cryptodev: add mempool pointer in queue pair setup
[dpdk.git] / lib / librte_cryptodev / rte_cryptodev.c
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright(c) 2015-2017 Intel Corporation. All rights reserved.
5  *
6  *   Redistribution and use in source and binary forms, with or without
7  *   modification, are permitted provided that the following conditions
8  *   are met:
9  *
10  *     * Redistributions of source code must retain the above copyright
11  *       notice, this list of conditions and the following disclaimer.
12  *     * Redistributions in binary form must reproduce the above copyright
13  *       notice, this list of conditions and the following disclaimer in
14  *       the documentation and/or other materials provided with the
15  *       distribution.
16  *     * Neither the name of Intel Corporation nor the names of its
17  *       contributors may be used to endorse or promote products derived
18  *       from this software without specific prior written permission.
19  *
20  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31  */
32
33 #include <sys/types.h>
34 #include <sys/queue.h>
35 #include <ctype.h>
36 #include <stdio.h>
37 #include <stdlib.h>
38 #include <string.h>
39 #include <stdarg.h>
40 #include <errno.h>
41 #include <stdint.h>
42 #include <inttypes.h>
43 #include <netinet/in.h>
44
45 #include <rte_byteorder.h>
46 #include <rte_log.h>
47 #include <rte_debug.h>
48 #include <rte_dev.h>
49 #include <rte_interrupts.h>
50 #include <rte_memory.h>
51 #include <rte_memcpy.h>
52 #include <rte_memzone.h>
53 #include <rte_launch.h>
54 #include <rte_tailq.h>
55 #include <rte_eal.h>
56 #include <rte_per_lcore.h>
57 #include <rte_lcore.h>
58 #include <rte_atomic.h>
59 #include <rte_branch_prediction.h>
60 #include <rte_common.h>
61 #include <rte_mempool.h>
62 #include <rte_malloc.h>
63 #include <rte_mbuf.h>
64 #include <rte_errno.h>
65 #include <rte_spinlock.h>
66 #include <rte_string_fns.h>
67
68 #include "rte_crypto.h"
69 #include "rte_cryptodev.h"
70 #include "rte_cryptodev_pmd.h"
71
72 static uint8_t nb_drivers;
73
74 struct rte_cryptodev rte_crypto_devices[RTE_CRYPTO_MAX_DEVS];
75
76 struct rte_cryptodev *rte_cryptodevs = &rte_crypto_devices[0];
77
78 static struct rte_cryptodev_global cryptodev_globals = {
79                 .devs                   = &rte_crypto_devices[0],
80                 .data                   = { NULL },
81                 .nb_devs                = 0,
82                 .max_devs               = RTE_CRYPTO_MAX_DEVS
83 };
84
85 struct rte_cryptodev_global *rte_cryptodev_globals = &cryptodev_globals;
86
87 /* spinlock for crypto device callbacks */
88 static rte_spinlock_t rte_cryptodev_cb_lock = RTE_SPINLOCK_INITIALIZER;
89
90
91 /**
92  * The user application callback description.
93  *
94  * It contains callback address to be registered by user application,
95  * the pointer to the parameters for callback, and the event type.
96  */
97 struct rte_cryptodev_callback {
98         TAILQ_ENTRY(rte_cryptodev_callback) next; /**< Callbacks list */
99         rte_cryptodev_cb_fn cb_fn;              /**< Callback address */
100         void *cb_arg;                           /**< Parameter for callback */
101         enum rte_cryptodev_event_type event;    /**< Interrupt event type */
102         uint32_t active;                        /**< Callback is executing */
103 };
104
105 /**
106  * The crypto cipher algorithm strings identifiers.
107  * It could be used in application command line.
108  */
109 const char *
110 rte_crypto_cipher_algorithm_strings[] = {
111         [RTE_CRYPTO_CIPHER_3DES_CBC]    = "3des-cbc",
112         [RTE_CRYPTO_CIPHER_3DES_ECB]    = "3des-ecb",
113         [RTE_CRYPTO_CIPHER_3DES_CTR]    = "3des-ctr",
114
115         [RTE_CRYPTO_CIPHER_AES_CBC]     = "aes-cbc",
116         [RTE_CRYPTO_CIPHER_AES_CTR]     = "aes-ctr",
117         [RTE_CRYPTO_CIPHER_AES_DOCSISBPI]       = "aes-docsisbpi",
118         [RTE_CRYPTO_CIPHER_AES_ECB]     = "aes-ecb",
119         [RTE_CRYPTO_CIPHER_AES_F8]      = "aes-f8",
120         [RTE_CRYPTO_CIPHER_AES_XTS]     = "aes-xts",
121
122         [RTE_CRYPTO_CIPHER_ARC4]        = "arc4",
123
124         [RTE_CRYPTO_CIPHER_DES_CBC]     = "des-cbc",
125         [RTE_CRYPTO_CIPHER_DES_DOCSISBPI]       = "des-docsisbpi",
126
127         [RTE_CRYPTO_CIPHER_NULL]        = "null",
128
129         [RTE_CRYPTO_CIPHER_KASUMI_F8]   = "kasumi-f8",
130         [RTE_CRYPTO_CIPHER_SNOW3G_UEA2] = "snow3g-uea2",
131         [RTE_CRYPTO_CIPHER_ZUC_EEA3]    = "zuc-eea3"
132 };
133
134 /**
135  * The crypto cipher operation strings identifiers.
136  * It could be used in application command line.
137  */
138 const char *
139 rte_crypto_cipher_operation_strings[] = {
140                 [RTE_CRYPTO_CIPHER_OP_ENCRYPT]  = "encrypt",
141                 [RTE_CRYPTO_CIPHER_OP_DECRYPT]  = "decrypt"
142 };
143
144 /**
145  * The crypto auth algorithm strings identifiers.
146  * It could be used in application command line.
