From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D2446A0544; Fri, 23 Sep 2022 11:29:24 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 71B02400D7; Fri, 23 Sep 2022 11:29:24 +0200 (CEST) Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2040.outbound.protection.outlook.com [40.107.22.40]) by mails.dpdk.org (Postfix) with ESMTP id 8D3EE4003C for ; Fri, 23 Sep 2022 11:29:22 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Pjghj+ZoaghKBxZLJgYgfK28wis8H1qpTD3/4CTJqxx00Fw+Xzv4T1QrtWQsjFN2km8nJ9vs0XX7DIXZgStzfUPNtYrc7x16Xt8F10Hx38Oe9LLuzaKEFcT+G5zHnWd9CLPvYz1S/N3ty4NxxPTRtXV9qCL9tpzzB+EdiVMZaxPrv8aEoP6r/KNxCZWgkRTf5q0rd5KdJHJxpf/SDmRc/0pVnuXMi2yrpb1OfqXLljwhWcIV9D5aiK4hCeusMbXRQBNSn6YWuUQKSORlW5b2qQBEez3UQSfR58rVTUuBrrCqXXV5jRWI8k8q2WDc820QJPIxk+4UQvu2Nzuyjk4Vsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KoIiwCs/9o9FTNhsTHHmewv0FSxz2vIqlidM1RIoj28=; b=doATEcMt3sVw2gyeBNdvhrI9ygxOJwtq6g0NknGqqTwKx7tCcqHL/pCIU2T5iZe2//tQCuFNtfWnXVcyx8Sl+H/KCXw0siAGSlefZ+Ys09lmvsLg8VLUMeDKRnm+AUI5sGTyhsM8CbvgDZhpb9TvjkGnM/RhZa8IyRvRqru8YGo9FI46kYPirrg+zNM97vPuCGT3hD16WbNqPzQdvXUCkeACi1zTKU7NGPCJIwe0Jyh24OyoISaBvEewEnvTdhCllqloAG3JfeSKwJqthruFdKKdpoNLk3Oss6gJLyI0I3lXpcSiMPvNTU9WOQyiqA1i4EnCxotSwlM3CKiPk2lsrQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KoIiwCs/9o9FTNhsTHHmewv0FSxz2vIqlidM1RIoj28=; b=A8eyUMVI1+WFagqNr+uoxjro0MPMhvBmkoccwDn+e0NArgfgAmRX2pHZzksGLurx9iLNi398Veu30PyDY1lGg3TPtb2JYeSi+P3Pbp0c+FbMAyzKTMzb7yZPTcOQsUNGskUFFmyzQlGiaS/FIgC5xJ4faljBV5QlFQ+Du/gYFN4= Received: from AS8PR04MB8198.eurprd04.prod.outlook.com (2603:10a6:20b:3b0::14) by AS8PR04MB8152.eurprd04.prod.outlook.com (2603:10a6:20b:3fb::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.20; Fri, 23 Sep 2022 09:29:21 +0000 Received: from AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::7fa1:7edf:58d8:6c0a]) by AS8PR04MB8198.eurprd04.prod.outlook.com ([fe80::7fa1:7edf:58d8:6c0a%5]) with mapi id 15.20.5654.020; Fri, 23 Sep 2022 09:29:21 +0000 From: Gagandeep Singh To: Akhil Goyal , "dev@dpdk.org" CC: "thomas@monjalon.net" , "david.marchand@redhat.com" , Hemant Agrawal , "vattunuru@marvell.com" , "ferruh.yigit@xilinx.com" , "andrew.rybchenko@oktetlabs.ru" , "konstantin.v.ananyev@yandex.ru" , "jiawenwu@trustnetic.com" , "yisen.zhuang@huawei.com" , "irusskikh@marvell.com" , "jerinj@marvell.com" , "adwivedi@marvell.com" , "maxime.coquelin@redhat.com" , "chandu@amd.com" , "ruifeng.wang@arm.com" , "ajit.khaparde@broadcom.com" , "anoobj@marvell.com" , "pablo.de.lara.guarch@intel.com" , "matan@nvidia.com" , "qiming.yang@intel.com" , "wenjun1.wu@intel.com" , "jianwang@trustnetic.com" , "jingjing.wu@intel.com" , "beilei.xing@intel.com" , "ndabilpuram@marvell.com" Subject: RE: [PATCH v2 0/6] crypto/security session framework rework Thread-Topic: [PATCH v2 0/6] crypto/security session framework rework Thread-Index: AQHYzctZ42G+1Td+Nkitiqnpa1LdT63swECw Date: Fri, 23 Sep 2022 09:29:21 +0000 Message-ID: References: <20220829160645.378406-1-roy.fan.zhang@intel.com> <20220921150258.2061702-1-gakhil@marvell.com> In-Reply-To: <20220921150258.2061702-1-gakhil@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: AS8PR04MB8198:EE_|AS8PR04MB8152:EE_ x-ms-office365-filtering-correlation-id: 2b5ab35e-0b7d-4d97-9d24-08da9d461896 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR04MB8198.