From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8FCD4A0C43; Wed, 20 Oct 2021 16:36:36 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 61E854118F; Wed, 20 Oct 2021 16:36:36 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20077.outbound.protection.outlook.com [40.107.2.77]) by mails.dpdk.org (Postfix) with ESMTP id 3D57C40142 for ; Wed, 20 Oct 2021 16:36:35 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mMlc7xnnijUJWPq4zmnkXIG1yTYEmvM3IEFIKzgZh8yPZFkY1Rdp2nNf0UubiLdWJmByEN/wh/5fwmDoT6Hufj/X6aG8lkdPrOji6bqaHIUC64crlKb9yNdn49Jr91kvBwf+NXGqMkyjqArT9lVpQEbOfWwTCvAL0AD1VaeZMk9EwxInZcG0svY+f2ofam4/FPEaoeJFGWLXVOD7lKE2jgAexyMmN+NzJYDrJrAccq6384siWRm1od3WF/QSWr8F6HV2SgJyp44DLTOT5zsbrmb6H2LF2nagNUtPTY0vOIjB+qFuZWcEv1M6/UdlOyaBEDZSUEUMboqDXElFVUYNSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Irqi0rAGLDnOCHna54exhri4BC4srLMUpbNhE2ZKC58=; b=YTr+42kbHNxtY2L3ujR0g5J/7/gHsEIV7+AacVqBTuBrTK1AZ5kJbPbqo8hri01PTb1JbXtw6m2JbqOvAo2ExeaU6B/tuvx3cGs1s5UndETja5WpPh2n2UfopHS6a2/MKDFs88sZID0i6jI0Hz6DIORXukw4vp1zgS5m9x1LkqtC06jFTo1o55XXjGIzvoU4LMHXab0fLHdwo1w4YARDuxAcjD9rzpxPAWdEZK7B6Mpd2+7xTA15cqVGXV6I5SrdZtyU7IqLOLx4DZNsJjU6mzMz3fydBMUjiRkmV6cLS46kqXKh+agXjkQl8ATTZWhY+0xFZwlp3TiDAs/TyHrG0w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Irqi0rAGLDnOCHna54exhri4BC4srLMUpbNhE2ZKC58=; b=i1LyVvrBj/FWNeWZ8iQjJKTlLQ6NLXokOqMySedL1T4P6wjVaKvAuakRfNA6U4mizyOYIOpmNLQYHUq6M+QJFX8kacybJEO6APQpyhkGDKbn9CC59BKDpMY3DSBuDW5xlX5cgUzK+iCda6jDZUiYAhAN3s9JuYnKbKpHBOq9dpU= Received: from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) by DU2PR04MB9052.eurprd04.prod.outlook.com (2603:10a6:10:2e7::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.16; Wed, 20 Oct 2021 14:36:34 +0000 Received: from DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::945d:e362:712d:1b80%3]) with mapi id 15.20.4608.018; Wed, 20 Oct 2021 14:36:33 +0000 From: Hemant Agrawal To: Akhil Goyal , "dev@dpdk.org" CC: "thomas@monjalon.net" , "david.marchand@redhat.com" , "anoobj@marvell.com" , "pablo.de.lara.guarch@intel.com" , "fiona.trahe@intel.com" , "declan.doherty@intel.com" , "matan@nvidia.com" , Gagandeep Singh , "roy.fan.zhang@intel.com" , "jianjay.zhou@huawei.com" , "asomalap@amd.com" , "ruifeng.wang@arm.com" , "konstantin.ananyev@intel.com" , "radu.nicolau@intel.com" , "ajit.khaparde@broadcom.com" , "rnagadheeraj@marvell.com" , "adwivedi@marvell.com" , "ciara.power@intel.com" , "haiyue.wang@intel.com" , "jiawenwu@trustnetic.com" , "jianwang@trustnetic.com" Thread-Topic: [dpdk-dev] [PATCH v3 0/8] crypto/security session framework rework Thread-Index: AQHXxGgK8Ih/Ci8DQUyMov6QpEPkJ6vb9tpQ Date: Wed, 20 Oct 2021 14:36:33 +0000 Message-ID: References: <20211013192222.1582631-2-gakhil@marvell.com> <20211018213452.2734720-1-gakhil@marvell.com> In-Reply-To: <20211018213452.2734720-1-gakhil@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 193feed6-6bd5-491a-e5bd-08d993d703c2 x-ms-traffictypediagnostic: DU2PR04MB9052: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:6790; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(7416002)(5660300002)(15650500001)(86362001)(83380400001)(508600001)(4326008)(66476007)(55016002)(52536014)(2906002)(26005)(38070700005)(66446008)(66556008)(64756008)(71200400001)(66946007)(44832011)(45080400002)(7696005)(54906003)(966005)(55236004)(8936002)(53546011)(33656002)(6506007)(316002)(76116006)(186003)(122000001)(110136005)(8676002)(9686003)(38100700002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?RxXker79jU3h5TALXEjbXqKj/Q3PjTxhM3HhXaO6HPwI7slDKEzrDovM89Wr?= =?us-ascii?Q?i4sorT9KmCYXkb/nGd5gSiKMWY19ck430YXxXGAym+PCuZ5NQUy2Z9Meb9m8?= =?us-ascii?Q?0ccn0DauuBkd10DeZQrHRzKCt+VaFz40sRwZ82guI4NYaPCYsv+gwYyp5WdW?= =?us-ascii?Q?V2zcO9et1du82k0S28Po2jM6AEZO4UroeJ0+JFigCcKB6qPHiTlwuclqXWQs?= =?us-ascii?Q?p7hFD0qx1MEgJ1yhdSYSKEK3po0VfZBAEWyKw7FjSvBmAwsUOCGl5DPR3e46?= =?us-ascii?Q?rH2vpO4dbfn8/yqemUPAHv+eW4Hdi6aajJJ1iupyBU0TxwWtzycR4Q6BlEbd?= =?us-ascii?Q?w4e+w6Z0D2nsf3lO4M3w3Yl906F6JFE3DpHF7O6gRF5vcjrRTIW4oGoH4tOl?= =?us-ascii?Q?jVsne5J/pUBQJpCS/hYYrfHkDYY2Q/5xGaEq1wYAKT1j52QmJUJBCH7wKTbG?= =?us-ascii?Q?BGjMouPU/S3nORLGFcPfl4tiE3KGIh8iu5e3PfKOffjAHUckCdSBG87LAFrN?= =?us-ascii?Q?3tXP3tjv9hB6S5XCO+Kw++3PFTCXpoBNjVAVSBomXLhMAIv0uGLrPSBMM6ue?= =?us-ascii?Q?MysOfkGd69yDDHimyIVB7Jt4pCjgvJscnh8lHoUyZOdSHtVyTfrEroxU2wFf?= =?us-ascii?Q?KQPC5M/nHboUZyIVkjghuvoUEh8P0plyvvZVvDnqGqpAB93LPZDUbhqVZzHU?= =?us-ascii?Q?BlKj8m3JYL/mF5PJNQVGmZFPAOYO/kqhOIZPw2upMC3ESHtbz8U4kcithK4K?= =?us-ascii?Q?cINtH44VoX72bDejC4M2/p5K5qhn/mWKf/GAXlgvrtIr5fbpwi5O01CPQClw?= =?us-ascii?Q?Z6HprC1h3HHh9thDxICc1gxIoN/bFRzlJhfBOYcHSmqOwQfDawKSyIGWhH9L?= =?us-ascii?Q?zjhvjWuD3UdzEblRLNu7UXChKla4bnJgbIXx96ISb4yjReGr3Qt36ZB3LSiE?= =?us-ascii?Q?e9fEl86fOp/cQiyKdY8G/pHDyqoG9tugx8rIY0T+RsmUYZX1AJHOwT6pqT3n?= =?us-ascii?Q?xu/o93x4Pe2SJ9icl+M06sY3X5RhHrnOAHDaVS3j0HyfTLnQQYvR8xDgvFU+?= =?us-ascii?Q?ppIbeZ08IcW21cqLJXEk4cVwQr5Gzw3CrFRoqyPHAVGR4ExL5wIBpuMsQXxM?= =?us-ascii?Q?Q3gx3TeUybnbkRxURClwhI2mA0S8nq5xM8NgPZxf1/zllgwhQLcyiIu2pGDw?= =?us-ascii?Q?wH1iJEZjsSAA1n2OpkPGyMWkIrDTspgIwBibppkGcD+xFd8icKQIA7pzNJg5?= =?us-ascii?Q?Wz6j9ny8vI0PLUZqaFIS9MjS9HZn6ju4cXD3edc2UmLho8QqufVbgp3TzO6G?= =?us-ascii?Q?ip6/zezFVAIipD+VhwPCRKVyPnNVt/S+rc1UIpxmr4yDTJ1O7nKkJjx2nHL2?= =?us-ascii?Q?qHbCQSW1dZ20PXEETkj1cCqsrueUmNDU4+nZNLD/Llxet8bglPTA7VxYGVRj?= =?us-ascii?Q?BRKIUmbFdevyjnwu39kcaK5amX/ns7yoe3vdp/q+M1RRn1nDtpIINBbb8Y0d?= =?us-ascii?Q?nj0m+OXuqahH+7KiJAwawi+0zB/Eq3Iz0FvFpMwMx5Ieslb02mBsYnPVaASO?= =?us-ascii?Q?eCfD4eQa1g/QbtbE3Y9am8/8+OEiZLxIsUycr5Kglb4hiHkYohen4WTzNqhI?= =?us-ascii?Q?WEcqZ4iJCE06fdIGaE/kqSI=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8630.