From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B729FA0C41; Thu, 16 Sep 2021 13:38:36 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A2E544069E; Thu, 16 Sep 2021 13:38:36 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id C530E4003F for ; Thu, 16 Sep 2021 13:38:32 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10108"; a="244920555" X-IronPort-AV: E=Sophos;i="5.85,298,1624345200"; d="scan'208";a="244920555" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Sep 2021 04:38:27 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.85,298,1624345200"; d="scan'208";a="553886837" Received: from fmsmsx605.amr.corp.intel.com ([10.18.126.85]) by fmsmga002.fm.intel.com with ESMTP; 16 Sep 2021 04:38:27 -0700 Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Thu, 16 Sep 2021 04:38:27 -0700 Received: from fmsmsx609.amr.corp.intel.com (10.18.126.89) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Thu, 16 Sep 2021 04:38:26 -0700 Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx609.amr.corp.intel.com (10.18.126.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12 via Frontend Transport; Thu, 16 Sep 2021 04:38:26 -0700 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (104.47.57.42) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.12; Thu, 16 Sep 2021 04:38:26 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eOPexmI9UH+3pAaVmExVkGYrTRZUFFCweKEgBFyU2n7H/MEnxLuo08wcT75IAXDrzYnzFLoUAsvDaOzKWH0X6PoKIj+IGjypckETfl6370shW6cN79vEhI5DJyzYr8rooBaUyVI9GIw8AuGAmOWoKXhoqn++dsSRxCDiBxb7o3iEof7ZqJplFE5xdzQB0qhc8zAJxENa+91VPDGXyz7nlhjmQ61DUd9aI+1A+HSpqTjC6suabnsaN3p2IeWGqufhazHcOd7S50ffv8UsOoP6p58yEVUcjAGzNvTw4Ij+7YFCNZ/x3U4GO5ubU41m6igPXAvq2U2FQc3LVeq1ze7sHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=aM9K1/fkFFglr/tieGRMilNqKIeSRgW1vsUNZ9C8vaw=; b=OON2lEbumHKaJIkR0SpndBMhi6pG2093bV3glOAoXQ3cpxxQGx9jQfPLdHgp2rqV/Tv08zG0ghe2I1bt8YR60imoniiJ3hb6hNY1HJtEzv0Q7h0y0P27EMfm4Z7MuuZKMBwKBb2uIhQlmBynTscAc46npa4U29mueP9hPbMENhBFL3oLx80WCBzY93h0LAoMIpAQym+4AgTRlzicYzV6VXyzbHauSKeF+gpk+IYa/naz55zAfu8v+bfORdqGrnSRfHjBF5+u7DpdfuE6cKXHLjzjWUVjjD567/pn8I/+sxpTN5T4Z+SQ3yUGiwrXB8AcIioxqcWUr8QbNwomJD/LEQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aM9K1/fkFFglr/tieGRMilNqKIeSRgW1vsUNZ9C8vaw=; b=e0O1OfWj+h2Ox5/GdvLC5zB4tHv6qPGy19PMyJQrftYNu9TXkrmw0ICgIU+if2yeUvXYDv2LUHDf6oX1P+G6pCwc861LmkULo9T78r/7UkZAu6yu7H83NQDCz9NIKJo75EO6t9CNjMpEpHcx7U8Fbp/viW8dRIwS5LMPoiIvVC0= Received: from DM6PR11MB4491.namprd11.prod.outlook.com (2603:10b6:5:204::19) by DM6PR11MB4105.namprd11.prod.outlook.com (2603:10b6:5:5::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14; Thu, 16 Sep 2021 11:38:25 +0000 Received: from DM6PR11MB4491.namprd11.prod.outlook.com ([fe80::740e:126e:c785:c8fd]) by DM6PR11MB4491.namprd11.prod.outlook.com ([fe80::740e:126e:c785:c8fd%4]) with mapi id 15.20.4523.016; Thu, 16 Sep 2021 11:38:25 +0000 From: "Ananyev, Konstantin" To: Hemant Agrawal , "dev@dpdk.org" , "gakhil@marvell.com" CC: "Zhang, Roy Fan" Thread-Topic: [PATCH v2 01/15] crypto: change sgl to src_sgl in vector Thread-Index: AQHXo77sp5iX5D97ZEK/zPRzyljVg6umlxAg Date: Thu, 16 Sep 2021 11:38:24 +0000 Message-ID: References: <20210825071510.7913-1-hemant.agrawal@nxp.com> <20210907075957.28848-1-hemant.agrawal@nxp.com> <20210907075957.28848-2-hemant.agrawal@nxp.com> In-Reply-To: <20210907075957.28848-2-hemant.agrawal@nxp.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: be6c91b9-92aa-4082-986a-08d979067eaf x-ms-traffictypediagnostic: DM6PR11MB4105: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:260; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB4491.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(396003)(136003)(376002)(366004)(346002)(33656002)(71200400001)(316002)(107886003)(83380400001)(7696005)(55016002)(64756008)(66476007)(66556008)(66446008)(9686003)(110136005)(86362001)(478600001)(66946007)(6506007)(5660300002)(38070700005)(8676002)(55236004)(52536014)(186003)(76116006)(26005)(2906002)(38100700002)(122000001)(4326008)(8936002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?F+8JSQVxIY6loJafay1PR4wLzdg3k1HDHRtZT1R/nKrk+w3GFAlulEljURQ2?= =?us-ascii?Q?+4lH5RHuhNB6BtPKOQH+ajDI9tXgkM1e5790mRBEWjIkBH56iOFsQs+b7o1F?= =?us-ascii?Q?c7eXqdXP8esd51U32TKmKXAHjOF9x/j23L4ZkhWsJBicYIPWwQ5mle3Sx4ZJ?= =?us-ascii?Q?9/jkrYgVmwJFSUfQwH9ldYWStVuLWEBL8bB13Dhv1yYelyPfedbBWIvxckKZ?= =?us-ascii?Q?MUhR7oCJlPR6AqZcHtNbpg8/p9IyLpBKQjebXa7JGwtSpv2Gv1+pOoVAoARB?= =?us-ascii?Q?MvJRBRN6eURGT75/K+5igcOnUQPuKCB3MRrGXuzYg7sXUHOHAk7K/T1Xo7OH?= =?us-ascii?Q?MXgU9N/sOAtB9YRakrqUXPnbnW8Ns50d88+v6CDObIXxciAHVz0TWDKBakA/?= =?us-ascii?Q?QRi38TYnLt2DL6Qygox3iubopcHwDdJkkFohGHaHfCyp5DT7kB9IXYJLIxCD?= =?us-ascii?Q?k1Hjcx6yk2ivYZR4nkn7A0dg0r5277nVFbfRJOEHouey+ttDmBG09ZreSnnG?= =?us-ascii?Q?1Vrc02ygN43T5xvR6wgVbqhPQCVJuB4nO8e88igUOl22EEewfRFyYYygBadc?= =?us-ascii?Q?KqvBLn39+U4QXP7v8nvxk0P42etxEC4mOZxSJV5jRyeL+g8SlDPqmgN4kfTL?= =?us-ascii?Q?8xOTBt0RfAqqPb/sEmpZ21JgeZ5EnxDPW0MVUmALNWZeerjLn5BTCS9JVS2D?= =?us-ascii?Q?3+NMEXnq1G/l6ePG3t46/1nmSU+N50mGxkJOUhy4eFp+N2x9QhxAmCmXmRNw?= =?us-ascii?Q?nulHeR7y9nwrx5XmbnhfkQDHYOW6Q6ucbRtJE5G+xsvs3jUVCS2AiNo0XwJi?= =?us-ascii?Q?K5pyxpWfJkaHcWi2giUEYq0pHbWlZdVMk+lnp3p6HK1Nee0EP/UDhxDTlUaR?= =?us-ascii?Q?gcReV19gU0XD3OZmwmrNAqrgPsG03+MrwLHjqa6JAjssVAlaMPDROxP/PAYM?= =?us-ascii?Q?nAFDOfKi9zraJvmzVjjA6/gjSgP61aL0FitApiAaADuQKQKVbRwxxd8eL3Yd?= =?us-ascii?Q?OpspOnxxEcSWqc+XkCIaiDyfG6AVl5cCOEhkgBa7nYT5LvhFOVpooPswvHl5?= =?us-ascii?Q?OUuvMVsYHk26++YBQ6KYB9x9r8Vytf2ao3EYr9YbpMAOlTwxcphcumLPAebS?= =?us-ascii?Q?aHF2DU+/kT95xz3OXj4xOnhVxWQ+efd0efREahvUSOpkKBW5vxQt5fS9KKkc?= =?us-ascii?Q?rfiHfGgIy36aZp0xCUPSTVGYngic0i0CHiHCAhNt0ifJgbQFoD6MZznLpVrM?= =?us-ascii?Q?BaukUrp2QU9uhmooOff9GUsxEpTeyVBxJZyBtHcrm/w7+c3h/ByJ4s8QRdnW?= =?us-ascii?Q?xBN2UUG3uimDRXtVwL+sfaDB?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB4491.