.yigit@xilinx.com" , "andrew.rybchenko@oktetlabs.ru" , "konstantin.v.ananyev@yandex.ru" , "jiawenwu@trustnetic.com" , "yisen.zhuang@huawei.com" , Igor Russkikh , Jerin Jacob Kollanukkaran , Ankur Dwivedi , "maxime.coquelin@redhat.com" , "chandu@amd.com" , "ruifeng.wang@arm.com" , "ajit.khaparde@broadcom.com" , Anoob Joseph , "De Lara Guarch, Pablo" , "matan@nvidia.com" , "g.singh@nxp.com" , "Yang, Qiming" , "Wu, Wenjun1" , "jianwang@trustnetic.com" , "Wu, Jingjing" , "Xing, Beilei" , "Nithin Kumar Dabilpuram" Subject: RE: [PATCH v2 0/6] crypto/security session framework rework Thread-Topic: [PATCH v2 0/6] crypto/security session framework rework Thread-Index: AQHYzcugQ0nT6Ikk/ESSeBnkHHJhaq3p/TGAgAL+kJA= Date: Fri, 23 Sep 2022 13:00:52 +0000 Message-ID: References: <20220829160645.378406-1-roy.fan.zhang@intel.com> <20220921150258.2061702-1-gakhil@marvell.com> In-Reply-To: Accept-Language: en-IE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-reaction: no-action dlp-version: 11.6.500.17 dlp-product: dlpe-windows authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR11MB5604:EE_|CO1PR11MB5044:EE_ x-ms-office365-filtering-correlation-id: 5000a239-00d8-4cf3-61b7-08da9d63a57b x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 5Eto3ET1ZLQNihyNvHU5geHMO7zK5X8Gpoi1TqoRBeVg6GSzNlHjwDH8KKEnOK6ExA0hp7sZONPl6332VpoO29JnCUME2vlXgorOk1xZVAynAXotrVcJYGtBp4QsiBxLkcZNGwqvsFRqDZL7FJX/p2O9ObGKiw+sso9DgJ3lVnnGXEk1BzS0Nm/0soEasvsv2Rr1t4pbzP2O/jOJ9TYJRSTN9KFmm+V9GknpkDGikI3DciZj3O6QSGpf1uBP0ynwmF9TnkKXfT/9Mow1FRr1+2o6VFDhtCEgzu61sDJrS7EH5zD2AfaUBrASlvVg032pRvxNTFsAmlRkWCbYfqfHf1nDXP+4gzHJwkhKwKDh32AucfXMabqbfZN6D9hvTkvCkxgVq0kleuq5hX7UW7HE1AvzorvTbUjqcfw13dAJC9NapVQU+A7lS2Vlq6b5xSnzDCpoCI41C2zTwF19Hc0MMqy/iLdzQgTVKA6okXiPJB66gesJ0SOjcmDweaJlfZonLlu2GmdMVRv0JUe44xVZUF+3EL1qLTF1R9aIoY1qNfQIh2bEuRQKtwkniHch7g5YsCeJK7tUruLVtF0TnRf4tple3yk8bOPm0KHnJoKCMOjClH3VV8Kdt/ig1MXEZnMlP9x8VxHtALbPaW52L+eG9EfnECkbqZ2VmWkOL2ACnEyMXxA6zvbEmprkRaqA7Kg8SGGamyQxDYMMjOmuT/l7/2haABsmVT5KTebak9/zwYc0Kp/mrRPbJxFI9EzfaMKegmZJYIHbpq2WmHWqJsuAGCh//gpqOcbW3GmuePPr+tkSy73sTxuZ1ejYoY7TZ1Ztyw0juOBGZokZpd7O0DdoWnvtHjuDDt1SmB/XxhDrAFJAJGVB2VH8HlrtLgf+mx5i x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR11MB5604.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(346002)(136003)(366004)(376002)(396003)(39860400002)(451199015)(38100700002)(7416002)(71200400001)(5660300002)(82960400001)(478600001)(38070700005)(186003)(110136005)(66446008)(4326008)(8936002)(66556008)(66476007)(64756008)(2906002)(52536014)(6506007)(7696005)(966005)(33656002)(83380400001)(66946007)(53546011)(86362001)(122000001)(15650500001)(6636002)(41300700001)(8676002)(55016003)(26005)(9686003)(76116006)(316002)(54906003)(23180200003); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?BVe55Z6m9L8V2LJX+yDEj+hOnBbdtMqWSIiK9IQ2MR3dKkWxYsJ7KBzDcC7L?= =?us-ascii?Q?7dIBzGA59Js/4MElWJeQk2mlm6UVmR7Fb7r4ksOFXsBziAjgheGaEybJFt/4?= =?us-ascii?Q?kGzfS/bMmdKGf42/D9M297er1Olz37gG2WZBqScMTgjZtIZgtaBO9Xaw1whP?