From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 06E8AA00C3; Wed, 21 Sep 2022 17:11:25 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D427B40691; Wed, 21 Sep 2022 17:11:24 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by mails.dpdk.org (Postfix) with ESMTP id AB7004067C for ; Wed, 21 Sep 2022 17:11:23 +0200 (CEST) Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 28LBPtOm032713; Wed, 21 Sep 2022 08:11:18 -0700 Received: from nam12-bn8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2172.outbound.protection.outlook.com [104.47.55.172]) by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 3jr1qmgt5s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Sep 2022 08:11:18 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h3VR+evYR8pTadkay7re5fWz7BLtPm34uYQWH2XRUXSTZeBz0RBi3vy48ge8KVWSHRm1iOLLqOhB6WVpTGsfQMx2o9931Ql4/L0xiGhGP0AKCxmCffE63Kd6lx1tJCI7/xfkoTJFkb2nbgkIbN+QaJK0M/LX/sgYaZZ0sZZKgrYeVY1XOB2bexNI6A2u6huLT63zwuvt7XuWjM5vVxSiCXUIHhIH/NJ/LaiqwQ/Mvp1XpMQtK+pR8HL/V3Rnz1oyw7xzFCZis3TomTDQlVpXsVyJD/NjIumkbkr1cnll4E9j7A9sEZW4QjrXL5MfHRxhY6imsnx8f46UbyYjPw2FAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MbFquezq1A29znjFz00C65BeroIGjefmZom7hYMi13w=; b=OXyRmte1TmlK3sIHldEEYkLCPzJoHfFL/+GgqoAYymXAKBRDYL1ZNBmgW2qcXp+R9bOO9XM0x06JC4TcQCsZcmeAOpzIQ664Yvgq6MN2O6Q1WrbChzVPYwJDzJDqgyyYRnOrs6wX2T/7iysBiEiaM+PMc+Mu0Yo8JifvT5L6/+Jaka/VVH4pSz7OCQ66SwwHTGw/br8bu7tHnxKRJrVU4hLdC7aDd90Sm3j8EDBE3WD9AEpkSVjJiVbphx3v+w7O9ctgv+EjhoRdle+TADRTcufAJIYbZOIugRDA+DuhwTd5n4bq4L0z2F0/7HtXOoYRm5ObO4HmWi5kr8g5EGb/EQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MbFquezq1A29znjFz00C65BeroIGjefmZom7hYMi13w=; b=O9E71ubMxryb+oBXN7HpV1LvKKaZlvmoUovqgI4DwrlTDgRF3MQnIFeyySH8YUXGK4KPCehQEyhSCN24E0WE8Fq5WmkGJd50PxASDb0g9ibnf28odacpo/AbWfzbPzplqo9O69E1L5yOTYn8UjOcwyqnn2b3yAaJFAWsIfQNJZI= Received: from CO6PR18MB4484.namprd18.prod.outlook.com (2603:10b6:5:359::9) by DM6PR18MB3441.namprd18.prod.outlook.com (2603:10b6:5:2a4::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.17; Wed, 21 Sep 2022 15:11:16 +0000 Received: from CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::7cea:d050:5433:8c74]) by CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::7cea:d050:5433:8c74%7]) with mapi id 15.20.5654.017; Wed, 21 Sep 2022 15:11:15 +0000 From: Akhil Goyal To: Akhil Goyal , "dev@dpdk.org" , Fan Zhang CC: "thomas@monjalon.net" , "david.marchand@redhat.com" , "hemant.agrawal@nxp.com" , Vamsi Krishna Attunuru , "ferruh.yigit@xilinx.com" , "andrew.rybchenko@oktetlabs.ru" , "konstantin.v.ananyev@yandex.ru" , "jiawenwu@trustnetic.com" , "yisen.zhuang@huawei.com" , Igor Russkikh , Jerin Jacob Kollanukkaran , Ankur Dwivedi , "maxime.coquelin@redhat.com" , "chandu@amd.com" , "ruifeng.wang@arm.com" , "ajit.khaparde@broadcom.com" , Anoob Joseph , "pablo.de.lara.guarch@intel.com" , "matan@nvidia.com" , "g.singh@nxp.com" , "qiming.yang@intel.com" , "wenjun1.wu@intel.com" , "jianwang@trustnetic.com" , "jingjing.wu@intel.com" , "beilei.xing@intel.com" , Nithin Kumar Dabilpuram Subject: RE: [PATCH v2 