net: add rte prefix to IP defines
[dpdk.git] / examples / l2fwd-crypto / main.c
index a1ce712..afc658e 100644 (file)
@@ -1,34 +1,5 @@
-/*-
- *   BSD LICENSE
- *
- *   Copyright(c) 2015-2016 Intel Corporation. All rights reserved.
- *   All rights reserved.
- *
- *   Redistribution and use in source and binary forms, with or without
- *   modification, are permitted provided that the following conditions
- *   are met:
- *
- *     * Redistributions of source code must retain the above copyright
- *       notice, this list of conditions and the following disclaimer.
- *     * Redistributions in binary form must reproduce the above copyright
- *       notice, this list of conditions and the following disclaimer in
- *       the documentation and/or other materials provided with the
- *       distribution.
- *     * Neither the name of Intel Corporation nor the names of its
- *       contributors may be used to endorse or promote products derived
- *       from this software without specific prior written permission.
- *
- *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+/* SPDX-License-Identifier: BSD-3-Clause
+ * Copyright(c) 2015-2016 Intel Corporation
  */
 
 #include <time.h>
 #include <ctype.h>
 #include <errno.h>
 #include <getopt.h>
+#include <fcntl.h>
+#include <unistd.h>
 
+#include <rte_string_fns.h>
 #include <rte_atomic.h>
 #include <rte_branch_prediction.h>
 #include <rte_common.h>
 #include <rte_memcpy.h>
 #include <rte_memory.h>
 #include <rte_mempool.h>
-#include <rte_memzone.h>
-#include <rte_pci.h>
 #include <rte_per_lcore.h>
 #include <rte_prefetch.h>
 #include <rte_random.h>
-#include <rte_ring.h>
 #include <rte_hexdump.h>
+#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
+#include <rte_cryptodev_scheduler.h>
+#endif
 
 enum cdev_type {
        CDEV_TYPE_ANY,
@@ -85,27 +59,34 @@ enum cdev_type {
 
 #define MAX_STR_LEN 32
 #define MAX_KEY_SIZE 128
+#define MAX_IV_SIZE 16
+#define MAX_AAD_SIZE 65535
 #define MAX_PKT_BURST 32
 #define BURST_TX_DRAIN_US 100 /* TX drain every ~100us */
+#define SESSION_POOL_CACHE_SIZE 0
+
+#define MAXIMUM_IV_LENGTH      16
+#define IV_OFFSET              (sizeof(struct rte_crypto_op) + \
+                               sizeof(struct rte_crypto_sym_op))
 
 /*
  * Configurable number of RX/TX ring descriptors
  */
-#define RTE_TEST_RX_DESC_DEFAULT 128
-#define RTE_TEST_TX_DESC_DEFAULT 512
+#define RTE_TEST_RX_DESC_DEFAULT 1024
+#define RTE_TEST_TX_DESC_DEFAULT 1024
 
 static uint16_t nb_rxd = RTE_TEST_RX_DESC_DEFAULT;
 static uint16_t nb_txd = RTE_TEST_TX_DESC_DEFAULT;
 
 /* ethernet addresses of ports */
-static struct ether_addr l2fwd_ports_eth_addr[RTE_MAX_ETHPORTS];
+static struct rte_ether_addr l2fwd_ports_eth_addr[RTE_MAX_ETHPORTS];
 
 /* mask of enabled ports */
 static uint64_t l2fwd_enabled_port_mask;
 static uint64_t l2fwd_enabled_crypto_mask;
 
 /* list of enabled ports */
-static uint32_t l2fwd_dst_ports[RTE_MAX_ETHPORTS];
+static uint16_t l2fwd_dst_ports[RTE_MAX_ETHPORTS];
 
 
 struct pkt_buffer {
@@ -125,17 +106,20 @@ enum l2fwd_crypto_xform_chain {
        L2FWD_CRYPTO_CIPHER_HASH,
        L2FWD_CRYPTO_HASH_CIPHER,
        L2FWD_CRYPTO_CIPHER_ONLY,
-       L2FWD_CRYPTO_HASH_ONLY
+       L2FWD_CRYPTO_HASH_ONLY,
+       L2FWD_CRYPTO_AEAD
 };
 
 struct l2fwd_key {
        uint8_t *data;
        uint32_t length;
-       phys_addr_t phys_addr;
+       rte_iova_t phys_addr;
 };
 
-char supported_auth_algo[RTE_CRYPTO_AUTH_LIST_END][MAX_STR_LEN];
-char supported_cipher_algo[RTE_CRYPTO_CIPHER_LIST_END][MAX_STR_LEN];
+struct l2fwd_iv {
+       uint8_t *data;
+       uint16_t length;
+};
 
 /** l2fwd crypto application command line options */
 struct l2fwd_crypto_options {
@@ -153,14 +137,26 @@ struct l2fwd_crypto_options {
        unsigned ckey_param;
        int ckey_random_size;
 
-       struct l2fwd_key iv;
-       unsigned iv_param;
-       int iv_random_size;
+       struct l2fwd_iv cipher_iv;
+       unsigned int cipher_iv_param;
+       int cipher_iv_random_size;
 
        struct rte_crypto_sym_xform auth_xform;
        uint8_t akey_param;
        int akey_random_size;
 