= =?us-ascii?Q?5Hfmi5jzaihGjevhpkHm2QzDhK387A8p0S2esG2X/SD+EdR1bR6SdJtZ/BAU?= =?us-ascii?Q?Knum94b9B5UjohrN7y7pXejgbtlQN9PaCSccbQehCFzxlU64T5cWSZB/JEDp?= =?us-ascii?Q?JsiPjRx1qGggJa1S1meGtb+VkwXPobgfOqUqrLesNVpGpjkad4ELlsYEAREc?= =?us-ascii?Q?pUIamNYbYWw2q7YnYjnWiXKxNbioWk9GH6ws22YhZyaI5SbYlu4KZPSfuvQX?= =?us-ascii?Q?oPM6XOtJbYh2TVyXhre0Kcrk7s5luFsxr1TjnGiWgUmnHJAEukulgp+4Ff8i?= =?us-ascii?Q?SeoYxnKiucoM8TW2mCMYSzBQvlLA/EYHXmVvnrCaofS2lzqjWVfAJbBdxFYr?= =?us-ascii?Q?7uM/ovQaBjkKpRktcw/VTdjfBfMjkNdDnxnE5lof4jFzMVizMsLJEZ6p/cUz?= =?us-ascii?Q?bZ5m26eol4xBIAGyHdjuihyiM8QBv+8TcxHTQGe8eWl9FZMtCM71q02e84Nq?= =?us-ascii?Q?cxTsQ2A5pz/LyVsrJoMIQJKan3mNED2AU5vSKxfW05bMZK/xa+/LkK9LQbaT?= =?us-ascii?Q?8ScJ2L4Oty8lQemV3BqxgtDK+mCC+335wRIxCp4PqgaRpzgkcEQgRfYeuO5L?= =?us-ascii?Q?CYF+WomSds3PEYIILU6vdwsmcX24Qz8e6paWKa+BYzVciCOkFnURQsSpOQwI?= =?us-ascii?Q?dlRcmFsSukIXJXsvj9fM28GvxiMZTPmnlDRdZZjni9+rGLT4ge3pGZQqLukT?= =?us-ascii?Q?DZh4GSDE0ZLsD18ErgdFuB9ATzcab5Ps3zMHJRHF2Q1tJ5cV3JGeSqaY7IIl?= =?us-ascii?Q?u+JQlKgeHdVwaNLovdlpdElva7rbmozIG90gHSPPeeZGFa9FConYDkZ/xv7H?= =?us-ascii?Q?cXqMWVdj/SEAmXiMTZKzs3T8hu6MnzPHvr8Q0QIp/ksaZqIT8VPbEx+DYfFN?= =?us-ascii?Q?tHNxlGAXUWWk02roS6PIFY09NVjPD0Q2mMQI1/ssnGtVmWh4YqrIr9nCjmO1?= =?us-ascii?Q?nZS+nUWdKWYJ9tpk9IzyVigNaqgnYaV9Yo+zqHmK9dXpEFR4i/vM9ZWHsTvH?= =?us-ascii?Q?h0yEb6+M4HXBxzaxhrYizTpY8JsZVG5xkR1A5zaSFXzMWnYqflVfzY9od0UJ?= =?us-ascii?Q?pt3rB/clo5rZPVzsqBHYJVcsTz2i3XqaEITbu4wVKWsItoS6MfRTsHdycFSB?= =?us-ascii?Q?nAWJ+9rhs7uBlyO2nT0kxFj7QIww1TqdgfjGZVyb50W6rt67h3zjwqOg5FVE?= =?us-ascii?Q?0vLfNwOcQxOkrH76OKDeV33h97y1jwRwFjrf+HMdmEHOWRMuKdcCWIc5pQ8g?= =?us-ascii?Q?36wDa7yy+XaU98AL4+5pjUtgxs3r2tE/4ClMD8/fdZTKtyskIOEXarOBs6pt?= =?us-ascii?Q?qdxdVvr+jMMwRQgFA31sr7fQM4hn56qhRzRitbAzD6a3+o+Yi2ozhfOWuAsf?= =?us-ascii?Q?C43czUF8XWzTSPU0j07icRLFdIv9qM+WdrL63iGf?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR11MB5604.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5000a239-00d8-4cf3-61b7-08da9d63a57b X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Sep 2022 13:00:52.9683 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: MkIyqbXRiI6lCAX+uqYjDbTjXpNmqjqS7UFP5CQ4FnFu0Nofzm/X5dwxnJel2dfpLIxo3CKtSMaZQhlZc3wazQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB5044 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Akhil/Fan Patchset verified for QAT and AESNI_MB sessions, with particular focus on S= ecurity Cipher-CRC For the series, Tested-by: David Coyle Tested-by: Kevin O'Sullivan Regards, David > -----Original Message----- > From: Akhil Goyal > Sent: Wednesday, September 21, 2022 4:11 PM > To: Akhil Goyal ; dev@dpdk.org; Zhang, Roy Fan > > Cc: thomas@monjalon.net; david.marchand@redhat.com; > hemant.agrawal@nxp.com; Vamsi Krishna Attunuru > ; ferruh.yigit@xilinx.com; > andrew.rybchenko@oktetlabs.ru; konstantin.v.ananyev@yandex.ru; > jiawenwu@trustnetic.com; yisen.zhuang@huawei.com; Igor Russkikh > ; Jerin Jacob Kollanukkaran ; > Ankur Dwivedi ; maxime.coquelin@redhat.com; > chandu@amd.com; ruifeng.wang@arm.com; ajit.khaparde@broadcom.com; > Anoob