147  */
148 const char *
149 rte_crypto_auth_algorithm_strings[] = {
150         [RTE_CRYPTO_AUTH_AES_CBC_MAC]   = "aes-cbc-mac",
151         [RTE_CRYPTO_AUTH_AES_CMAC]      = "aes-cmac",
152         [RTE_CRYPTO_AUTH_AES_GMAC]      = "aes-gmac",
153         [RTE_CRYPTO_AUTH_AES_XCBC_MAC]  = "aes-xcbc-mac",
154
155         [RTE_CRYPTO_AUTH_MD5]           = "md5",
156         [RTE_CRYPTO_AUTH_MD5_HMAC]      = "md5-hmac",
157
158         [RTE_CRYPTO_AUTH_NULL]          = "null",
159
160         [RTE_CRYPTO_AUTH_SHA1]          = "sha1",
161         [RTE_CRYPTO_AUTH_SHA1_HMAC]     = "sha1-hmac",
162
163         [RTE_CRYPTO_AUTH_SHA224]        = "sha2-224",
164         [RTE_CRYPTO_AUTH_SHA224_HMAC]   = "sha2-224-hmac",
165         [RTE_CRYPTO_AUTH_SHA256]        = "sha2-256",
166         [RTE_CRYPTO_AUTH_SHA256_HMAC]   = "sha2-256-hmac",
167         [RTE_CRYPTO_AUTH_SHA384]        = "sha2-384",
168         [RTE_CRYPTO_AUTH_SHA384_HMAC]   = "sha2-384-hmac",
169         [RTE_CRYPTO_AUTH_SHA512]        = "sha2-512",
170         [RTE_CRYPTO_AUTH_SHA512_HMAC]   = "sha2-512-hmac",
171
172         [RTE_CRYPTO_AUTH_KASUMI_F9]     = "kasumi-f9",
173         [RTE_CRYPTO_AUTH_SNOW3G_UIA2]   = "snow3g-uia2",
174         [RTE_CRYPTO_AUTH_ZUC_EIA3]      = "zuc-eia3"
175 };
176
177 /**
178  * The crypto AEAD algorithm strings identifiers.
179  * It could be used in application command line.
180  */
181 const char *
182 rte_crypto_aead_algorithm_strings[] = {
183         [RTE_CRYPTO_AEAD_AES_CCM]       = "aes-ccm",
184         [RTE_CRYPTO_AEAD_AES_GCM]       = "aes-gcm",
185 };
186
187 /**
188  * The crypto AEAD operation strings identifiers.
189  * It could be used in application command line.
190  */
191 const char *
192 rte_crypto_aead_operation_strings[] = {
193         [RTE_CRYPTO_AEAD_OP_ENCRYPT]    = "encrypt",
194         [RTE_CRYPTO_AEAD_OP_DECRYPT]    = "decrypt"
195 };
196
197 int
198 rte_cryptodev_get_cipher_algo_enum(enum rte_crypto_cipher_algorithm *algo_enum,
199                 const char *algo_string)
200 {
201         unsigned int i;
202
203         for (i = 1; i < RTE_DIM(rte_crypto_cipher_algorithm_strings); i++) {
204                 if (strcmp(algo_string, rte_crypto_cipher_algorithm_strings[i]) == 0) {
205                         *algo_enum = (enum rte_crypto_cipher_algorithm) i;
206                         return 0;
207                 }
208         }
209
210         /* Invalid string */
211         return -1;
212 }
213
214 int
215 rte_cryptodev_get_auth_algo_enum(enum rte_crypto_auth_algorithm *algo_enum,
216                 const char *algo_string)
217 {
218         unsigned int i;
219
220         for (i = 1; i < RTE_DIM(rte_crypto_auth_algorithm_strings); i++) {
221                 if (strcmp(algo_string, rte_crypto_auth_algorithm_strings[i]) == 0) {
222                         *algo_enum = (enum rte_crypto_auth_algorithm) i;
223                         return 0;
224                 }
225         }
226
227         /* Invalid string */
228         return -1;
229 }
230
231 int
232 rte_cryptodev_get_aead_algo_enum(enum rte_crypto_aead_algorithm *algo_enum,
233                 const char *algo_string)
234 {
235         unsigned int i;
236
237         for (i = 1; i < RTE_DIM(rte_crypto_aead_algorithm_strings); i++) {
238                 if (strcmp(algo_string, rte_crypto_aead_algorithm_strings[i]) == 0) {
239                         *algo_enum = (enum rte_crypto_aead_algorithm) i;
240                         return 0;
241                 }
242         }
243
244         /* Invalid string */
245         return -1;
246 }
247
248 /**
249  * The crypto auth operation strings identifiers.
250  * It could be used in application command line.
251  */
252 const char *
253 rte_crypto_auth_operation_strings[] = {
254                 [RTE_CRYPTO_AUTH_OP_VERIFY]     = "verify",
255                 [RTE_CRYPTO_AUTH_OP_GENERATE]   = "generate"
256 };
257
258 const struct rte_cryptodev_symmetric_capability *
259 rte_cryptodev_sym_capability_get(uint8_t dev_id,
260                 const struct rte_cryptodev_sym_capability_idx *idx)
261 {
262         const struct rte_cryptodev_capabilities *capability;
263         struct rte_cryptodev_info dev_info;
264         int i = 0;
265
266         rte_cryptodev_info_get(dev_id, &dev_info);
267
268         while ((capability = &dev_info.capabilities[i++])->op !=
269                         RTE_CRYPTO_OP_TYPE_UNDEFINED) {
270                 if (capability->op != RTE_CRYPTO_OP_TYPE_SYMMETRIC)
271                         continue;
272
273                 if (capability->sym.xform_type != idx->type)
274                         continue;
275
276                 if (idx->type == RTE_CRYPTO_SYM_XFORM_AUTH &&
277                         capability->sym.auth.algo == idx->algo.auth)
278                         return &capability->sym;
279
280                 if (idx->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&
281                         capability->sym.cipher.algo == idx->algo.cipher)
282                         return &capability->sym;
283
284                 if (idx->type == RTE_CRYPTO_SYM_XFORM_AEAD &&
285                                 capability->sym.aead.algo == idx->algo.aead)
286                         return &capability->sym;
287         }
288
289         return NULL;
290
291 }
292
293 #define param_range_check(x, y) \
294         (((x < y.min) || (x > y.max)) || \
295         (y.increment != 0 && (x % y.increment) != 0))
296
297 int
298 rte_cryptodev_sym_capability_check_cipher(
299                 const struct rte_cryptodev_symmetric_capability *capability,
300                 uint16_t key_size, uint16_t iv_size)
301 {
302         if (param_range_check(key_size, capability->cipher.key_size))
303                 return -1;
304
305         if (param_range_check(iv_size, capability->cipher.iv_size))
306                 return -1;
307
308         return 0;
309 }
310
311 int
312 rte_cryptodev_sym_capability_check_auth(
313                 const struct rte_cryptodev_symmetric_capability *capability,
314                 uint16_t key_size, uint16_t digest_size, uint16_t aad_size,
315                 uint16_t iv_size)
316 {
317         if (param_range_check(key_size, capability->auth.key_size))