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 193feed6-6bd5-491a-e5bd-08d993d703c2 X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Oct 2021 14:36:33.8637 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: TTfPkb4s/ztfj47WCoNT51TvkAYIKn+l+AjgEAGbSfMe45uyHA1PhU43AZnbFPGNKM6qvBwmeqeOcF5y6RZJIw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB9052 Subject: Re: [dpdk-dev] [PATCH v3 0/8] crypto/security session framework rework X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Series- Acked-by: Hemant Agrawal > -----Original Message----- > From: dev On Behalf Of Akhil Goyal > Sent: Tuesday, October 19, 2021 3:05 AM > To: dev@dpdk.org > Cc: thomas@monjalon.net; david.marchand@redhat.com; Hemant Agrawal > ; anoobj@marvell.com; > pablo.de.lara.guarch@intel.com; fiona.trahe@intel.com; > declan.doherty@intel.com; matan@nvidia.com; Gagandeep Singh > ; roy.fan.zhang@intel.com; jianjay.zhou@huawei.com; > asomalap@amd.com; ruifeng.wang@arm.com; > konstantin.ananyev@intel.com; radu.nicolau@intel.com; > ajit.khaparde@broadcom.com; rnagadheeraj@marvell.com; > adwivedi@marvell.com; ciara.power@intel.com; haiyue.wang@intel.com; > jiawenwu@trustnetic.com; jianwang@trustnetic.com; Akhil Goyal > > Subject: [dpdk-dev] [PATCH v3 0/8] crypto/security session framework > rework > Importance: High >=20 > As discussed in last release deprecation notice, crypto and security sess= ion > framework are reworked to reduce the need of two mempool objects and > remove the requirement to expose the rte_security_session and > rte_cryptodev_sym_session structures. > Design methodology is explained in the patch description. >=20 > Similar work will need to be done for asymmetric sessions as well. > Asymmetric session need another rework and is postponed to next release. > Since it is still in experimental stage, we can modify the APIs in next r= elease as > well. >=20 > The patches are compilable with all affected PMDs and tested with dpdk-te= st > and test-crypto-perf app on CN9k platform. >=20 > The series is rebased over "cryptodev: hide internal structures" > https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fpatch > work.dpdk.org%2Fproject%2Fdpdk%2Flist%2F%3Fseries%3D19749&dat > a=3D04%7C01%7Chemant.agrawal%40nxp.com%7C670e1914f95c49cbd24608d > 9927f2b28%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C6377018 > 97169217767%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ > QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=3DKPG > ZGoNXdfucnr3yA422eGc6EO%2BdXqCj3VSo7IlbX94%3D&reserved=3D0 >=20 > Changes in v3 > - rebased over next-crypto TOT > - Release notes updated and deprecation notice removed. > - Documentation updates. > - fix session less crypto > - fix asym crypto issue for qp setup > - add sess_iova param to PMD session configure APIs to pass physical addr= ess > of session pointer. > - rework cnxk net PMD based on the new session framework. > - added missing op to get size of security session private data >=20 > Changes in v2: > - Added new parameter iova in PMD session configure APIs for > session priv pointer to be used in QAT/CNXK/etc PMDs. > - Hide rte_cryptodev_sym_session and rte_security_session structs. > - Added compilation workaround for net PMDs(ixgbe/txgbe) > for inline