0/6] crypto/security session framework rework Thread-Topic: [PATCH v2 0/6] crypto/security session framework rework Thread-Index: AQHYzcuq0mRgCjBMXkm69Q/AyHbec63p/Mqw Date: Wed, 21 Sep 2022 15:11:15 +0000 Message-ID: References: <20220829160645.378406-1-roy.fan.zhang@intel.com> <20220921150258.2061702-1-gakhil@marvell.com> In-Reply-To: <20220921150258.2061702-1-gakhil@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR18MB4484:EE_|DM6PR18MB3441:EE_ x-ms-office365-filtering-correlation-id: b75c4f2a-c302-4721-bf8c-08da9be38765 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR18MB4484.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(366004)(396003)(39860400002)(136003)(376002)(346002)(451199015)(15650500001)(52536014)(2906002)(5660300002)(66446008)(66556008)(66476007)(64756008)(66946007)(8936002)(4326008)(76116006)(8676002)(33656002)(38100700002)(122000001)(55016003)(41300700001)(86362001)(107886003)(6506007)(53546011)(55236004)(9686003)(7696005)(26005)(110136005)(54906003)(966005)(478600001)(71200400001)(7416002)(38070700005)(316002)(186003)(83380400001)(23180200003); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?JgTLLHUSRgT1sVKhYzRy/aWOp9aY/EJux+BP89FbzOsd0WEQeVO7dnbx+Sxz?= =?us-ascii?Q?zkzYINmaVD1nhpxyQwopwGlW4og7I4O/JqbzWGrAXyoW5BSmefgIj+KsdHg9?= =?us-ascii?Q?sJSa4FYbrght4rAysqncljXYgSAWqVeA94I6SPtdyfC8MfodUsAetrhcFZ1Q?= =?us-ascii?Q?fJFBzInHWUIdf8daMjEpvBGfkraphDuqh4Q1mClPDn9k2CvXoLDLipJLfYm4?= =?us-ascii?Q?r/CbTO1l5jN9NAXVccZcjcq6+DOA506tjPTc+6BGRZSMT+J7/avq7QLM10uT?= =?us-ascii?Q?VMfG3RnveU60SlD8xWj2T3oA4zrDgPQlZ8YkMHa1ygsIKCQTPKvoYbLja2FP?= =?us-ascii?Q?scmYTrZhLJJASiDdV6pYKSCDb0fo3pHaV9uWHMute3m6GBOUUt6DgTgXX8NP?= =?us-ascii?Q?qryTJhpqVsgrv6pmcG74JfqbNZ10VdiVIuMXUrki081+VBG0CIeCEwI66920?= =?us-ascii?Q?kYgGjdqFjN+JEuos/1qSM14Irgi0uPgP5IQBemdjfPMXxTwFCznQYL3wcZOd?= =?us-ascii?Q?wMjyNyGeuxmyFRqS+QEaJ1SxoTwdCJkS8yNsqzRR9QeX2GKLKRmjnIZgdmpk?= =?us-ascii?Q?6xHujk/4JQ3ja+OIBwj71M+w1mKdQxzYm/upa6Vr9Jn8EnvYipeVrrSgo/5I?= =?us-ascii?Q?UUKvLb8CGGDRqNqdC3j/WuXKL9rZDwI7hgwRoDcZOlAThzK2bInk8z2lwD0I?= =?us-ascii?Q?jCjqG23XpIQL8B6d/hv1TKfElYHZMRBKNzeUAZmteF8FxYKg2jLez80D/ZBf?= =?us-ascii?Q?JF9UV3eRi+xtuZ2EUXB4yw1pIIiJ81z4TZDuFzRXV4wbtDUDH1zt5KmA8u65?= =?us-ascii?Q?o8cT7ny1p8HP73J4JcikvBMDsTw7+4XcJeZbnt8NdRgjgSPH5qLy7F0cix+2?= =?us-ascii?Q?8lcqFVPVBDut9ryJrRwtEgsUbqPS3YIZYIn9mjxrCgbSRo58FI8L0iu8/CvJ?= =?us-ascii?Q?TjN4o5GcjBqWT0RHlwIrhneyRfPGKt5xbYO5Y7gmJ+O7jQ3XLPKdpVjZ9EJt?= =?us-ascii?Q?1fujXAnnTaS3jA5EAVD0+lhWqMcrrSqkIn74glUk3jtvC1uTZdYroRTat/XB?= =?us-ascii?Q?Y4h9QtpgXlUZCFwkjuSA2VtvqNHApu7fnXo8lcpROLvQTNkvJ5P+hjgTV+nZ?= =?us-ascii?Q?sWBljyGttCb+Ydj7jwEGZggOsPLVfUR11JdEg3gWx2FPKrMXJsWjbhyvW/x1?= =?us-ascii?Q?gz6rZWJoaEMrq5G4zYP2YoFYztrs+iaSIH3Rqs+KWNk3I9bSwmXvwZHB+7jC?= =?us-ascii?Q?JPSUI9unpcMe4JT2FaQaPn4yQd2D57InqMJHQqVAiWx8419wqhjD6+A7FGbf?= =?us-ascii?Q?UP984BECnF6IhuoFTmr3HJzy19DkXgiSIFME9uMQa03spbVn4WDwXcVkNWyc?= =?us-ascii?Q?VVXSoV4bzzoTduYX4HBjJrw0txomegBMP/CXQ13t3rizK18lva/xvrXRY0hz?= =?us-ascii?Q?9F24WmIqA8i6XALhuZfReQniPMbEKZvIBrQ7+eP8VAwLST5mQThwP1KW49Xx?