From patchwork Mon May 7 09:35:18 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Jerin Jacob X-Patchwork-Id: 39416 Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 2ACD32BE1; Mon, 7 May 2018 11:35:42 +0200 (CEST) Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0085.outbound.protection.outlook.com [104.47.36.85]) by dpdk.org (Postfix) with ESMTP id 63E722BE1 for ; Mon, 7 May 2018 11:35:40 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Z10J8AtouwuYpMbKRzE8TulUmSOasDkiYZkFWMv1VXk=; b=Kn2W6cZqIhmONK6C4DO4VURic5QAVbcTtnIS5qDGXP4R2BQkcsFf1PGxddzFcJP9CZ7oa6K9UxoIJDAeSbdVPl6/O4XXfxFCkrVU5zHwSnegH7+bvbcIXD0xmkrA8wBiYmUrJNZI9FFsoG1TaPvS8S8ymuPs2qw9bTMBu/rKHEI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Jerin.JacobKollanukkaran@cavium.com; Received: from jerin (115.113.156.3) by SN2PR07MB2527.namprd07.prod.outlook.com (2603:10b6:804:6::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.735.18; Mon, 7 May 2018 09:35:33 +0000 Date: Mon, 7 May 2018 15:05:18 +0530 From: Jerin Jacob To: Abhinandan Gujjar Cc: hemant.agrawal@nxp.com, akhil.goyal@nxp.com, dev@dpdk.org, narender.vangati@intel.com, nikhil.rao@intel.com, gage.eads@intel.com Message-ID: <20180507093516.GA8052@jerin> References: <1525546030-11204-1-git-send-email-abhinandan.gujjar@intel.com> <1525546030-11204-2-git-send-email-abhinandan.gujjar@intel.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <1525546030-11204-2-git-send-email-abhinandan.gujjar@intel.com> User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [115.113.156.3] X-ClientProxiedBy: PN1PR0101CA0021.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c00:e::31) To SN2PR07MB2527.namprd07.prod.outlook.com (2603:10b6:804:6::27) X-MS-PublicTrafficType: Email X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:SN2PR07MB2527; X-Microsoft-Exchange-Diagnostics: 1; SN2PR07MB2527; 3:dgK0qWYCqwY3Xwb6jOrYut9wlyj/VJ4wQjhILuaX/kBNqBUAkixgtYrr5UCiCEU0I8/ExRk91t+HNZOCYqkVskT4OGfWRxQhAs/606HkFc4GpgpMYuQSrb9qrVd2Yqn50wuOnpCPlHwtQ5dy1bE+UTnhg3QakC9n0V0kWvUahrFV8P7TnTYDch9wAzsg5Nfmt2oBnDbvzVkfTo55sQSKfBK/7FvGHRt0dFHgNar6tuuQcXMl1oyj9NwlvEGM2nwF; 25:/R4tCSYXk3oRnmMtpkYmSjNm60brhpyKr0aWK7voFjMns1y3X716jJ21bTyfp5TwMPz6PCJYAhH4zJp6S1akK1asV6dpDGvEwFKPel8QDzrkw7lle6wDTGLKBpyxNjfd9XrbjVag6sZFNRWnWVvGeLPrFg1Gz998+ihT0huuF6KZ1TnkJGETh4lUoL1VZoPv9/BkxBbXq68nbbXomfze9ipCG5DY6Xq1+lz8GZw11Agf9YpzzEEjO5SNCKOMYlK1etNSxASivTjbehrmw+b0ZowGfpnV4pcqP3/4oQcnhAxc2JN4H/trdkgZsPU4CHesdhtmQPKOZG2CxA3gPvU/fQ==; 31:yOo2q0WIxLIP5yM7/22s13Jl953yVRVEIxZuXCnvHX+trsiYUhK+yp34qauj7jyqW0JCrDwgVJ1PY9kKkdbM/VSSTfht5I1VEzVOkYliuPCkFfdQ2Xw58hYzgicyJVhuG/BkuZmZe6rO6l3f6agL/DrhTk60FtJLs4Ugy1cPstJg5ysqs5eVv6vsI9UbHkPr3ygMnwKZzoQkKY8iV/hmTr2M/YujbUYpLPVBzCfcvnc= X-MS-TrafficTypeDiagnostic: SN2PR07MB2527: X-Microsoft-Exchange-Diagnostics: 1; SN2PR07MB2527; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197)(228905959029699); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3231254)(944501410)(52105095)(3002001)(149027)(150027)(6041310)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:SN2PR07MB2527; BCL:0; PCL:0; RULEID:; SRVR:SN2PR07MB2527; X-Microsoft-Exchange-Diagnostics: 1; SN2PR07MB2527; 