318                 return -1;
319
320         if (param_range_check(digest_size, capability->auth.digest_size))
321                 return -1;
322
323         if (param_range_check(aad_size, capability->auth.aad_size))
324                 return -1;
325
326         if (param_range_check(iv_size, capability->auth.iv_size))
327                 return -1;
328
329         return 0;
330 }
331
332 int
333 rte_cryptodev_sym_capability_check_aead(
334                 const struct rte_cryptodev_symmetric_capability *capability,
335                 uint16_t key_size, uint16_t digest_size, uint16_t aad_size,
336                 uint16_t iv_size)
337 {
338         if (param_range_check(key_size, capability->aead.key_size))
339                 return -1;
340
341         if (param_range_check(digest_size, capability->aead.digest_size))
342                 return -1;
343
344         if (param_range_check(aad_size, capability->aead.aad_size))
345                 return -1;
346
347         if (param_range_check(iv_size, capability->aead.iv_size))
348                 return -1;
349
350         return 0;
351 }
352
353 const char *
354 rte_cryptodev_get_feature_name(uint64_t flag)
355 {
356         switch (flag) {
357         case RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO:
358                 return "SYMMETRIC_CRYPTO";
359         case RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO:
360                 return "ASYMMETRIC_CRYPTO";
361         case RTE_CRYPTODEV_FF_SYM_OPERATION_CHAINING:
362                 return "SYM_OPERATION_CHAINING";
363         case RTE_CRYPTODEV_FF_CPU_SSE:
364                 return "CPU_SSE";
365         case RTE_CRYPTODEV_FF_CPU_AVX:
366                 return "CPU_AVX";
367         case RTE_CRYPTODEV_FF_CPU_AVX2:
368                 return "CPU_AVX2";
369         case RTE_CRYPTODEV_FF_CPU_AESNI:
370                 return "CPU_AESNI";
371         case RTE_CRYPTODEV_FF_HW_ACCELERATED:
372                 return "HW_ACCELERATED";
373         case RTE_CRYPTODEV_FF_MBUF_SCATTER_GATHER:
374                 return "MBUF_SCATTER_GATHER";
375         case RTE_CRYPTODEV_FF_CPU_NEON:
376                 return "CPU_NEON";
377         case RTE_CRYPTODEV_FF_CPU_ARM_CE:
378                 return "CPU_ARM_CE";
379         default:
380                 return NULL;
381         }
382 }
383
384 int
385 rte_cryptodev_create_vdev(const char *name, const char *args)
386 {
387         return rte_vdev_init(name, args);
388 }
389
390 struct rte_cryptodev *
391 rte_cryptodev_pmd_get_dev(uint8_t dev_id)
392 {
393         return &rte_cryptodev_globals->devs[dev_id];
394 }
395
396 struct rte_cryptodev *
397 rte_cryptodev_pmd_get_named_dev(const char *name)
398 {
399         struct rte_cryptodev *dev;
400         unsigned int i;
401
402         if (name == NULL)
403                 return NULL;
404
405         for (i = 0; i < rte_cryptodev_globals->max_devs; i++) {
406                 dev = &rte_cryptodev_globals->devs[i];
407
408                 if ((dev->attached == RTE_CRYPTODEV_ATTACHED) &&
409                                 (strcmp(dev->data->name, name) == 0))
410                         return dev;
411         }
412
413         return NULL;
414 }
415
416 unsigned int
417 rte_cryptodev_pmd_is_valid_dev(uint8_t dev_id)
418 {
419         struct rte_cryptodev *dev = NULL;
420
421         if (dev_id >= rte_cryptodev_globals->nb_devs)
422                 return 0;
423
424         dev = rte_cryptodev_pmd_get_dev(dev_id);
425         if (dev->attached != RTE_CRYPTODEV_ATTACHED)
426                 return 0;
427         else
428                 return 1;
429 }
430
431
432 int
433 rte_cryptodev_get_dev_id(const char *name)
434 {
435         unsigned i;
436
437         if (name == NULL)
438                 return -1;
439
440         for (i = 0; i < rte_cryptodev_globals->nb_devs; i++)
441                 if ((strcmp(rte_cryptodev_globals->devs[i].data->name, name)
442                                 == 0) &&
443                                 (rte_cryptodev_globals->devs[i].attached ==
444                                                 RTE_CRYPTODEV_ATTACHED))
445                         return i;
446
447         return -1;
448 }
449
450 uint8_t
451 rte_cryptodev_count(void)
452 {
453         return rte_cryptodev_globals->nb_devs;
454 }
455
456 uint8_t
457 rte_cryptodev_device_count_by_driver(uint8_t driver_id)
458 {
459         uint8_t i, dev_count = 0;
460
461         for (i = 0; i < rte_cryptodev_globals->max_devs; i++)
462                 if (rte_cryptodev_globals->devs[i].driver_id == driver_id &&
463                         rte_cryptodev_globals->devs[i].attached ==
464                                         RTE_CRYPTODEV_ATTACHED)
465                         dev_count++;
466
467         return dev_count;
468 }
469
470 uint8_t
471 rte_cryptodev_devices_get(const char *driver_name, uint8_t *devices,
472         uint8_t nb_devices)
473 {
474         uint8_t i, count = 0;
475         struct rte_cryptodev *devs = rte_cryptodev_globals->devs;
476         uint8_t max_devs = rte_cryptodev_globals->max_devs;
477
478         for (i = 0; i < max_devs && count < nb_devices; i++) {
479
480                 if (devs[i].attached == RTE_CRYPTODEV_ATTACHED) {
481                         int cmp;
482
483                         cmp = strncmp(devs[i].device->driver->name,
484                                         driver_name,
485                                         strlen(driver_name));
486
487                         if (cmp == 0)
488                                 devices[count++] = devs[i].data->dev_id;
489                 }
490         }
491
492         return count;
493 }
494
495 int
496 rte_cryptodev_socket_id(uint8_t dev_id)
497 {
498         struct rte_cryptodev *dev;
499
500         if (!rte_cryptodev_pmd_is_valid_dev(dev_id))
501                 return -1;
502
503         dev = rte_cryptodev_pmd_get_dev(dev_id);
504
505         return dev->data->socket_id;
506 }
507
508 static inline int
509 rte_cryptodev_data_alloc(uint8_t dev_id, struct rte_cryptodev_data **data,
510                 int socket_id)
511 {
512         char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
513         const struct rte_memzone *mz;