Joseph ; De Lara Guarch, Pablo > ; matan@nvidia.com; g.singh@nxp.com; > Yang, Qiming ; Wu, Wenjun1 > ; jianwang@trustnetic.com; Wu, Jingjing > ; Xing, Beilei ; Nithin Kum= ar > Dabilpuram > Subject: RE: [PATCH v2 0/6] crypto/security session framework rework >=20 > ++ Fan Zhang > I think I missed adding one of the major contributor for this cleanup. >=20 > > -----Original Message----- > > From: Akhil Goyal > > Sent: Wednesday, September 21, 2022 8:33 PM > > To: dev@dpdk.org > > Cc: thomas@monjalon.net; david.marchand@redhat.com; > > hemant.agrawal@nxp.com; Vamsi Krishna Attunuru > > ; ferruh.yigit@xilinx.com; > > andrew.rybchenko@oktetlabs.ru; konstantin.v.ananyev@yandex.ru; > > jiawenwu@trustnetic.com; yisen.zhuang@huawei.com; Igor Russkikh > > ; Jerin Jacob Kollanukkaran > > ; Ankur Dwivedi ; > > maxime.coquelin@redhat.com; chandu@amd.com; > ruifeng.wang@arm.com; > > ajit.khaparde@broadcom.com; Anoob Joseph ; > > pablo.de.lara.guarch@intel.com; matan@nvidia.com; g.singh@nxp.com; > > qiming.yang@intel.com; wenjun1.wu@intel.com; > jianwang@trustnetic.com; > > jingjing.wu@intel.com; beilei.xing@intel.com; Nithin Kumar Dabilpuram > > ; Akhil Goyal > > Subject: [PATCH v2 0/6] crypto/security session framework rework > > > > This patchset reworks the symmetric crypto and security session data > > structure to use a single virtual/physical contiguous buffer for > > symmetric crypto/security session and driver private data. > > In addition the session data structure is now private. > > The session is represented as an opaque pointer in the application. > > > > With the change the session is no longer supported to be accessed by > > multiple device drivers. For the same reason > > rte_cryptodev_sym_session_init/clear APIs are deprecated as > > rte_cryptodev_sym_session_create/free will initialize and clear the > > driver specific data field. > > > > The change was also submitted last year during DPDK 21.11 timeframe > > also[1], but was not applied due to lack of feedback from community. > > Please help in getting this cleanup merged in this cycle. > > > > Now the similar work was already done for asymmetric crypto. > > This patchset is rebased over current tree and fixes all the issues > > reported so far. > > This patchset is a v2 for the patch that was sent by Fan Zhang(Intel) > > with a few changes > > - Added security session rework also. > > - fixed issues in [2] reported on mailing list. > > - few other fixes. > > > > Please review and provide feedback as soon as possible as this is > > intended to be merged in DPDK 22.11 RC1. > > > > Currently the cnxk platform is tested with this change. > > Request everyone to review and test on their platform. > > > > Special note to ixgbe and txgbe maintainers. > > There is a wrong implementation for flow creation. Please check. > > A hack is added to bypass it. Please fix it separately. > > > > [1] > > https://patches.dpdk.org/project/dpdk/cover/20211018213452.2734720-1- > > gakhil@marvell.com/ > > [2] > > https://patches.dpdk.org/project/dpdk/cover/20220829160645.378406-1- > > roy.fan.zhang@intel.com/ > > > > Akhil Goyal (5): > > cryptodev: rework session framework > > cryptodev: hide sym session structure > > security: remove priv mempool usage > > drivers/crypto: support security session get size op > > security: hide session structure > > > > Fan Zhang (1): > > crypto/scheduler: use unified session > > > > app/test-crypto-perf/cperf.h | 1 - > > app/test-crypto-perf/cperf_ops.c | 40 +-- > > app/test-crypto-perf/cperf_ops.h | 2 +- > > app/test-crypto-perf/cperf_test_latency.c | 9 +- > > app/test-crypto-perf/cperf_test_latency.h | 1 - > > .../cperf_test_pmd_cyclecount.c | 10 +- > > .../cperf_test_pmd_cyclecount.h | 1 - > > app/test-crypto-perf/cperf_test_throughput.c | 11 +- > > app/test-crypto-perf/cperf_test_throughput.h | 1 - > > app/test-crypto-perf/cperf_test_verify.c | 9 +- > > app/test-crypto-perf/cperf_test_verify.h | 1 - > > app/test-crypto-perf/main.c | 30 +- > > app/test-eventdev/test_perf_common.c | 35 +- > > app/test-eventdev/test_perf_common.h | 1 - > > app/test/test_cryptodev.c | 336 +++++------------- > > app/test/test_cryptodev_blockcipher.c | 16 +- > > app/test/test_cryptodev_security_ipsec.c | 2 +- > > app/test/test_cryptodev_security_ipsec.h | 2 +- > > app/test/test_event_crypto_adapter.c | 35 +- > > app/test/test_ipsec.c | 47 +-- > > app/test/test_ipsec_perf.c | 4 +- > > app/test/test_security.c | 178 ++-------- > > app/test/test_security_inline_proto.c | 26 +- > > doc/guides/prog_guide/cryptodev_lib.rst | 16 +- > > doc/guides/rel_notes/deprecation.rst | 9 + > > doc/guides/rel_notes/release_22_11.rst | 7 + > > drivers/common/cnxk/roc_cpt.c | 4 +- > > drivers/crypto/armv8/rte_armv8_pmd.c | 21 +- > > drivers/crypto/armv8/rte_armv8_pmd_ops.c | 32 +- > > drivers/crypto/bcmfs/bcmfs_sym_session.c | 39 +- > > drivers/crypto/bcmfs/bcmfs_sym_session.h | 3 +- > > drivers/crypto/caam_jr/caam_jr.c | 69 +--- > > drivers/crypto/ccp/ccp_crypto.c | 56 +-- > > drivers/crypto/ccp/ccp_pmd_ops.c | 32 +- > > drivers/crypto/ccp/ccp_pmd_private.h | 2 - > > drivers/crypto/ccp/rte_ccp_pmd.c | 29 +- > > drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 41 +-- > > drivers/crypto/cnxk/cn10k_ipsec.c | 45 +-- > > drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 38 +- > > drivers/crypto/cnxk/cn9k_ipsec.c | 54 +-- > > drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 55 +-- > > drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 16 +- > > drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 70 ++-- > > drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 6 +- > > drivers/crypto/dpaa_sec/dpaa_sec.c | 69 +--- > > drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 7 +- > > drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 34 +- > > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 41 +-- > > drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 48 +-- > > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 62 +--- > > drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 4 - > > drivers/crypto/ipsec_mb/pmd_kasumi.c | 10 +- > > drivers/crypto/ipsec_mb/pmd_snow3g.c | 9 +- > > drivers/crypto/ipsec_mb/pmd_zuc.c | 4 - > > drivers/crypto/mlx5/mlx5_crypto.c | 25 +- > > drivers/crypto/mvsam/rte_mrvl_pmd.c | 11 +- > > drivers/crypto/mvsam/rte_mrvl_pmd_ops.c | 49 +-- > > drivers/crypto/nitrox/nitrox_sym.c | 39 +- > > drivers/crypto/null/null_crypto_pmd.c | 20 +- > > drivers/crypto/null/null_crypto_pmd_ops.c | 33 +- > > drivers/crypto/null/null_crypto_pmd_private.h | 2 - > > .../crypto/octeontx/otx_cryptodev_hw_access.h | 1 - > > drivers/crypto/octeontx/otx_cryptodev_ops.c | 67 +--- > > drivers/crypto/openssl/openssl_pmd_private.h | 2 - > > drivers/crypto/openssl/rte_openssl_pmd.c | 24 +- > > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 29 +- > > drivers/crypto/qat/dev/qat_sym_pmd_gen1.c | 1 + > > drivers/crypto/qat/qat_sym.c | 15 +- > > drivers/crypto/qat/qat_sym.h | 16 +- > > drivers/crypto/qat/qat_sym_session.c | 73 ++-- > > drivers/crypto/qat/qat_sym_session.h | 10 +- > > drivers/crypto/scheduler/scheduler_failover.c | 19 +- > > .../crypto/scheduler/scheduler_multicore.c | 17 + > > .../scheduler/scheduler_pkt_size_distr.c | 81 +++-- > > drivers/crypto/scheduler/scheduler_pmd_ops.c | 93 ++++- > > .../crypto/scheduler/scheduler_pmd_private.h | 120 ++++++- > > .../crypto/scheduler/scheduler_roundrobin.c | 11 +- > > drivers/crypto/virtio/virtio_cryptodev.c | 40 +-- > > drivers/crypto/virtio/virtio_rxtx.c | 3 +- > > drivers/net/cnxk/cn10k_ethdev_sec.c | 38 +- > > drivers/net/cnxk/cn9k_ethdev_sec.c | 32 +- > > drivers/net/iavf/iavf_ipsec_crypto.c | 23 +- > > drivers/net/iavf/iavf_ipsec_crypto.h | 2 +- > > drivers/net/ixgbe/ixgbe_ipsec.c | 31 +- > > drivers/net/txgbe/txgbe_ipsec.c | 32 +- > > examples/fips_validation/fips_dev_self_test.c | 40 +-- > > examples/fips_validation/main.c | 35 +- > > examples/ipsec-secgw/ipsec-secgw.c | 44 +-- > > examples/ipsec-secgw/ipsec.c | 16 +- > > examples/ipsec-secgw/ipsec.h | 1 - > > examples/ipsec-secgw/ipsec_worker.c | 2 +- > > examples/l2fwd-crypto/main.c | 54 +-- > > examples/vhost_crypto/main.c | 16 +- > > lib/cryptodev/cryptodev_pmd.h | 60 ++-- > > lib/cryptodev/cryptodev_trace_points.c | 6 - > > lib/cryptodev/rte_crypto.h | 3 +- > > lib/cryptodev/rte_crypto_sym.h | 11 +- > > lib/cryptodev/rte_cryptodev.c | 284 ++++++--------- > > lib/cryptodev/rte_cryptodev.h | 153 +++----- > > lib/cryptodev/rte_cryptodev_trace.h | 35 +- > > lib/cryptodev/version.map | 6 - > > lib/ipsec/rte_ipsec_group.h | 13 +- > > lib/ipsec/ses.c | 5 +- > > lib/pipeline/rte_table_action.c | 10 +- > > lib/security/rte_security.c | 33 +- > > lib/security/rte_security.h | 90 +++-- > > lib/security/rte_security_driver.h | 31 +- > > lib/vhost/rte_vhost_crypto.h | 3 - > > lib/vhost/vhost_crypto.c | 28 +- > > 109 files changed, 1255 insertions(+), 2413 deletions(-) > > > > -- > > 2.25.1