4:dPcFQ2wP6A+j9Ek+tsLQGkpBBLWT6Z+D4iO9ENvgjECNd5quE9IfQMnQ8FCe8e+4bjBCpR92yYar4NkEvvc7IDfukTGxEma/E9bTjuzBYiyOU0gEaDaXwzrTg42hyBxLvr3Y3Ntnbl5JnZ58+KfXV4MBqBGBkeVJGE+lswrywE55E/G5Zya3pv7PCM/tJieXu8vEynkSTDCctbO7CHN/wN52zYaFao0Ey3AgL9y0c31SPAeT+BHvcD14216z7I1UxznNMBF9MiEl3FePcMkfBnaH4cT8QBRNutZpH/u1SpQWgXSzgb7jrC2rb0sWu0KpaXzH7sOMiuWWE1L07xQYztu8+8VbKCsCwEEVNyCjj74= X-Forefront-PRVS: 066517B35B X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(39380400002)(39850400004)(366004)(346002)(396003)(13464003)(199004)(189003)(97736004)(66066001)(5660300001)(486006)(42882007)(446003)(33716001)(11346002)(316002)(58126008)(68736007)(33656002)(44832011)(476003)(956004)(16526019)(186003)(6306002)(55016002)(53936002)(4326008)(9686003)(305945005)(7736002)(2870700001)(81166006)(81156014)(2906002)(8676002)(8936002)(6496006)(23676004)(52146003)(33896004)(2486003)(76176011)(386003)(59450400001)(55236004)(26005)(106356001)(105586002)(52116002)(229853002)(478600001)(6116002)(1076002)(3846002)(72206003)(966005)(6246003)(50466002)(8656006)(47776003)(6916009)(6666003)(25786009)(18370500001); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR07MB2527; H:jerin; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?q?1=3BSN2PR07MB2527=3B23=3AhYYY?= =?utf-8?q?/j5f6/oyvuHrjMlBx8w/EPSBQLyRhj+AaNEQFutkNegqU7qiz+wOTPF1?= =?utf-8?q?D46y5O2r7seR1RkzG4f45LXdcxPZQjr79wUU+QvlQR77QgqLpkvkbBpW?= =?utf-8?q?IlTbpnfe0i1ObfGsL1bbr6bYF1GurhwY8QyCKRIW4g1LSiXICwhifN0S?= =?utf-8?q?5qCwPac295+tSq+l4VqSkOBb/P2kmjWQIzsOvjTphWGzHL1nBk+t6yyL?= =?utf-8?q?lVvV23/a3Xdo8VGnWal0fpPY5vmDvDVVyiuH4R1Py7tsIYd/7mJrMatc?= =?utf-8?q?ZhSihTvOVzWh4XUUkV+R1fraCMM+gynCY2e5b0VpAtPWbZzzaG70ArSa?= =?utf-8?q?2lh70xMNL5PBEGqY0uYgybJ9rvAsd47YOJ5qI5CrDLmeC4o04PgEn4MW?= =?utf-8?q?Xg3jcmP8TvdFlS4yTjaKehDa7i38i4SHl5CZEgJU9FSYinIyjmsvgpXv?= =?utf-8?q?mQjvkAH/bRxOmgrxe6EHHQQ8FOT+gO8p/0+glwtC8Bf829wzoE6ULP5z?= =?utf-8?q?OoVSyorp3Q/tTdhTy5MSNRuIswQK4NIxnx7x+uvAYJF009MujKDcYh12?= =?utf-8?q?AMY0FneW1dd97BmGI/8Rp5LSrUSmwRK8eF4ch116rlgZ7sRPdOGPTq6b?= =?utf-8?q?zH2wn5hkeY8yUZrh2GxrkC2q3CHSVOqSxb4fJLtqHr1Qvv1jMcCaKg2W?= =?utf-8?q?fwESIEEkiVZrJJn29wGHrFBs/ThXtoh9VsWREoVQpuMpp2QT7KQLajVl?= =?utf-8?q?W/4J+eBopKMKIueHGTIu5spNEL5o5vCwnD+Zvw84LYZG2zTs3HADZAER?= =?utf-8?q?ureGCWllGcosy+zFoSJ9QxEOslHpciOWhkf+Rlf7v8WxIvYat8BiI0Eh?= =?utf-8?q?nje/6F4UbszZ5pS6VTOlmyBX3hZRvCIZGlD1KWLjzPbw0vVU1p7J4KBV?= =?utf-8?q?ZyqLZrhy1Ifd+d34nWsBE0NfctK3w4063AQjECCUxruCodvyk4myOhEs?= =?utf-8?q?SyzXbYnVGgOI9Ewb2wAXrt8UGf9IjuBHkOKEVjlQYhoDMLYiW2dDMlhG?= =?utf-8?q?vlppFG582/EKqxk2No07P4ea49uBgXo0CwMXyOYaNJFE9+21jkmtb4vT?= =?utf-8?q?8hVgHkIDG6BoG3kCl18/5u8/XEdk5/SuUBA1Ww/zh+CxPb72Mpn65sB+?= =?utf-8?q?kVnYlv5SjdkUekwryko6Rn7oHqAQPOWNlFN8yZorKIehOA5QOS9Zplld?= =?utf-8?q?LHPK+ybGr+5RjofDmE1cfvnbIGvRM8UJqGvTxD5/HHhMuytidLVuyUu1?= =?utf-8?q?MKPHjlmfxnomlDoBHAnI5MuVzr8acl9HJ8QyHqcUx8vKJpZWVBxKN/WD?= =?utf-8?q?3V9v6sbqtm0tDZXBUpeF5EXUWrQiO4pg2cK0/8Fdrers/zvRhy7jOpVq?= =?utf-8?q?lGe4vKC3FuIGfGGNSz2HMe7noNPLa6M7JOYA2cbi9NANshDnOq0f+BOm?= =?utf-8?q?uFe38cB3mWGC3ZOTMTXW0LMK1Wkn8Qq5R2xeuJCymf+F6UkRNYNfU7X+?= =?utf-8?q?uUxa/jswsRR+YmQWCw8+zAdTFfNT42YVmQ=3D=3D?