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: be6c91b9-92aa-4082-986a-08d979067eaf X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Sep 2021 11:38:24.8979 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: +P2LRx/a7ylqYZSCtOoyn3DQIRH/1RGKQ9LauzAfpeBo6Fb3VLRgaelvbod+5eQsSMP+/NoWyUJ2frh2k2qUSPBcDSZSklyW3tpiFKUYXvs= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4105 X-OriginatorOrg: intel.com Subject: Re: [dpdk-dev] [PATCH v2 01/15] crypto: change sgl to src_sgl in vector X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > This patch renames the sgl to src_sgl to help differentiating > between source and destination sgl. >=20 > Signed-off-by: Hemant Agrawal > Acked-by: Akhil Goyal > --- > app/test/test_cryptodev.c | 6 ++--- > drivers/crypto/aesni_gcm/aesni_gcm_pmd.c | 12 +++++----- > drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 6 ++--- > drivers/crypto/qat/qat_sym_hw_dp.c | 27 +++++++++++++--------- > lib/cryptodev/rte_crypto_sym.h | 2 +- > lib/ipsec/misc.h | 4 ++-- > 6 files changed, 31 insertions(+), 26 deletions(-) >=20 > diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c > index 843d07ba37..ed63524edc 100644 > --- a/app/test/test_cryptodev.c > +++ b/app/test/test_cryptodev.c > @@ -221,7 +221,7 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id, > digest.va =3D NULL; > sgl.vec =3D data_vec; > vec.num =3D 1; > - vec.sgl =3D &sgl; > + vec.src_sgl =3D &sgl; > vec.iv =3D &cipher_iv; > vec.digest =3D &digest; > vec.aad =3D &aad_auth_iv; > @@ -385,7 +385,7 @@ process_cpu_aead_op(uint8_t dev_id, struct rte_crypto= _op *op) >=20 > sgl.vec =3D vec; > sgl.num =3D n; > - symvec.sgl =3D &sgl; > + symvec.src_sgl =3D &sgl; > symvec.iv =3D &iv_ptr; > symvec.digest =3D &digest_ptr; > symvec.aad =3D &aad_ptr; > @@ -431,7 +431,7 @@ process_cpu_crypt_auth_op(uint8_t dev_id, struct rte_= crypto_op *op) >=20 > sgl.vec =3D vec; > sgl.num =3D n; > - symvec.sgl =3D &sgl; > + symvec.src_sgl =3D &sgl; > symvec.iv =3D &iv_ptr; > symvec.digest =3D &digest_ptr; > symvec.status =3D &st; > diff --git a/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c b/drivers/crypto/ae= sni_gcm/aesni_gcm_pmd.c > index 886e2a5aaa..5fbb9b79f8 100644 > --- a/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c > +++ b/drivers/crypto/aesni_gcm/aesni_gcm_pmd.c > @@ -535,7 +535,7 @@ aesni_gcm_sgl_encrypt(struct aesni_gcm_session *s, > processed =3D 0; > for (i =3D 0; i < vec->num; ++i) { > aesni_gcm_process_gcm_sgl_op(s, gdata_ctx, > - &vec->sgl[i], vec->iv[i].va, > + &vec->src_sgl[i], vec->iv[i].va, > vec->aad[i].va); > vec->status[i] =3D aesni_gcm_sgl_op_finalize_encryption(s, > gdata_ctx, vec->digest[i].va); > @@ -554,7 +554,7 @@ aesni_gcm_sgl_decrypt(struct aesni_gcm_session *s, > processed =3D 0; > for (i =3D 0; i < vec->num; ++i) { > aesni_gcm_process_gcm_sgl_op(s, gdata_ctx, > - &vec->sgl[i], vec->iv[i].va, > + &vec->src_sgl[i], vec->iv[i].va, > vec->aad[i].va); > vec->status[i] =3D aesni_gcm_sgl_op_finalize_decryption(s, > gdata_ctx, vec->digest[i].va); > @@ -572,13 +572,13 @@ aesni_gmac_sgl_generate(struct aesni_gcm_session *s= , >=20 > processed =3D 0; > for (i =3D 0; i < vec->num; ++i) { > - if (vec->sgl[i].num !