514         int n;
515
516         /* generate memzone name */
517         n = snprintf(mz_name, sizeof(mz_name), "rte_cryptodev_data_%u", dev_id);
518         if (n >= (int)sizeof(mz_name))
519                 return -EINVAL;
520
521         if (rte_eal_process_type() == RTE_PROC_PRIMARY) {
522                 mz = rte_memzone_reserve(mz_name,
523                                 sizeof(struct rte_cryptodev_data),
524                                 socket_id, 0);
525         } else
526                 mz = rte_memzone_lookup(mz_name);
527
528         if (mz == NULL)
529                 return -ENOMEM;
530
531         *data = mz->addr;
532         if (rte_eal_process_type() == RTE_PROC_PRIMARY)
533                 memset(*data, 0, sizeof(struct rte_cryptodev_data));
534
535         return 0;
536 }
537
538 static uint8_t
539 rte_cryptodev_find_free_device_index(void)
540 {
541         uint8_t dev_id;
542
543         for (dev_id = 0; dev_id < RTE_CRYPTO_MAX_DEVS; dev_id++) {
544                 if (rte_crypto_devices[dev_id].attached ==
545                                 RTE_CRYPTODEV_DETACHED)
546                         return dev_id;
547         }
548         return RTE_CRYPTO_MAX_DEVS;
549 }
550
551 struct rte_cryptodev *
552 rte_cryptodev_pmd_allocate(const char *name, int socket_id)
553 {
554         struct rte_cryptodev *cryptodev;
555         uint8_t dev_id;
556
557         if (rte_cryptodev_pmd_get_named_dev(name) != NULL) {
558                 CDEV_LOG_ERR("Crypto device with name %s already "
559                                 "allocated!", name);
560                 return NULL;
561         }
562
563         dev_id = rte_cryptodev_find_free_device_index();
564         if (dev_id == RTE_CRYPTO_MAX_DEVS) {
565                 CDEV_LOG_ERR("Reached maximum number of crypto devices");
566                 return NULL;
567         }
568
569         cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
570
571         if (cryptodev->data == NULL) {
572                 struct rte_cryptodev_data *cryptodev_data =
573                                 cryptodev_globals.data[dev_id];
574
575                 int retval = rte_cryptodev_data_alloc(dev_id, &cryptodev_data,
576                                 socket_id);
577
578                 if (retval < 0 || cryptodev_data == NULL)
579                         return NULL;
580
581                 cryptodev->data = cryptodev_data;
582
583                 snprintf(cryptodev->data->name, RTE_CRYPTODEV_NAME_MAX_LEN,
584                                 "%s", name);
585
586                 cryptodev->data->dev_id = dev_id;
587                 cryptodev->data->socket_id = socket_id;
588                 cryptodev->data->dev_started = 0;
589
590                 cryptodev->attached = RTE_CRYPTODEV_ATTACHED;
591
592                 cryptodev_globals.nb_devs++;
593         }
594
595         return cryptodev;
596 }
597
598 int
599 rte_cryptodev_pmd_release_device(struct rte_cryptodev *cryptodev)
600 {
601         int ret;
602
603         if (cryptodev == NULL)
604                 return -EINVAL;
605
606         /* Close device only if device operations have been set */
607         if (cryptodev->dev_ops) {
608                 ret = rte_cryptodev_close(cryptodev->data->dev_id);
609                 if (ret < 0)
610                         return ret;
611         }
612
613         cryptodev->attached = RTE_CRYPTODEV_DETACHED;
614         cryptodev_globals.nb_devs--;
615         return 0;
616 }
617
618 uint16_t
619 rte_cryptodev_queue_pair_count(uint8_t dev_id)
620 {
621         struct rte_cryptodev *dev;
622
623         dev = &rte_crypto_devices[dev_id];
624         return dev->data->nb_queue_pairs;
625 }
626
627 static int
628 rte_cryptodev_queue_pairs_config(struct rte_cryptodev *dev, uint16_t nb_qpairs,
629                 int socket_id)
630 {
631         struct rte_cryptodev_info dev_info;
632         void **qp;
633         unsigned i;
634
635         if ((dev == NULL) || (nb_qpairs < 1)) {
636                 CDEV_LOG_ERR("invalid param: dev %p, nb_queues %u",
637                                                         dev, nb_qpairs);
638                 return -EINVAL;
639         }
640
641         CDEV_LOG_DEBUG("Setup %d queues pairs on device %u",
642                         nb_qpairs, dev->data->dev_id);
643
644         memset(&dev_info, 0, sizeof(struct rte_cryptodev_info));
645
646         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->dev_infos_get, -ENOTSUP);
647         (*dev->dev_ops->dev_infos_get)(dev, &dev_info);
648
649         if (nb_qpairs > (dev_info.max_nb_queue_pairs)) {
650                 CDEV_LOG_ERR("Invalid num queue_pairs (%u) for dev %u",
651                                 nb_qpairs, dev->data->dev_id);
652             return -EINVAL;
653         }
654
655         if (dev->data->queue_pairs == NULL) { /* first time configuration */
656                 dev->data->queue_pairs = rte_zmalloc_socket(
657                                 "cryptodev->queue_pairs",
658                                 sizeof(dev->data->queue_pairs[0]) * nb_qpairs,
659                                 RTE_CACHE_LINE_SIZE, socket_id);
660
661                 if (dev->data->queue_pairs == NULL) {
662                         dev->data->nb_queue_pairs = 0;
663                         CDEV_LOG_ERR("failed to get memory for qp meta data, "
664                                                         "nb_queues %u",
665                                                         nb_qpairs);
666                         return -(ENOMEM);
667                 }
668         } else { /* re-configure */
669                 int ret;
670                 uint16_t old_nb_queues = dev->data->nb_queue_pairs;
671
672                 qp = dev->data->queue_pairs;
673
674                 RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->queue_pair_release,
675                                 -ENOTSUP);
676
677                 for (i = nb_qpairs; i < old_nb_queues; i++) {
678                         ret = (*dev->dev_ops->queue_pair_release)(dev, i);
679                         if (ret < 0)
680                                 return ret;
681                 }
682
683                 qp = rte_realloc(qp, sizeof(qp[0]) * nb_qpairs,