= X-Microsoft-Antispam-Message-Info: 4c1fWWfyBpib5Z73g+K5ajtaeBP5+kKg8o8Ohq6jEW41IPX1Tdc1tIYie/R5bZNstmrPVW0inaJ7N4y2D3p7cnhBhHnojjPLub8wMN2SYqbsXkzKZhfxl3vJ4OpbHRH786w3eE359efg36aO7Iumg5eO6pIityx47SnzqDG/thdPG6kjVy1gSoK2RY8eVgVo X-Microsoft-Exchange-Diagnostics: 1; SN2PR07MB2527; 6:2EZZ2kcBvfIMssb64vtAPNJqOjNILYXcE1QQU5K4Inz4XA3cqKVsOtATTuoDN4dux8eRGqQ+YFKRc9LClcA2c9ZFwYFT84TrDakgYpn3TAWH1RS4+juNC+rkXfvdrsUWrL3Z3fK2I7sBAGb/cE95NFE4V3JVjnq0/0vO9rlsV9xjAnjSh0Xu02OIa5tRnWzGx/j0dx8nDtwO7QF2tJxNW5fWUzkUVvVEJ0ROnUJH4fXB1+29zXfbe+Uczp08cmJeCFEsCYQpHUOSrDqTQaPArrR5cy9fQNiOKfJRdxFIOxOx+fS3gcGCGcj8rR+xIInKhtNghv7s7Rc0PJ1/YIeZWuX2kAfN31Lc5p5u1DcCgSaNd51x41kw2w92k3oMWGUuo9t2dXauu0B7rTE47Pz5XV+jKEcCQYfbTvxmm7He7f44o2HU6S0HDXRTwf0TYd/keW7PTNKxcta+1uds+sz4tA==; 5:43hf2RNFE+oofwji3JRZOmeYmysUlQcheFaGHhv1IDkHAYnLeYaI7pBN7cmd3iEMyFznG6ZU502gS5G0DGPlGBG4q08pqDCwEJ/Jv7rr/sLaL+nMoHyP1Z3u8yobdPBVVsV36VKg0ZZ9BlrSQ/FCaxVDE28f5F78v/+MR2biV9o=; 24:ppZkZWahqDlM+wijL6jEr8mdHRa3EN80+4n/suOT7RJAU9/s2+2qE0D5/ozr6orIrfITNrrQHXt7KmWXk0QOsbHOROPMXHTh9yuFWh/A+3Y= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; SN2PR07MB2527; 7:oAourdWCt7HnN/kJgiv6qVdapxG7ejRbmvpgpzlEgtfcN5HpOsiXbwcw7DHMlCDEWczaQxWJbCgMFRce5Y7Rn6Gn+YqV1TB1N03d2YQ8z0G6oPKJshUlT+VMlXb8xWkWyHukSBOtavFxpLT6H4vKd6b4MGTPq5dRUmaU5rLfzDSnO1CIuLQdI2/8y9T049T1M3lflHdUzCmz030+1DqmTWO2jL5yEUKUsXhUX+P63T7Ng3Wd5v05qhQWWcKN+3D6 X-MS-Office365-Filtering-Correlation-Id: f0ea2a6f-6b33-4c57-62db-08d5b3fde3ed X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 May 2018 09:35:33.7219 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f0ea2a6f-6b33-4c57-62db-08d5b3fde3ed X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR07MB2527 Subject: Re: [dpdk-dev] [v3,1/5] eventdev: introduce event crypto adapter X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" -----Original Message----- > Date: Sun, 6 May 2018 00:17:06 +0530 > From: Abhinandan Gujjar > To: jerin.jacob@caviumnetworks.com, hemant.agrawal@nxp.com, > akhil.goyal@nxp.com, dev@dpdk.org > CC: narender.vangati@intel.com, abhinandan.gujjar@intel.com, > nikhil.rao@intel.com, gage.eads@intel.com > Subject: [v3,1/5] eventdev: introduce event crypto adapter > X-Mailer: git-send-email 1.9.1 > > Signed-off-by: Abhinandan Gujjar > Signed-off-by: Nikhil Rao > Signed-off-by: Gage Eads > --- > MAINTAINERS | 5 + > lib/librte_eventdev/rte_event_crypto_adapter.h | 554 +++++++++++++++++++++++++ > 2 files changed, 559 insertions(+) > create mode 100644 lib/librte_eventdev/rte_event_crypto_adapter.h > Overall it looks good. #1) Please fix the following ./devtools/checkpatches.sh warning. ➜ [master]laptop [dpdk.org] $ ./devtools/checkpatches.sh ### eventdev: add crypto adapter implementation WARNING:SPDX_LICENSE_TAG: Missing or malformed SPDX-License-Identifier tag in line 1 #106: FILE: lib/librte_eventdev/rte_event_crypto_adapter.c:1: +/* SPDX-License-Identifier: BSD-3-Clause ### test: add event crypto adapter auto-test WARNING:SPDX_LICENSE_TAG: Missing or malformed SPDX-License-Identifier tag in line 1 #38: FILE: test/test/test_event_crypto_adapter.c:1: +/* SPDX-License-Identifier: BSD-3-Clause total: 0 errors, 1 warnings, 927 lines checked ### doc: add event crypto adapter documentation