=3D 1) { > + if (vec->src_sgl[i].num !=3D 1) { > vec->status[i] =3D ENOTSUP; > continue; > } >=20 > aesni_gcm_process_gmac_sgl_op(s, gdata_ctx, > - &vec->sgl[i], vec->iv[i].va); > + &vec->src_sgl[i], vec->iv[i].va); > vec->status[i] =3D aesni_gcm_sgl_op_finalize_encryption(s, > gdata_ctx, vec->digest[i].va); > processed +=3D (vec->status[i] =3D=3D 0); > @@ -595,13 +595,13 @@ aesni_gmac_sgl_verify(struct aesni_gcm_session *s, >=20 > processed =3D 0; > for (i =3D 0; i < vec->num; ++i) { > - if (vec->sgl[i].num !=3D 1) { > + if (vec->src_sgl[i].num !=3D 1) { > vec->status[i] =3D ENOTSUP; > continue; > } >=20 > aesni_gcm_process_gmac_sgl_op(s, gdata_ctx, > - &vec->sgl[i], vec->iv[i].va); > + &vec->src_sgl[i], vec->iv[i].va); > vec->status[i] =3D aesni_gcm_sgl_op_finalize_decryption(s, > gdata_ctx, vec->digest[i].va); > processed +=3D (vec->status[i] =3D=3D 0); > diff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c b/drivers/crypto/= aesni_mb/rte_aesni_mb_pmd.c > index a01c826a3c..1b05099446 100644 > --- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c > +++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c > @@ -2002,14 +2002,14 @@ aesni_mb_cpu_crypto_process_bulk(struct rte_crypt= odev *dev, > for (i =3D 0, j =3D 0, k =3D 0; i !=3D vec->num; i++) { >=20 >=20 > - ret =3D check_crypto_sgl(sofs, vec->sgl + i); > + ret =3D check_crypto_sgl(sofs, vec->src_sgl + i); > if (ret !=3D 0) { > vec->status[i] =3D ret; > continue; > } >=20 > - buf =3D vec->sgl[i].vec[0].base; > - len =3D vec->sgl[i].vec[0].len; > + buf =3D vec->src_sgl[i].vec[0].base; > + len =3D vec->src_sgl[i].vec[0].len; >=20 > job =3D IMB_GET_NEXT_JOB(mb_mgr); > if (job =3D=3D NULL) { > diff --git a/drivers/crypto/qat/qat_sym_hw_dp.c b/drivers/crypto/qat/qat_= sym_hw_dp.c > index ac9ac05363..4870ebf66a 100644 > --- a/drivers/crypto/qat/qat_sym_hw_dp.c > +++ b/drivers/crypto/qat/qat_sym_hw_dp.c > @@ -181,8 +181,9 @@ qat_sym_dp_enqueue_cipher_jobs(void *qp_data, uint8_t= *drv_ctx, > (uint8_t *)tx_queue->base_addr + tail); > rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); >=20 > - data_len =3D qat_sym_dp_parse_data_vec(qp, req, vec->sgl[i].vec, > - vec->sgl[i].num); > + data_len =3D qat_sym_dp_parse_data_vec(qp, req, > + vec->src_sgl[i].vec, > + vec->src_sgl[i].num); > if (unlikely(data_len < 0)) > break; > req->comn_mid.opaque_data =3D (uint64_t)(uintptr_t)user_data[i]; > @@ -302,8 +303,9 @@ qat_sym_dp_enqueue_auth_jobs(void *qp_data, uint8_t *= drv_ctx, > (uint8_t *)tx_queue->base_addr + tail); > rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); >=20 > - data_len =3D qat_sym_dp_parse_data_vec(qp, req, vec->sgl[i].vec, > - vec->sgl[i].num); > + data_len =3D qat_sym_dp_parse_data_vec(qp, req, > + vec->src_sgl[i].vec, > + vec->src_sgl[i].num); > if (unlikely(data_len < 0)) > break; > req->comn_mid.opaque_data =3D (uint64_t)(uintptr_t)user_data[i]; > @@ -484,14 +486,16 @@ qat_sym_dp_enqueue_chain_jobs(void *qp_data, uint8_= t *drv_ctx, > (uint8_t *)tx_queue->base_addr + tail); > rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); >=20 > - data_len =3D qat_sym_dp_parse_data_vec(qp, req, vec->sgl[i].vec, > - vec->sgl[i].num); > + data_len =3D qat_sym_dp_parse_data_vec(qp, req, > + vec->src_sgl[i].vec, > + vec->src_sgl[i].num); > if (unlikely(data_len < 0)) > break; > req->comn_mid.opaque_data =3D (uint64_t)(uintptr_t)user_data[i]; > - if (unlikely(enqueue_one_chain_job(ctx, req, vec->sgl[i].vec, > - vec->sgl[i].num, &vec->iv[i], &vec->digest[i], > - &vec->auth_iv[i], ofs, (uint32_t)data_len))) > + if (unlikely(enqueue_one_chain_job(ctx, req, > + vec->src_sgl[i].vec, vec->src_sgl[i].num, > + &vec->iv[i], &vec->digest[i], > + &vec->auth_iv[i], ofs, (uint32_t)data_len))) > break; >=20 > tail =3D (tail + tx_queue->msg_size) & tx_queue->modulo_mask; > @@ -688,8 +692,9 @@ qat_sym_dp_enqueue_aead_jobs(void *qp_data, uint8_t *= drv_ctx, > (uint8_t *)tx_queue->base_addr + tail); > rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); >=20 > - data_len =3D qat_sym_dp_parse_data_vec(qp, req, vec->sgl[i].vec, > - vec->sgl[i].num); > + data_len =3D qat_sym_dp_parse_data_vec(qp, req, > + vec->src_sgl[i].vec, > + vec->src_sgl[i].num); > if (unlikely(data_len < 0)) > break; > req->comn_mid.opaque_data =3D (uint64_t)(uintptr_t)user_data[i]; > diff --git a/lib/cryptodev/rte_crypto_sym.h b/lib/cryptodev/rte_crypto_sy= m.h > index 58c0724743..dcc0bd5933 100644 > --- a/lib/cryptodev/rte_crypto_sym.h > +++ b/lib/cryptodev/rte_crypto_sym.h > @@ -69,7 +69,7 @@ struct rte_crypto_sym_vec { > /** number of operations to perform */ > uint32_t num; > /** array of SGL vectors */ > - struct rte_crypto_sgl *sgl; > + struct rte_crypto_sgl *src_sgl; > /** array of pointers to cipher IV */ > struct rte_crypto_va_iova_ptr *iv; > /** array of pointers to digest */ > diff --git a/lib/ipsec/misc.h b/lib/ipsec/misc.h > index 79b9a20762..58ff538141 100644 > --- a/lib/ipsec/misc.h > +++ b/lib/ipsec/misc.h > @@ -136,7 +136,7 @@ cpu_crypto_bulk(const struct rte_ipsec_session *ss, > /* not enough space in vec[] to hold all segments */ > if (vcnt < 0) { > /* fill the request structure */ > - symvec.sgl =3D &vecpkt[j]; > + symvec.src_sgl =3D &vecpkt[j]; > symvec.iv =3D &iv[j]; > symvec.digest =3D &dgst[j]; > symvec.aad =3D &aad[j]; > @@ -160,7 +160,7 @@ cpu_crypto_bulk(const struct rte_ipsec_session *ss, > } >=20 > /* fill the request structure */ > - symvec.sgl =3D &vecpkt[j]; > + symvec.src_sgl =3D &vecpkt[j]; > symvec.iv =3D &iv[j]; > symvec.aad =3D &aad[j]; > symvec.digest =3D &dgst[j]; > -- Acked-by: Konstantin Ananyev > 2.17.1