ipsec. > Patches with actual fix is beynd the scope of this patchset. > - Added inline APIs to access the opaque data and fast metadata. > - Remove commented code. >=20 > TODO > - Asym APIs - postponed for next release. >=20 >=20 > Akhil Goyal (8): > security: rework session framework > security: hide security session struct > net/cnxk: rework security session framework > security: pass session iova in PMD sess create > drivers/crypto: support security session get size op > cryptodev: rework session framework > cryptodev: hide sym session structure > cryptodev: pass session iova in configure session >=20 > app/test-crypto-perf/cperf.h | 1 - > app/test-crypto-perf/cperf_ops.c | 46 ++-- > app/test-crypto-perf/cperf_ops.h | 6 +- > app/test-crypto-perf/cperf_test_latency.c | 5 +- > app/test-crypto-perf/cperf_test_latency.h | 1 - > .../cperf_test_pmd_cyclecount.c | 7 +- > .../cperf_test_pmd_cyclecount.h | 1 - > app/test-crypto-perf/cperf_test_throughput.c | 5 +- > app/test-crypto-perf/cperf_test_throughput.h | 1 - > app/test-crypto-perf/cperf_test_verify.c | 5 +- > app/test-crypto-perf/cperf_test_verify.h | 1 - > app/test-crypto-perf/main.c | 29 +-- > app/test/test_cryptodev.c | 147 ++++--------- > app/test/test_cryptodev.h | 1 - > app/test/test_cryptodev_asym.c | 3 +- > app/test/test_cryptodev_blockcipher.c | 6 +- > app/test/test_event_crypto_adapter.c | 28 +-- > app/test/test_ipsec.c | 34 +-- > app/test/test_ipsec_perf.c | 4 +- > app/test/test_security.c | 196 ++++-------------- > doc/guides/prog_guide/cryptodev_lib.rst | 10 +- > doc/guides/prog_guide/rte_security.rst | 11 +- > doc/guides/rel_notes/deprecation.rst | 9 - > doc/guides/rel_notes/release_21_11.rst | 14 ++ > drivers/crypto/armv8/armv8_pmd_private.h | 2 - > drivers/crypto/armv8/rte_armv8_pmd.c | 21 +- > drivers/crypto/armv8/rte_armv8_pmd_ops.c | 34 +-- > drivers/crypto/bcmfs/bcmfs_sym_session.c | 36 +--- > drivers/crypto/bcmfs/bcmfs_sym_session.h | 6 +- > drivers/crypto/caam_jr/caam_jr.c | 71 ++----- > drivers/crypto/ccp/ccp_pmd_ops.c | 32 +-- > drivers/crypto/ccp/ccp_pmd_private.h | 2 - > drivers/crypto/ccp/rte_ccp_pmd.c | 24 +-- > drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 24 +-- > drivers/crypto/cnxk/cn10k_ipsec.c | 53 +---- > drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 20 +- > drivers/crypto/cnxk/cn9k_ipsec.c | 75 +++---- > drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 61 ++---- > drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 16 +- > drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 76 ++----- > drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 3 +- > drivers/crypto/dpaa_sec/dpaa_sec.c | 75 ++----- > drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 3 +- > drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 32 +-- > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 29 +-- > drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 23 +- > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 