684                                 RTE_CACHE_LINE_SIZE);
685                 if (qp == NULL) {
686                         CDEV_LOG_ERR("failed to realloc qp meta data,"
687                                                 " nb_queues %u", nb_qpairs);
688                         return -(ENOMEM);
689                 }
690
691                 if (nb_qpairs > old_nb_queues) {
692                         uint16_t new_qs = nb_qpairs - old_nb_queues;
693
694                         memset(qp + old_nb_queues, 0,
695                                 sizeof(qp[0]) * new_qs);
696                 }
697
698                 dev->data->queue_pairs = qp;
699
700         }
701         dev->data->nb_queue_pairs = nb_qpairs;
702         return 0;
703 }
704
705 int
706 rte_cryptodev_queue_pair_start(uint8_t dev_id, uint16_t queue_pair_id)
707 {
708         struct rte_cryptodev *dev;
709
710         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
711                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
712                 return -EINVAL;
713         }
714
715         dev = &rte_crypto_devices[dev_id];
716         if (queue_pair_id >= dev->data->nb_queue_pairs) {
717                 CDEV_LOG_ERR("Invalid queue_pair_id=%d", queue_pair_id);
718                 return -EINVAL;
719         }
720
721         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->queue_pair_start, -ENOTSUP);
722
723         return dev->dev_ops->queue_pair_start(dev, queue_pair_id);
724
725 }
726
727 int
728 rte_cryptodev_queue_pair_stop(uint8_t dev_id, uint16_t queue_pair_id)
729 {
730         struct rte_cryptodev *dev;
731
732         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
733                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
734                 return -EINVAL;
735         }
736
737         dev = &rte_crypto_devices[dev_id];
738         if (queue_pair_id >= dev->data->nb_queue_pairs) {
739                 CDEV_LOG_ERR("Invalid queue_pair_id=%d", queue_pair_id);
740                 return -EINVAL;
741         }
742
743         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->queue_pair_stop, -ENOTSUP);
744
745         return dev->dev_ops->queue_pair_stop(dev, queue_pair_id);
746
747 }
748
749 int
750 rte_cryptodev_configure(uint8_t dev_id, struct rte_cryptodev_config *config)
751 {
752         struct rte_cryptodev *dev;
753         int diag;
754
755         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
756                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
757                 return -EINVAL;
758         }
759
760         dev = &rte_crypto_devices[dev_id];
761
762         if (dev->data->dev_started) {
763                 CDEV_LOG_ERR(
764                     "device %d must be stopped to allow configuration", dev_id);
765                 return -EBUSY;
766         }
767
768         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->dev_configure, -ENOTSUP);
769
770         /* Setup new number of queue pairs and reconfigure device. */
771         diag = rte_cryptodev_queue_pairs_config(dev, config->nb_queue_pairs,
772                         config->socket_id);
773         if (diag != 0) {
774                 CDEV_LOG_ERR("dev%d rte_crypto_dev_queue_pairs_config = %d",
775                                 dev_id, diag);
776                 return diag;
777         }
778
779         return (*dev->dev_ops->dev_configure)(dev, config);
780 }
781
782
783 int
784 rte_cryptodev_start(uint8_t dev_id)
785 {
786         struct rte_cryptodev *dev;
787         int diag;
788
789         CDEV_LOG_DEBUG("Start dev_id=%" PRIu8, dev_id);
790
791         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
792                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
793                 return -EINVAL;
794         }
795
796         dev = &rte_crypto_devices[dev_id];
797
798         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->dev_start, -ENOTSUP);
799
800         if (dev->data->dev_started != 0) {
801                 CDEV_LOG_ERR("Device with dev_id=%" PRIu8 " already started",
802                         dev_id);
803                 return 0;
804         }
805
806         diag = (*dev->dev_ops->dev_start)(dev);
807         if (diag == 0)
808                 dev->data->dev_started = 1;
809         else
810                 return diag;
811
812         return 0;
813 }
814
815 void
816 rte_cryptodev_stop(uint8_t dev_id)
817 {
818         struct rte_cryptodev *dev;
819
820         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
821                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
822                 return;
823         }
824
825         dev = &rte_crypto_devices[dev_id];
826
827         RTE_FUNC_PTR_OR_RET(*dev->dev_ops->dev_stop);
828
829         if (dev->data->dev_started == 0) {
830                 CDEV_LOG_ERR("Device with dev_id=%" PRIu8 " already stopped",
831                         dev_id);
832                 return;
833         }
834
835         (*dev->dev_ops->dev_stop)(dev);
836         dev->data->dev_started = 0;
837 }
838
839 int
840 rte_cryptodev_close(uint8_t dev_id)
841 {
842         struct rte_cryptodev *dev;
843         int retval;
844
845         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
846                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
847                 return -1;
848         }
849
850         dev = &rte_crypto_devices[dev_id];
851
852         /* Device must be stopped before it can be closed */
853         if (dev->data->dev_started == 1) {
854                 CDEV_LOG_ERR("Device %u must be stopped before closing",
855                                 dev_id);
856                 return -EBUSY;
857         }
858
859         /* We can't close the device if there are outstanding sessions in use */
860         if (dev->data->session_pool != NULL) {
861                 if (!rte_mempool_full(dev->data->session_pool)) {
862                         CDEV_LOG_ERR("dev_id=%u close failed, session mempool "
863                                         "has sessions still in use, free "
864                                         "all sessions before calling close",