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(396003)(136003)(346002)(366004)(376002)(39860400002)(451199015)(2906002)(64756008)(66946007)(8936002)(8676002)(33656002)(4326008)(66446008)(66476007)(76116006)(316002)(54906003)(41300700001)(66556008)(110136005)(52536014)(71200400001)(86362001)(7416002)(966005)(15650500001)(478600001)(5660300002)(45080400002)(26005)(9686003)(55236004)(186003)(7696005)(6506007)(83380400001)(53546011)(122000001)(38070700005)(55016003)(38100700002)(23180200003); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?bgvSqaq7UwcLPEPYp08II3FmVmCIcbPGuFdOxbe9q+ybgwvMFum+a3wePT1h?= =?us-ascii?Q?TZKfqEA13k2y2nf4Pn18mRU7VlXg5XDTh4fS9C1Q6PDZuRhXgTXFRdTJtEDv?= =?us-ascii?Q?hkEDI3+N5xKOC+LisGsoJFE2Nalx1B12AqoUffFAoZ9/OJmKrhWlsFmgx1Dj?= =?us-ascii?Q?mmzCkMKO3/YxQEseE2sNsblM5CynMYGOEQMDvsX6i07H6+yWJc1dD1KhAr8U?= =?us-ascii?Q?u0DMNEGseA+fqnMm5PHfXWCpqNaHArsbMBGOKfYjWhdReHmyp149gonsBy+e?= =?us-ascii?Q?UzuU0zAGvpB5ZLTMAtpeCh9f4flIRADugFhy/THyXa+PanP2TU6yXPYMJWwM?= =?us-ascii?Q?qK/+OqB5v2LvmjtBrbov5Q3PA6jku9ituuy1TA7Q6na2lvHTIsM3KVWM6lRr?= =?us-ascii?Q?afF0FJyYpdLkJfBQEe6r265r0XrV+kTSqrmzpjdr5pQHkB5kZ5m6KzKadJyp?= =?us-ascii?Q?7lbKNF76t5BuXc7wXFowVpwg5ifcSEJF7OLbIrRjxQanoKYXtpp7YZQLoC2v?= =?us-ascii?Q?yE1P6u/B5Ex85+aAkB1G2XuPQdmV8Aj1ykz0LbzdYyUvYECuc8UPWP4IReue?= =?us-ascii?Q?U+TBfjbACslpk4MfgAc39HWVwSF3ujISxMnFvEyN6BisD4QjZjIWzVOp5p2H?= =?us-ascii?Q?4dsJdWrcpQA2TGeqXnvaGxFUcVC70IsTfBWrJDqo4qGqEM9lh7J+uD8NjZ1C?= =?us-ascii?Q?P4NO1fIis1HyconiKDRErktne8d6Rg72jmgCot187/QGNp0A/MSSR80LQzUB?= =?us-ascii?Q?QBrzoXj6srHaN27yJCCA8vvIz03QxgbrLb2LVDH9J2cLVJ6S4QVQqttzX+iF?= =?us-ascii?Q?dJLWy0OzYcApxaupMZ2zIZPVeNngEyv3HzRZR/4VGhycYH4qxRUhDjMqPvae?= =?us-ascii?Q?S+J8td2Opih0DMJJx2GINi6Wr8GqrU7Isf0HNwY8hXeiZwao08gxwc7MKcKN?= =?us-ascii?Q?IyiflwcKk/Oj8WSkqF34zKKMOHD3D6x3KqgGV4i4Ziz/okEwI11xC/VeIjO9?= =?us-ascii?Q?CDYd8XXhiy6tH5HKkUZNWrtzNXrn/J7cbraRBp+HxgG6WW8BHvpdewOsd5jM?= =?us-ascii?Q?LAVZvKLkmcMLgir6EJc8tFssXGwUuS7p6NlliBWhplm2jM/I7ndlF8xUaMEL?= =?us-ascii?Q?7Ohe7/B8gzeBngsWDfVF/L0Ga1tKACi4+BvoGmIIbv4/E74w/TeoqHHRMwnJ?= =?us-ascii?Q?NTM380DGzm2JQHaBTbqNAxK0wQKdkvkXMpTZUxR4u6jhKOsytLhqigk27rNL?= =?us-ascii?Q?2awr/Z/lysp94saSlB88vB4DT8nwnyCERMkDjVZfbwGmL5y5Z1kYJeJtQAxO?= =?us-ascii?Q?+oy2+FK2DLiicUcwYp8381Tc3pv3hi+ngbUiarPbNaAYNKtVNfAremp9G3Pp?= =?us-ascii?Q?wWr+DadcTosx+m3vr5hd6AxUd99dnYlXtUnvge0ZVxljR7MjGllgP3AtrwlX?= =?us-ascii?Q?JBGbP9OZKA6VFcA3zQTVT/VU063L5EPSnTBdx1+yyYED1MZdsj8LYdE9h15k?= =?us-ascii?Q?hXhL6LgIomnBF9ZWz4tYDaJC43HCdKQGRCGYWXlZabDzHyqMOW6HSJapRiB8?= =?us-ascii?Q?NJgN4+PH0E0wSPbWDQM=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8198.