40 ++-- > drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 1 - > drivers/crypto/ipsec_mb/pmd_kasumi.c | 1 - > drivers/crypto/ipsec_mb/pmd_snow3g.c | 1 - > drivers/crypto/ipsec_mb/pmd_zuc.c | 1 - > drivers/crypto/mlx5/mlx5_crypto.c | 25 +-- > drivers/crypto/mvsam/mrvl_pmd_private.h | 3 - > drivers/crypto/mvsam/rte_mrvl_pmd.c | 3 +- > drivers/crypto/mvsam/rte_mrvl_pmd_ops.c | 55 ++--- > drivers/crypto/nitrox/nitrox_sym.c | 33 +-- > drivers/crypto/null/null_crypto_pmd.c | 20 +- > drivers/crypto/null/null_crypto_pmd_ops.c | 34 +-- > drivers/crypto/null/null_crypto_pmd_private.h | 2 - > .../crypto/octeontx/otx_cryptodev_hw_access.h | 1 - > drivers/crypto/octeontx/otx_cryptodev_ops.c | 68 +++--- > drivers/crypto/octeontx2/otx2_cryptodev_ops.c | 63 +++--- > .../octeontx2/otx2_cryptodev_ops_helper.h | 16 +- > drivers/crypto/octeontx2/otx2_cryptodev_qp.h | 2 - > drivers/crypto/octeontx2/otx2_cryptodev_sec.c | 77 +++---- > drivers/crypto/openssl/openssl_pmd_private.h | 2 - > drivers/crypto/openssl/rte_openssl_pmd.c | 18 +- > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 35 +--- > drivers/crypto/qat/qat_sym.c | 3 +- > drivers/crypto/qat/qat_sym.h | 8 +- > drivers/crypto/qat/qat_sym_pmd.c | 1 + > drivers/crypto/qat/qat_sym_session.c | 72 ++----- > drivers/crypto/qat/qat_sym_session.h | 17 +- > drivers/crypto/scheduler/scheduler_pmd_ops.c | 10 +- > drivers/crypto/virtio/virtio_cryptodev.c | 32 +-- > .../octeontx2/otx2_evdev_crypto_adptr_rx.h | 3 +- > drivers/net/cnxk/cn10k_ethdev_sec.c | 64 +++--- > drivers/net/cnxk/cn9k_ethdev_sec.c | 59 ++---- > drivers/net/cnxk/cnxk_ethdev.c | 6 +- > drivers/net/cnxk/cnxk_ethdev.h | 6 - > drivers/net/cnxk/cnxk_ethdev_sec.c | 21 -- > drivers/net/ixgbe/ixgbe_ipsec.c | 38 +--- > drivers/net/octeontx2/otx2_ethdev_sec.c | 52 ++--- > drivers/net/octeontx2/otx2_ethdev_sec_tx.h | 2 +- > drivers/net/txgbe/txgbe_ipsec.c | 38 +--- > examples/fips_validation/fips_dev_self_test.c | 32 +-- > examples/fips_validation/main.c | 20 +- > examples/ipsec-secgw/ipsec-secgw.c | 40 ---- > examples/ipsec-secgw/ipsec.c | 12 +- > examples/ipsec-secgw/ipsec.h | 1 - > examples/ipsec-secgw/ipsec_worker.c | 4 - > examples/l2fwd-crypto/main.c | 41 +--- > examples/vhost_crypto/main.c | 16 +- > lib/cryptodev/cryptodev_pmd.h | 33 ++- > lib/cryptodev/rte_crypto.h | 2 +- > lib/cryptodev/rte_crypto_sym.h | 2 +- > lib/cryptodev/rte_cryptodev.c | 91 ++++---- > lib/cryptodev/rte_cryptodev.h | 70 +++---- > lib/cryptodev/rte_cryptodev_trace.h | 16 +- > lib/ipsec/rte_ipsec.h | 4 +- > lib/ipsec/rte_ipsec_group.h | 13 +- > lib/ipsec/ses.c | 6 +- > lib/pipeline/rte_table_action.c | 8 +- > lib/pipeline/rte_table_action.h | 2 +- > lib/security/rte_security.c | 32 +-- > lib/security/rte_security.h | 85 +++++--- > lib/security/rte_security_driver.h | 31 ++- > lib/vhost/rte_vhost_crypto.h | 3 - > lib/vhost/vhost_crypto.c | 7 +- > 109 files changed, 913 insertions(+), 1880 deletions(-) >=20 > -- > 2.25.1