WARNING:SPDX_LICENSE_TAG: Missing or malformed SPDX-License-Identifier tag in line 1 #41: FILE: doc/guides/prog_guide/event_crypto_adapter.rst:1: +.. SPDX-License-Identifier: BSD-3-Clause * In the RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD mode, if HW supports * RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD capability the * application * can directly submit the crypto operations to the cryptodev. * If not, #2) I have added minor changes in description, Wherever it makes sense to you then please pull it for next revision. Else we can discuss more. a) I have uploaded the diff at https://ufile.io/247t9 for you convince. b) Please update the similar change in programmers guide too. diff --git a/lib/librte_eventdev/rte_event_crypto_adapter.h b/lib/librte_eventdev/rte_event_crypto_adapter.h index 2c1f54f76..55fbdc55e 100644 --- a/lib/librte_eventdev/rte_event_crypto_adapter.h +++ b/lib/librte_eventdev/rte_event_crypto_adapter.h @@ -23,14 +23,17 @@ * between the crypto device and the event device. * * The application can choose to submit a crypto operation directly to - * crypto device or send it to the crypto adapter via eventdev, the crypto - * adapter then submits the crypto operation to the crypto device. - * The first mode is known as the event new (OP_NEW) mode and the - * second as the event forward (OP_FORWARD) mode. The choice of mode can - * be specified while creating the adapter. + * crypto device or send it to the crypto adapter via eventdev based on + * RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD capability. + * The first mode is known as the event new(RTE_EVENT_CRYPTO_ADAPTER_OP_NEW) + * mode and the second as the event forward(RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD) + * mode. The choice of mode can be specified while creating the adapter. + * In the former mode, it is an application responsibility to enable ingress packet + * ordering. In the latter mode, it is the adapter responsibility to enable + * the ingress packet ordering. * * - * Working model of OP_NEW mode: + * Working model of RTE_EVENT_CRYPTO_ADAPTER_OP_NEW mode: * * +--------------+ +--------------+ * --[1]-->| | | Crypto stage | @@ -47,25 +50,27 @@ * | | | | * +--------------+ +--------------+ * - * [1] Events from the previous stage. + * [1] Events from the previous stage and enqueue to crypto/atomic stage * [2] Application in atomic stage dequeues events from eventdev. - * [3] Crypto operations are submitted to cryptodev. + * [3] Crypto operations are submitted to cryptodev by application. * [4] Crypto adapter dequeues crypto completions from cryptodev. * [5] Crypto adapter enqueues events to the eventdev. * [6] Events to the next stage. * - * In the OP_NEW mode, application submits crypto operations directly to - * crypto device. The adapter then dequeues crypto completions from crypto + * In the RTE_EVENT_CRYPTO_ADAPTER_OP_NEW mode, application submits crypto + * operations directly to crypto device. + * The adapter then dequeues crypto completions from crypto * device and enqueue events to the event device. - * This mode does not ensure ingress ordering. The