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2b5ab35e-0b7d-4d97-9d24-08da9d461896 X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Sep 2022 09:29:21.1673 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: LQ6DUWvfednR0Gf2df9vMIT7R2DKnxke9chg/F5xi9hp7Q7sK6Z9eQ/Akk0rtZIZ X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB8152 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Akhil, We have verified this patch series on DPAA1 and DPAA2 platforms using test = and ipsec-secgw applications. Series Tested-by: Gagandeep Singh Regards, Gagan > -----Original Message----- > From: Akhil Goyal > Sent: Wednesday, September 21, 2022 8:33 PM > To: dev@dpdk.org > Cc: thomas@monjalon.net; david.marchand@redhat.com; Hemant Agrawal > ; vattunuru@marvell.com; > ferruh.yigit@xilinx.com; andrew.rybchenko@oktetlabs.ru; > konstantin.v.ananyev@yandex.ru; jiawenwu@trustnetic.com; > yisen.zhuang@huawei.com; irusskikh@marvell.com; jerinj@marvell.com; > adwivedi@marvell.com; maxime.coquelin@redhat.com; chandu@amd.com; > ruifeng.wang@arm.com; ajit.khaparde@broadcom.com; > anoobj@marvell.com; pablo.de.lara.guarch@intel.com; matan@nvidia.com; > Gagandeep Singh ; qiming.yang@intel.com; > wenjun1.wu@intel.com; jianwang@trustnetic.com; jingjing.wu@intel.com; > beilei.xing@intel.com; ndabilpuram@marvell.com; Akhil Goyal > > Subject: [PATCH v2 0/6] crypto/security session framework rework >=20 > This patchset reworks the symmetric crypto and security session data > structure to use a single virtual/physical contiguous buffer for symmetri= c > crypto/security session and driver private data. > In addition the session data structure is now private. > The session is represented as an opaque pointer in the application. >=20 > With the change the session is no longer supported to be accessed by > multiple device drivers. For the same reason > rte_cryptodev_sym_session_init/clear APIs are deprecated as > rte_cryptodev_sym_session_create/free will initialize and clear the drive= r > specific data field. >=20 > The change was also submitted last year during DPDK 21.11 timeframe > also[1], but was not applied due to lack of feedback from community. Plea= se > help in getting this cleanup merged in this cycle. >=20 > Now the similar work was already done for asymmetric crypto. > This patchset is rebased over current tree and fixes all the issues repor= ted so > far. > This patchset is a v2 for the patch that was sent by Fan Zhang(Intel) wit= h a > few changes > - Added security session rework also. > - fixed issues in [2] reported on mailing list. > - few other fixes. >=20 > Please review and provide feedback as soon as possible as this is intende= d to > be merged in DPDK 22.11 RC1. >=20 > Currently the cnxk platform is tested with this change. > Request everyone to review and test on their platform. >=20 > Special note to ixgbe and txgbe maintainers. > There is a wrong implementation for flow creation. Please check. > A hack is added to bypass it. Please fix it separately. >=20 > [1] > https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fpatch > es.dpdk.org%2Fproject%2Fdpdk%2Fcover%2F20211018213452.2734720-1- > gakhil%40marvell.com%2F&data=3D05%7C01%7Cg.singh%40nxp.com%7 > C4654103c909a4dd3031208da9be279f0%7C686ea1d3bc2b4c6fa92cd99c5c3 > 01635%7C0%7C0%7C637993694272898803%7CUnknown%7CTWFpbGZsb3d > 