865                                         (unsigned)dev_id);
866                         return -EBUSY;
867                 }
868         }
869
870         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->dev_close, -ENOTSUP);
871         retval = (*dev->dev_ops->dev_close)(dev);
872
873         if (retval < 0)
874                 return retval;
875
876         return 0;
877 }
878
879 int
880 rte_cryptodev_queue_pair_setup(uint8_t dev_id, uint16_t queue_pair_id,
881                 const struct rte_cryptodev_qp_conf *qp_conf, int socket_id,
882                 struct rte_mempool *session_pool)
883
884 {
885         struct rte_cryptodev *dev;
886
887         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
888                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
889                 return -EINVAL;
890         }
891
892         dev = &rte_crypto_devices[dev_id];
893         if (queue_pair_id >= dev->data->nb_queue_pairs) {
894                 CDEV_LOG_ERR("Invalid queue_pair_id=%d", queue_pair_id);
895                 return -EINVAL;
896         }
897
898         if (dev->data->dev_started) {
899                 CDEV_LOG_ERR(
900                     "device %d must be stopped to allow configuration", dev_id);
901                 return -EBUSY;
902         }
903
904         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->queue_pair_setup, -ENOTSUP);
905
906         return (*dev->dev_ops->queue_pair_setup)(dev, queue_pair_id, qp_conf,
907                         socket_id, session_pool);
908 }
909
910
911 int
912 rte_cryptodev_stats_get(uint8_t dev_id, struct rte_cryptodev_stats *stats)
913 {
914         struct rte_cryptodev *dev;
915
916         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
917                 CDEV_LOG_ERR("Invalid dev_id=%d", dev_id);
918                 return -ENODEV;
919         }
920
921         if (stats == NULL) {
922                 CDEV_LOG_ERR("Invalid stats ptr");
923                 return -EINVAL;
924         }
925
926         dev = &rte_crypto_devices[dev_id];
927         memset(stats, 0, sizeof(*stats));
928
929         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->stats_get, -ENOTSUP);
930         (*dev->dev_ops->stats_get)(dev, stats);
931         return 0;
932 }
933
934 void
935 rte_cryptodev_stats_reset(uint8_t dev_id)
936 {
937         struct rte_cryptodev *dev;
938
939         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
940                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
941                 return;
942         }
943
944         dev = &rte_crypto_devices[dev_id];
945
946         RTE_FUNC_PTR_OR_RET(*dev->dev_ops->stats_reset);
947         (*dev->dev_ops->stats_reset)(dev);
948 }
949
950
951 void
952 rte_cryptodev_info_get(uint8_t dev_id, struct rte_cryptodev_info *dev_info)
953 {
954         struct rte_cryptodev *dev;
955
956         if (dev_id >= cryptodev_globals.nb_devs) {
957                 CDEV_LOG_ERR("Invalid dev_id=%d", dev_id);
958                 return;
959         }
960
961         dev = &rte_crypto_devices[dev_id];
962
963         memset(dev_info, 0, sizeof(struct rte_cryptodev_info));
964
965         RTE_FUNC_PTR_OR_RET(*dev->dev_ops->dev_infos_get);
966         (*dev->dev_ops->dev_infos_get)(dev, dev_info);
967
968         dev_info->driver_name = dev->device->driver->name;
969 }
970
971
972 int
973 rte_cryptodev_callback_register(uint8_t dev_id,
974                         enum rte_cryptodev_event_type event,
975                         rte_cryptodev_cb_fn cb_fn, void *cb_arg)
976 {
977         struct rte_cryptodev *dev;
978         struct rte_cryptodev_callback *user_cb;
979
980         if (!cb_fn)
981                 return -EINVAL;
982
983         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
984                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
985                 return -EINVAL;
986         }
987
988         dev = &rte_crypto_devices[dev_id];
989         rte_spinlock_lock(&rte_cryptodev_cb_lock);
990
991         TAILQ_FOREACH(user_cb, &(dev->link_intr_cbs), next) {
992                 if (user_cb->cb_fn == cb_fn &&
993                         user_cb->cb_arg == cb_arg &&
994                         user_cb->event == event) {
995                         break;
996                 }
997         }
998
999         /* create a new callback. */
1000         if (user_cb == NULL) {
1001                 user_cb = rte_zmalloc("INTR_USER_CALLBACK",
1002                                 sizeof(struct rte_cryptodev_callback), 0);
1003                 if (user_cb != NULL) {
1004                         user_cb->cb_fn = cb_fn;
1005                         user_cb->cb_arg = cb_arg;
1006                         user_cb->event = event;
1007                         TAILQ_INSERT_TAIL(&(dev->link_intr_cbs), user_cb, next);
1008                 }
1009         }
1010
1011         rte_spinlock_unlock(&rte_cryptodev_cb_lock);
1012         return (user_cb == NULL) ? -ENOMEM : 0;
1013 }
1014
1015 int
1016 rte_cryptodev_callback_unregister(uint8_t dev_id,
1017                         enum rte_cryptodev_event_type event,
1018                         rte_cryptodev_cb_fn cb_fn, void *cb_arg)
1019 {
1020         int ret;
1021         struct rte_cryptodev *dev;
1022         struct rte_cryptodev_callback *cb, *next;
1023
1024         if (!cb_fn)
1025                 return -EINVAL;
1026
1027         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
1028                 CDEV_LOG_ERR("Invalid dev_id=%" PRIu8, dev_id);
1029                 return -EINVAL;
1030         }
1031
1032         dev = &rte_crypto_devices[dev_id];
1033         rte_spinlock_lock(&rte_cryptodev_cb_lock);
1034
1035         ret = 0;
1036         for (cb = TAILQ_FIRST(&dev->link_intr_cbs); cb != NULL; cb = next) {
1037
1038                 next = TAILQ_NEXT(cb, next);
1039
1040                 if (cb->cb_fn != cb_fn || cb->event != event ||
1041                                 (cb->cb_arg != (void *)-1 &&
1042                                 cb->cb_arg != cb_arg))
1043                         continue;
1044
1045                 /*
1046                  * if this callback is not executing right now,
1047                  * then remove it.