= =?us-ascii?Q?mX9k67wX3vtIdXsewNi60P07WSj4nFURxfklWr/gigcdzzvFehfHj5WUjxEs?= =?us-ascii?Q?2l1vOv408S/H3XPReloP7z38VQOliFcxr5sOuTDa?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR18MB4484.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: b75c4f2a-c302-4721-bf8c-08da9be38765 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Sep 2022 15:11:15.7195 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 1kMG/wE04liXNg0XLY4eaEUoRcjZHQs3gW1SfyWnOSZPgMkEXlwtLrywCz89NsyDWOtq7m+Hz9mqmoAFmMCAxg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR18MB3441 X-Proofpoint-GUID: Ilxz8o5oWxkWhNvRrHyfSvpn-JdW4Xrg X-Proofpoint-ORIG-GUID: Ilxz8o5oWxkWhNvRrHyfSvpn-JdW4Xrg X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.528,FMLib:17.11.122.1 definitions=2022-09-21_08,2022-09-20_02,2022-06-22_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org ++ Fan Zhang I think I missed adding one of the major contributor for this cleanup. > -----Original Message----- > From: Akhil Goyal > Sent: Wednesday, September 21, 2022 8:33 PM > To: dev@dpdk.org > Cc: thomas@monjalon.net; david.marchand@redhat.com; > hemant.agrawal@nxp.com; Vamsi Krishna Attunuru ; > ferruh.yigit@xilinx.com; andrew.rybchenko@oktetlabs.ru; > konstantin.v.ananyev@yandex.ru; jiawenwu@trustnetic.com; > yisen.zhuang@huawei.com; Igor Russkikh ; Jerin Jac= ob > Kollanukkaran ; Ankur Dwivedi ; > maxime.coquelin@redhat.com; chandu@amd.com; ruifeng.wang@arm.com; > ajit.khaparde@broadcom.com; Anoob Joseph ; > pablo.de.lara.guarch@intel.com; matan@nvidia.com; g.singh@nxp.com; > qiming.yang@intel.com; wenjun1.wu@intel.com; jianwang@trustnetic.com; > jingjing.wu@intel.com; beilei.xing@intel.com; Nithin Kumar Dabilpuram > ; Akhil Goyal > Subject: [PATCH v2 0/6] crypto/security session framework rework >=20 > This patchset reworks the symmetric crypto and security session > data structure to use a single virtual/physical contiguous buffer > for symmetric crypto/security session and driver private data. > In addition the session data structure is now private. > The session is represented as an opaque pointer in the application. >=20 > With the change the session is no longer supported to be accessed > by multiple device drivers. For the same reason > rte_cryptodev_sym_session_init/clear APIs are deprecated as > rte_cryptodev_sym_session_create/free will initialize and > clear the driver specific data field. >=20 > The change was also submitted last year during DPDK 21.11 > timeframe also[1], but was not applied due to lack of feedback from > community. Please help in getting this cleanup merged in this cycle. >=20 > Now the similar work was already done for asymmetric crypto. > This patchset is rebased over current tree and fixes all > the issues reported so far. > This patchset is a v2 for the patch that was sent by Fan Zhang(Intel) > with a few changes > - Added security session rework also. > - fixed issues in [2] reported on mailing list. > - few other fixes. >=20 > Please review and provide feedback as soon as possible > as this is intended to be merged in