8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0% > 3D%7C3000%7C%7C%7C&sdata=3DNkLq49IFdRzKdHwZ5mvLJhLKi5pxsV15 > t5ZsC8lK1Xc%3D&reserved=3D0 > [2] > https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fpatch > es.dpdk.org%2Fproject%2Fdpdk%2Fcover%2F20220829160645.378406-1- > roy.fan.zhang%40intel.com%2F&data=3D05%7C01%7Cg.singh%40nxp.co > m%7C4654103c909a4dd3031208da9be279f0%7C686ea1d3bc2b4c6fa92cd99 > c5c301635%7C0%7C0%7C637993694272898803%7CUnknown%7CTWFpbGZ > sb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6 > Mn0%3D%7C3000%7C%7C%7C&sdata=3DWLJbXuU%2FLDeV9QlEUhqfNF > 7XAG8itcI%2BMdHgecv%2BaN4%3D&reserved=3D0 >=20 > Akhil Goyal (5): > cryptodev: rework session framework > cryptodev: hide sym session structure > security: remove priv mempool usage > drivers/crypto: support security session get size op > security: hide session structure >=20 > Fan Zhang (1): > crypto/scheduler: use unified session >=20 > app/test-crypto-perf/cperf.h | 1 - > app/test-crypto-perf/cperf_ops.c | 40 +-- > app/test-crypto-perf/cperf_ops.h | 2 +- > app/test-crypto-perf/cperf_test_latency.c | 9 +- > app/test-crypto-perf/cperf_test_latency.h | 1 - > .../cperf_test_pmd_cyclecount.c | 10 +- > .../cperf_test_pmd_cyclecount.h | 1 - > app/test-crypto-perf/cperf_test_throughput.c | 11 +- > app/test-crypto-perf/cperf_test_throughput.h | 1 - > app/test-crypto-perf/cperf_test_verify.c | 9 +- > app/test-crypto-perf/cperf_test_verify.h | 1 - > app/test-crypto-perf/main.c | 30 +- > app/test-eventdev/test_perf_common.c | 35 +- > app/test-eventdev/test_perf_common.h | 1 - > app/test/test_cryptodev.c | 336 +++++------------- > app/test/test_cryptodev_blockcipher.c | 16 +- > app/test/test_cryptodev_security_ipsec.c | 2 +- > app/test/test_cryptodev_security_ipsec.h | 2 +- > app/test/test_event_crypto_adapter.c | 35 +- > app/test/test_ipsec.c | 47 +-- > app/test/test_ipsec_perf.c | 4 +- > app/test/test_security.c | 178 ++-------- > app/test/test_security_inline_proto.c | 26 +- > doc/guides/prog_guide/cryptodev_lib.rst | 16 +- > doc/guides/rel_notes/deprecation.rst | 9 + > doc/guides/rel_notes/release_22_11.rst | 7 + > drivers/common/cnxk/roc_cpt.c | 4 +- > drivers/crypto/armv8/rte_armv8_pmd.c | 21 +- > drivers/crypto/armv8/rte_armv8_pmd_ops.c | 32 +- > drivers/crypto/bcmfs/bcmfs_sym_session.c | 39 +- > drivers/crypto/bcmfs/bcmfs_sym_session.h | 3 +- > drivers/crypto/caam_jr/caam_jr.c | 69 +--- > drivers/crypto/ccp/ccp_crypto.c | 56 +-- > drivers/crypto/ccp/ccp_pmd_ops.c | 32 +- > drivers/crypto/ccp/ccp_pmd_private.h | 2 - > drivers/crypto/ccp/rte_ccp_pmd.c | 29 +- > drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 41 +-- > drivers/crypto/cnxk/cn10k_ipsec.c | 45 +-- > drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 38 +- > drivers/crypto/cnxk/cn9k_ipsec.c | 54 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 55 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 16 +- > drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 70 ++-- > drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 6 +- > drivers/crypto/dpaa_sec/dpaa_sec.c | 69 +--- > drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 