application is expected - * to be in atomic stage. Events dequeued from the adapter will be treated - * as new events. + * This mode does not ensure ingress ordering if the application directly + * enqueues to cryptodev without going through crypto/atomic stage. i.e removing + * item [1] and [2]. + * Events dequeued from the adapter will be treated as new events. * In this mode, application needs to specify event information (response * information) which is needed to enqueue an event after the crypto operation * is completed. * * - * Working model of OP_FORWARD mode: + * Working model of RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD mode: * * +--------------+ +--------------+ * --[1]-->| |---[2]-->| | @@ -93,8 +98,9 @@ * [7] Crypto adapter enqueues events to the eventdev * [8] Events to the next stage * - * In the OP_FORWARD mode, if HW supports *_OP_FORWARD capability the - * application can directly submit the crypto operations to the cryptodev. + * In the RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD mode, if HW supports + * RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD capability the application + * can directly submit the crypto operations to the cryptodev. * If not, application retrieves crypto adapter's event port using * rte_event_crypto_adapter_event_port_get() API. Then, links its event * queue to this port and starts enqueuing crypto operations as events @@ -121,7 +127,7 @@ * - rte_event_crypto_adapter_stop() * - rte_event_crypto_adapter_stats_get() * - rte_event_crypto_adapter_stats_reset() - + * * The application creates an instance using rte_event_crypto_adapter_create() * or rte_event_crypto_adapter_create_ext(). * @@ -173,8 +179,10 @@ enum rte_event_crypto_adapter_mode { /**< Start the crypto adapter in event forward mode. * @see RTE_EVENT_OP_FORWARD. * Application submits crypto requests as events to the crypto - * adapter. Adapter submits crypto requests to the cryptodev - * and crypto completions are enqueued back to the eventdev. + * adapter or crypto device based on + * RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD capability. + * crypto completions are enqueued back to the eventdev by + * crypto adapter. */ }; @@ -215,11 +223,12 @@ struct rte_event_crypto_request { union rte_event_crypto_metadata { struct rte_event_crypto_request request_info; /**< Request information to be filled in by application - * for OP_FORWARD mode. + * for RTE_EVENT_CRYPTO_ADAPTER_OP_NEW mode. */ struct rte_event response_info; /**< Response information to be filled in by application - * for OP_NEW and OP_FORWARD mode. + * for RTE_EVENT_CRYPTO_ADAPTER_OP_NEW and + * RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD mode. */ }; @@ -234,7 +243,8 @@ union rte_event_crypto_metadata { struct rte_event_crypto_adapter_conf { uint8_t event_port_id; /**< Event port identifier, the adapter enqueues events to this - * port and dequeues crypto request events in OP_FORWARD mode. + * port and dequeues crypto request events in + * RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD mode. */ uint32_t max_nb; /**< The adapter can return early if it has processed at least