1048                  */
1049                 if (cb->active == 0) {
1050                         TAILQ_REMOVE(&(dev->link_intr_cbs), cb, next);
1051                         rte_free(cb);
1052                 } else {
1053                         ret = -EAGAIN;
1054                 }
1055         }
1056
1057         rte_spinlock_unlock(&rte_cryptodev_cb_lock);
1058         return ret;
1059 }
1060
1061 void
1062 rte_cryptodev_pmd_callback_process(struct rte_cryptodev *dev,
1063         enum rte_cryptodev_event_type event)
1064 {
1065         struct rte_cryptodev_callback *cb_lst;
1066         struct rte_cryptodev_callback dev_cb;
1067
1068         rte_spinlock_lock(&rte_cryptodev_cb_lock);
1069         TAILQ_FOREACH(cb_lst, &(dev->link_intr_cbs), next) {
1070                 if (cb_lst->cb_fn == NULL || cb_lst->event != event)
1071                         continue;
1072                 dev_cb = *cb_lst;
1073                 cb_lst->active = 1;
1074                 rte_spinlock_unlock(&rte_cryptodev_cb_lock);
1075                 dev_cb.cb_fn(dev->data->dev_id, dev_cb.event,
1076                                                 dev_cb.cb_arg);
1077                 rte_spinlock_lock(&rte_cryptodev_cb_lock);
1078                 cb_lst->active = 0;
1079         }
1080         rte_spinlock_unlock(&rte_cryptodev_cb_lock);
1081 }
1082
1083
1084 int
1085 rte_cryptodev_sym_session_init(uint8_t dev_id,
1086                 struct rte_cryptodev_sym_session *sess,
1087                 struct rte_crypto_sym_xform *xforms,
1088                 struct rte_mempool *mp)
1089 {
1090         struct rte_cryptodev *dev;
1091         uint8_t index;
1092
1093         dev = rte_cryptodev_pmd_get_dev(dev_id);
1094
1095         if (sess == NULL || xforms == NULL || dev == NULL)
1096                 return -1;
1097
1098         index = dev->driver_id;
1099
1100         if (sess->sess_private_data[index] == NULL) {
1101                 if (dev->dev_ops->session_configure(dev, xforms, sess, mp) < 0) {
1102                         CDEV_LOG_ERR(
1103                                 "dev_id %d failed to configure session details",
1104                                 dev_id);
1105                         return -1;
1106                 }
1107         }
1108
1109         return 0;
1110 }
1111
1112 struct rte_cryptodev_sym_session *
1113 rte_cryptodev_sym_session_create(struct rte_mempool *mp)
1114 {
1115         struct rte_cryptodev_sym_session *sess;
1116
1117         /* Allocate a session structure from the session pool */
1118         if (rte_mempool_get(mp, (void *)&sess)) {
1119                 CDEV_LOG_ERR("couldn't get object from session mempool");
1120                 return NULL;
1121         }
1122
1123         /* Clear device session pointer */
1124         memset(sess, 0, (sizeof(void *) * nb_drivers));
1125
1126         return sess;
1127 }
1128
1129 int
1130 rte_cryptodev_queue_pair_attach_sym_session(uint8_t dev_id, uint16_t qp_id,
1131                 struct rte_cryptodev_sym_session *sess)
1132 {
1133         struct rte_cryptodev *dev;
1134
1135         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
1136                 CDEV_LOG_ERR("Invalid dev_id=%d", dev_id);
1137                 return -EINVAL;
1138         }
1139
1140         dev = &rte_crypto_devices[dev_id];
1141
1142         /* The API is optional, not returning error if driver do not suuport */
1143         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->qp_attach_session, 0);
1144
1145         void *sess_priv = get_session_private_data(sess, dev->driver_id);
1146
1147         if (dev->dev_ops->qp_attach_session(dev, qp_id, sess_priv)) {
1148                 CDEV_LOG_ERR("dev_id %d failed to attach qp: %d with session",
1149                                 dev_id, qp_id);
1150                 return -EPERM;
1151         }
1152
1153         return 0;
1154 }
1155
1156 int
1157 rte_cryptodev_queue_pair_detach_sym_session(uint8_t dev_id, uint16_t qp_id,
1158                 struct rte_cryptodev_sym_session *sess)
1159 {
1160         struct rte_cryptodev *dev;
1161
1162         if (!rte_cryptodev_pmd_is_valid_dev(dev_id)) {
1163                 CDEV_LOG_ERR("Invalid dev_id=%d", dev_id);
1164                 return -EINVAL;
1165         }
1166
1167         dev = &rte_crypto_devices[dev_id];
1168
1169         /* The API is optional, not returning error if driver do not suuport */
1170         RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->qp_detach_session, 0);
1171
1172         void *sess_priv = get_session_private_data(sess, dev->driver_id);
1173
1174         if (dev->dev_ops->qp_detach_session(dev, qp_id, sess_priv)) {
1175                 CDEV_LOG_ERR("dev_id %d failed to detach qp: %d from session",
1176                                 dev_id, qp_id);
1177                 return -EPERM;
1178         }
1179
1180         return 0;
1181 }
1182
1183 int
1184 rte_cryptodev_sym_session_clear(uint8_t dev_id,
1185                 struct rte_cryptodev_sym_session *sess)
1186 {
1187         struct rte_cryptodev *dev;
1188
1189         dev = rte_cryptodev_pmd_get_dev(dev_id);
1190
1191         if (dev == NULL || sess == NULL)
1192                 return -EINVAL;
1193
1194         dev->dev_ops->session_clear(dev, sess);
1195
1196         return 0;
1197 }
1198
1199 int
1200 rte_cryptodev_sym_session_free(struct rte_cryptodev_sym_session *sess)
1201 {
1202         uint8_t i;
1203         void *sess_priv;
1204         struct rte_mempool *sess_mp;
1205
1206         if (sess == NULL)
1207                 return -EINVAL;
1208
1209         /* Check that all device private data has been freed */
1210         for (i = 0; i < nb_drivers; i++) {
1211                 sess_priv = get_session_private_data(sess, i);
1212                 if (sess_priv != NULL)
1213                         return -EBUSY;
1214         }
1215
1216         /* Return session to mempool */
1217         sess_mp = rte_mempool_from_obj(sess);
1218         rte_mempool_put(sess_mp, sess);
1219
1220         return 0;
1221 }
1222
1223 unsigned int
1224 rte_cryptodev_get_header_session_size(void)
1225 {
1226         /*
1227          * Header contains pointers to the private data
1228          * of all registered drivers