7 +- > drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 34 +- > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 41 +-- > drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 48 +-- > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 62 +--- > drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 4 - > drivers/crypto/ipsec_mb/pmd_kasumi.c | 10 +- > drivers/crypto/ipsec_mb/pmd_snow3g.c | 9 +- > drivers/crypto/ipsec_mb/pmd_zuc.c | 4 - > drivers/crypto/mlx5/mlx5_crypto.c | 25 +- > drivers/crypto/mvsam/rte_mrvl_pmd.c | 11 +- > drivers/crypto/mvsam/rte_mrvl_pmd_ops.c | 49 +-- > drivers/crypto/nitrox/nitrox_sym.c | 39 +- > drivers/crypto/null/null_crypto_pmd.c | 20 +- > drivers/crypto/null/null_crypto_pmd_ops.c | 33 +- > drivers/crypto/null/null_crypto_pmd_private.h | 2 - > .../crypto/octeontx/otx_cryptodev_hw_access.h | 1 - > drivers/crypto/octeontx/otx_cryptodev_ops.c | 67 +--- > drivers/crypto/openssl/openssl_pmd_private.h | 2 - > drivers/crypto/openssl/rte_openssl_pmd.c | 24 +- > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 29 +- > drivers/crypto/qat/dev/qat_sym_pmd_gen1.c | 1 + > drivers/crypto/qat/qat_sym.c | 15 +- > drivers/crypto/qat/qat_sym.h | 16 +- > drivers/crypto/qat/qat_sym_session.c | 73 ++-- > drivers/crypto/qat/qat_sym_session.h | 10 +- > drivers/crypto/scheduler/scheduler_failover.c | 19 +- > .../crypto/scheduler/scheduler_multicore.c | 17 + > .../scheduler/scheduler_pkt_size_distr.c | 81 +++-- > drivers/crypto/scheduler/scheduler_pmd_ops.c | 93 ++++- > .../crypto/scheduler/scheduler_pmd_private.h | 120 ++++++- > .../crypto/scheduler/scheduler_roundrobin.c | 11 +- > drivers/crypto/virtio/virtio_cryptodev.c | 40 +-- > drivers/crypto/virtio/virtio_rxtx.c | 3 +- > drivers/net/cnxk/cn10k_ethdev_sec.c | 38 +- > drivers/net/cnxk/cn9k_ethdev_sec.c | 32 +- > drivers/net/iavf/iavf_ipsec_crypto.c | 23 +- > drivers/net/iavf/iavf_ipsec_crypto.h | 2 +- > drivers/net/ixgbe/ixgbe_ipsec.c | 31 +- > drivers/net/txgbe/txgbe_ipsec.c | 32 +- > examples/fips_validation/fips_dev_self_test.c | 40 +-- > examples/fips_validation/main.c | 35 +- > examples/ipsec-secgw/ipsec-secgw.c | 44 +-- > examples/ipsec-secgw/ipsec.c | 16 +- > examples/ipsec-secgw/ipsec.h | 1 - > examples/ipsec-secgw/ipsec_worker.c | 2 +- > examples/l2fwd-crypto/main.c | 54 +-- > examples/vhost_crypto/main.c | 16 +- > lib/cryptodev/cryptodev_pmd.h | 60 ++-- > lib/cryptodev/cryptodev_trace_points.c | 6 - > lib/cryptodev/rte_crypto.h | 3 +- > lib/cryptodev/rte_crypto_sym.h | 11 +- > lib/cryptodev/rte_cryptodev.c | 284 ++++++--------- > lib/cryptodev/rte_cryptodev.h | 153 +++----- > lib/cryptodev/rte_cryptodev_trace.h | 35 +- > lib/cryptodev/version.map | 6 - > lib/ipsec/rte_ipsec_group.h | 13 +- > lib/ipsec/ses.c | 5 +- > lib/pipeline/rte_table_action.c | 10 +- > lib/security/rte_security.c | 33 +- > lib/security/rte_security.h | 90 +++-- > lib/security/rte_security_driver.h | 31 +- > lib/vhost/rte_vhost_crypto.h | 3 - > lib/vhost/vhost_crypto.c | 28 +- > 109 files changed, 1255 insertions(+), 2413 deletions(-) >=20 > -- > 2.25.1