DPDK 22.11 RC1. >=20 > Currently the cnxk platform is tested with this change. > Request everyone to review and test on their platform. >=20 > Special note to ixgbe and txgbe maintainers. > There is a wrong implementation for flow creation. Please check. > A hack is added to bypass it. Please fix it separately. >=20 > [1] https://patches.dpdk.org/project/dpdk/cover/20211018213452.2734720-1- > gakhil@marvell.com/ > [2] https://patches.dpdk.org/project/dpdk/cover/20220829160645.378406-1- > roy.fan.zhang@intel.com/ >=20 > Akhil Goyal (5): > cryptodev: rework session framework > cryptodev: hide sym session structure > security: remove priv mempool usage > drivers/crypto: support security session get size op > security: hide session structure >=20 > Fan Zhang (1): > crypto/scheduler: use unified session >=20 > app/test-crypto-perf/cperf.h | 1 - > app/test-crypto-perf/cperf_ops.c | 40 +-- > app/test-crypto-perf/cperf_ops.h | 2 +- > app/test-crypto-perf/cperf_test_latency.c | 9 +- > app/test-crypto-perf/cperf_test_latency.h | 1 - > .../cperf_test_pmd_cyclecount.c | 10 +- > .../cperf_test_pmd_cyclecount.h | 1 - > app/test-crypto-perf/cperf_test_throughput.c | 11 +- > app/test-crypto-perf/cperf_test_throughput.h | 1 - > app/test-crypto-perf/cperf_test_verify.c | 9 +- > app/test-crypto-perf/cperf_test_verify.h | 1 - > app/test-crypto-perf/main.c | 30 +- > app/test-eventdev/test_perf_common.c | 35 +- > app/test-eventdev/test_perf_common.h | 1 - > app/test/test_cryptodev.c | 336 +++++------------- > app/test/test_cryptodev_blockcipher.c | 16 +- > app/test/test_cryptodev_security_ipsec.c | 2 +- > app/test/test_cryptodev_security_ipsec.h | 2 +- > app/test/test_event_crypto_adapter.c | 35 +- > app/test/test_ipsec.c | 47 +-- > app/test/test_ipsec_perf.c | 4 +- > app/test/test_security.c | 178 ++-------- > app/test/test_security_inline_proto.c | 26 +- > doc/guides/prog_guide/cryptodev_lib.rst | 16 +- > doc/guides/rel_notes/deprecation.rst | 9 + > doc/guides/rel_notes/release_22_11.rst | 7 + > drivers/common/cnxk/roc_cpt.c | 4 +- > drivers/crypto/armv8/rte_armv8_pmd.c | 21 +- > drivers/crypto/armv8/rte_armv8_pmd_ops.c | 32 +- > drivers/crypto/bcmfs/bcmfs_sym_session.c | 39 +- > drivers/crypto/bcmfs/bcmfs_sym_session.h | 3 +- > drivers/crypto/caam_jr/caam_jr.c | 69 +--- > drivers/crypto/ccp/ccp_crypto.c | 56 +-- > drivers/crypto/ccp/ccp_pmd_ops.c | 32 +- > drivers/crypto/ccp/ccp_pmd_private.h | 2 - > drivers/crypto/ccp/rte_ccp_pmd.c | 29 +- > drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 41 +-- > drivers/crypto/cnxk/cn10k_ipsec.c | 45 +-- > drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 38 +- > drivers/crypto/cnxk/cn9k_ipsec.c | 54 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 55 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 16 +- > drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 70 ++-- > drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 6 +- > drivers/crypto/dpaa_sec/dpaa_sec.c | 69 +--- > drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 7 +- > drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 34 +- > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 41 +-- > drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 48 +-- > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 62 +--- > drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 4 - > drivers/crypto/ipsec_mb/pmd_kasumi.c | 10 +- > drivers/crypto/ipsec_mb/pmd_snow3g.c | 9 +- > drivers/crypto/ipsec_mb/pmd_zuc.c | 4 - > drivers/crypto/mlx5/mlx5_crypto.c | 25 +- > drivers/crypto/mvsam/rte_mrvl_pmd.c | 11 +- > drivers/crypto/mvsam/rte_mrvl_pmd_ops.c | 49 +-- > drivers/crypto/nitrox/nitrox_sym.c | 39 +- > drivers/crypto/null/null_crypto_pmd.c | 20 +- > drivers/crypto/null/null_crypto_pmd_ops.c | 33 +- > drivers/crypto/null/null_crypto_pmd_private.h | 2 - > .../crypto/octeontx/otx_cryptodev_hw_access.h | 1 - > drivers/crypto/octeontx/otx_cryptodev_ops.c | 67 +--- > drivers/crypto/openssl/openssl_pmd_private.h | 2 - > drivers/crypto/openssl/rte_openssl_pmd.c | 24 +- > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 29 +- > drivers/crypto/qat/dev/qat_sym_pmd_gen1.c | 1 + > drivers/crypto/qat/qat_sym.c | 15 +- > drivers/crypto/qat/qat_sym.h | 16 +- > drivers/crypto/qat/qat_sym_session.c | 73 ++-- > drivers/crypto/qat/qat_sym_session.h | 10 +- > drivers/crypto/scheduler/scheduler_failover.c | 19 +- > .../crypto/scheduler/scheduler_multicore.c | 17 + > .../scheduler/scheduler_pkt_size_distr.c | 81 +++-- > drivers/crypto/scheduler/scheduler_pmd_ops.c | 93 ++++- > .../crypto/scheduler/scheduler_pmd_private.h | 120 ++++++- > .../crypto/scheduler/scheduler_roundrobin.c | 11 +- > drivers/crypto/virtio/virtio_cryptodev.c | 40 +-- > drivers/crypto/virtio/virtio_rxtx.c | 3 +- > drivers/net/cnxk/cn10k_ethdev_sec.c | 38 +- > drivers/net/cnxk/cn9k_ethdev_sec.c | 32 +- > drivers/net/iavf/iavf_ipsec_crypto.c | 23 +- > drivers/net/iavf/iavf_ipsec_crypto.h | 2 +- > drivers/net/ixgbe/ixgbe_ipsec.c | 31 +- > drivers/net/txgbe/txgbe_ipsec.c | 32 +- > examples/fips_validation/fips_dev_self_test.c | 40 +-- > examples/fips_validation/main.c | 35 +- > examples/ipsec-secgw/ipsec-secgw.c | 44 +-- > examples/ipsec-secgw/ipsec.c | 16 +- > examples/ipsec-secgw/ipsec.h | 1 - > examples/ipsec-secgw/ipsec_worker.c | 2 +- > examples/l2fwd-crypto/main.c | 54 +-- > examples/vhost_crypto/main.c | 16 +- > lib/cryptodev/cryptodev_pmd.h | 60 ++-- > lib/cryptodev/cryptodev_trace_points.c | 6 - > lib/cryptodev/rte_crypto.h | 3 +- > lib/cryptodev/rte_crypto_sym.h | 11 +- > lib/cryptodev/rte_cryptodev.c | 284 ++++++--------- > lib/cryptodev/rte_cryptodev.h | 153 +++----- > lib/cryptodev/rte_cryptodev_trace.h | 35 +- > lib/cryptodev/version.map | 6 - > lib/ipsec/rte_ipsec_group.h | 13 +- > lib/ipsec/ses.c | 5 +- > lib/pipeline/rte_table_action.c | 10 +- > lib/security/rte_security.c | 33 +- > lib/security/rte_security.h | 90 +++-- > lib/security/rte_security_driver.h | 31 +- > lib/vhost/rte_vhost_crypto.h | 3 - > lib/vhost/vhost_crypto.c | 28 +- > 109 files changed, 1255 insertions(+), 2413 deletions(-) >=20 > -- > 2.25.1