1229          */
1230         return (sizeof(void *) * nb_drivers);
1231 }
1232
1233 unsigned int
1234 rte_cryptodev_get_private_session_size(uint8_t dev_id)
1235 {
1236         struct rte_cryptodev *dev;
1237         unsigned int header_size = sizeof(void *) * nb_drivers;
1238         unsigned int priv_sess_size;
1239
1240         if (!rte_cryptodev_pmd_is_valid_dev(dev_id))
1241                 return 0;
1242
1243         dev = rte_cryptodev_pmd_get_dev(dev_id);
1244
1245         if (*dev->dev_ops->session_get_size == NULL)
1246                 return 0;
1247
1248         priv_sess_size = (*dev->dev_ops->session_get_size)(dev);
1249
1250         /*
1251          * If size is less than session header size,
1252          * return the latter, as this guarantees that
1253          * sessionless operations will work
1254          */
1255         if (priv_sess_size < header_size)
1256                 return header_size;
1257
1258         return priv_sess_size;
1259
1260 }
1261
1262 /** Initialise rte_crypto_op mempool element */
1263 static void
1264 rte_crypto_op_init(struct rte_mempool *mempool,
1265                 void *opaque_arg,
1266                 void *_op_data,
1267                 __rte_unused unsigned i)
1268 {
1269         struct rte_crypto_op *op = _op_data;
1270         enum rte_crypto_op_type type = *(enum rte_crypto_op_type *)opaque_arg;
1271
1272         memset(_op_data, 0, mempool->elt_size);
1273
1274         __rte_crypto_op_reset(op, type);
1275
1276         op->phys_addr = rte_mem_virt2phy(_op_data);
1277         op->mempool = mempool;
1278 }
1279
1280
1281 struct rte_mempool *
1282 rte_crypto_op_pool_create(const char *name, enum rte_crypto_op_type type,
1283                 unsigned nb_elts, unsigned cache_size, uint16_t priv_size,
1284                 int socket_id)
1285 {
1286         struct rte_crypto_op_pool_private *priv;
1287
1288         unsigned elt_size = sizeof(struct rte_crypto_op) +
1289                         sizeof(struct rte_crypto_sym_op) +
1290                         priv_size;
1291
1292         /* lookup mempool in case already allocated */
1293         struct rte_mempool *mp = rte_mempool_lookup(name);
1294
1295         if (mp != NULL) {
1296                 priv = (struct rte_crypto_op_pool_private *)
1297                                 rte_mempool_get_priv(mp);
1298
1299                 if (mp->elt_size != elt_size ||
1300                                 mp->cache_size < cache_size ||
1301                                 mp->size < nb_elts ||
1302                                 priv->priv_size <  priv_size) {
1303                         mp = NULL;
1304                         CDEV_LOG_ERR("Mempool %s already exists but with "
1305                                         "incompatible parameters", name);
1306                         return NULL;
1307                 }
1308                 return mp;
1309         }
1310
1311         mp = rte_mempool_create(
1312                         name,
1313                         nb_elts,
1314                         elt_size,
1315                         cache_size,
1316                         sizeof(struct rte_crypto_op_pool_private),
1317                         NULL,
1318                         NULL,
1319                         rte_crypto_op_init,
1320                         &type,
1321                         socket_id,
1322                         0);
1323
1324         if (mp == NULL) {
1325                 CDEV_LOG_ERR("Failed to create mempool %s", name);
1326                 return NULL;
1327         }
1328
1329         priv = (struct rte_crypto_op_pool_private *)
1330                         rte_mempool_get_priv(mp);
1331
1332         priv->priv_size = priv_size;
1333         priv->type = type;
1334
1335         return mp;
1336 }
1337
1338 int
1339 rte_cryptodev_pmd_create_dev_name(char *name, const char *dev_name_prefix)
1340 {
1341         struct rte_cryptodev *dev = NULL;
1342         uint32_t i = 0;
1343
1344         if (name == NULL)
1345                 return -EINVAL;
1346
1347         for (i = 0; i < RTE_CRYPTO_MAX_DEVS; i++) {
1348                 int ret = snprintf(name, RTE_CRYPTODEV_NAME_MAX_LEN,
1349                                 "%s_%u", dev_name_prefix, i);
1350
1351                 if (ret < 0)
1352                         return ret;
1353
1354                 dev = rte_cryptodev_pmd_get_named_dev(name);
1355                 if (!dev)
1356                         return 0;
1357         }
1358
1359         return -1;
1360 }
1361
1362 TAILQ_HEAD(cryptodev_driver_list, cryptodev_driver);
1363
1364 static struct cryptodev_driver_list cryptodev_driver_list =
1365         TAILQ_HEAD_INITIALIZER(cryptodev_driver_list);
1366
1367 struct cryptodev_driver {
1368         TAILQ_ENTRY(cryptodev_driver) next; /**< Next in list. */
1369         const struct rte_driver *driver;
1370         uint8_t id;
1371 };
1372
1373 int
1374 rte_cryptodev_driver_id_get(const char *name)
1375 {
1376         struct cryptodev_driver *driver;
1377         const char *driver_name;
1378
1379         if (name == NULL) {
1380                 RTE_LOG(DEBUG, CRYPTODEV, "name pointer NULL");
1381                 return -1;
1382         }
1383
1384         TAILQ_FOREACH(driver, &cryptodev_driver_list, next) {
1385                 driver_name = driver->driver->name;
1386                 if (strncmp(driver_name, name, strlen(driver_name)) == 0)
1387                         return driver->id;
1388         }
1389         return -1;
1390 }
1391
1392 const char *
1393 rte_cryptodev_driver_name_get(uint8_t driver_id)
1394 {
1395         struct cryptodev_driver *driver;
1396
1397         TAILQ_FOREACH(driver, &cryptodev_driver_list, next)
1398                 if (driver->id == driver_id)
1399                         return driver->driver->name;
1400         return NULL;
1401 }
1402
1403 uint8_t
1404 rte_cryptodev_allocate_driver(const struct rte_driver *drv)
1405 {
1406         struct cryptodev_driver *driver;
1407
1408         driver = malloc(sizeof(*driver));
1409         driver->driver = drv;
1410         driver->id = nb_drivers;
1411
1412         TAILQ_INSERT_TAIL(&cryptodev_driver_list, driver, next);
1413
1414         return nb_drivers++;
1415 }