+       struct l2fwd_iv auth_iv;
+       unsigned int auth_iv_param;
+       int auth_iv_random_size;
+
+       struct rte_crypto_sym_xform aead_xform;
+       unsigned int aead_key_param;
+       int aead_key_random_size;
+
+       struct l2fwd_iv aead_iv;
+       unsigned int aead_iv_param;
+       int aead_iv_random_size;
+
        struct l2fwd_key aad;
        unsigned aad_param;
        int aad_random_size;
@@ -169,6 +165,10 @@ struct l2fwd_crypto_options {
 
        uint16_t block_size;
        char string_type[MAX_STR_LEN];
+
+       uint64_t cryptodev_mask;
+
+       unsigned int mac_updating;
 };
 
 /** l2fwd crypto lcore params */
@@ -179,42 +179,41 @@ struct l2fwd_crypto_params {
        unsigned digest_length;
        unsigned block_size;
 
-       struct l2fwd_key iv;
+       struct l2fwd_iv cipher_iv;
+       struct l2fwd_iv auth_iv;
+       struct l2fwd_iv aead_iv;
        struct l2fwd_key aad;
        struct rte_cryptodev_sym_session *session;
 
        uint8_t do_cipher;
        uint8_t do_hash;
+       uint8_t do_aead;
        uint8_t hash_verify;
 
        enum rte_crypto_cipher_algorithm cipher_algo;
        enum rte_crypto_auth_algorithm auth_algo;
+       enum rte_crypto_aead_algorithm aead_algo;
 };
 
 /** lcore configuration */
 struct lcore_queue_conf {
        unsigned nb_rx_ports;
-       unsigned rx_port_list[MAX_RX_QUEUE_PER_LCORE];
+       uint16_t rx_port_list[MAX_RX_QUEUE_PER_LCORE];
 
        unsigned nb_crypto_devs;
        unsigned cryptodev_list[MAX_RX_QUEUE_PER_LCORE];
 
-       struct op_buffer op_buf[RTE_MAX_ETHPORTS];
+       struct op_buffer op_buf[RTE_CRYPTO_MAX_DEVS];
        struct pkt_buffer pkt_buf[RTE_MAX_ETHPORTS];
 } __rte_cache_aligned;
 
 struct lcore_queue_conf lcore_queue_conf[RTE_MAX_LCORE];
 
-static const struct rte_eth_conf port_conf = {
+static struct rte_eth_conf port_conf = {
        .rxmode = {
                .mq_mode = ETH_MQ_RX_NONE,
-               .max_rx_pkt_len = ETHER_MAX_LEN,
+               .max_rx_pkt_len = RTE_ETHER_MAX_LEN,
                .split_hdr_size = 0,
-               .header_split   = 0, /**< Header Split disabled */
-               .hw_ip_checksum = 0, /**< IP checksum offload disabled */
-               .hw_vlan_filter = 0, /**< VLAN filtering disabled */
-               .jumbo_frame    = 0, /**< Jumbo Frame Support disabled */
-               .hw_strip_crc   = 0, /**< CRC stripped by hardware */
        },
        .txmode = {
                .mq_mode = ETH_MQ_TX_NONE,
@@ -223,6 +222,10 @@ static const struct rte_eth_conf port_conf = {
 
 struct rte_mempool *l2fwd_pktmbuf_pool;
 struct rte_mempool *l2fwd_crypto_op_pool;
+static struct {
+       struct rte_mempool *sess_mp;
+       struct rte_mempool *priv_mp;
+} session_pool_socket[RTE_MAX_NUMA_NODES];
 
 /* Per-port statistics struct */
 struct l2fwd_port_statistics {
@@ -259,7 +262,7 @@ print_stats(void)
        uint64_t total_packets_dropped, total_packets_tx, total_packets_rx;
        uint64_t total_packets_enqueued, total_packets_dequeued,
                total_packets_errors;
-       unsigned portid;
+       uint16_t portid;
        uint64_t cdevid;
 
        total_packets_dropped = 0;
@@ -298,7 +301,7 @@ print_stats(void)
 
        for (cdevid = 0; cdevid < RTE_CRYPTO_MAX_DEVS; cdevid++) {
                /* skip disabled ports */
-               if ((l2fwd_enabled_crypto_mask & (1lu << cdevid)) == 0)
+               if ((l2fwd_enabled_crypto_mask & (((uint64_t)1) << cdevid)) == 0)
                        continue;
                printf("\nStatistics for cryptodev %"PRIu64
                                " -------------------------"
@@ -330,39 +333,6 @@ print_stats(void)
        printf("\n====================================================\n");
 }
 
-static void
-fill_supported_algorithm_tables(void)
-{
-       unsigned i;
-
-       for (i = 0; i < RTE_CRYPTO_AUTH_LIST_END; i++)
-               strcpy(supported_auth_algo[i], "NOT_SUPPORTED");
-
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_AES_GCM], "AES_GCM");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_MD5_HMAC], "MD5_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_NULL], "NULL");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_AES_XCBC_MAC],
-               "AES_XCBC_MAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SHA1_HMAC], "SHA1_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SHA224_HMAC], "SHA224_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SHA256_HMAC], "SHA256_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SHA384_HMAC], "SHA384_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SHA512_HMAC], "SHA512_HMAC");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_SNOW3G_UIA2], "SNOW3G_UIA2");
-       strcpy(supported_auth_algo[RTE_CRYPTO_AUTH_KASUMI_F9], "KASUMI_F9");
-
-       for (i = 0; i < RTE_CRYPTO_CIPHER_LIST_END; i++)
-               strcpy(supported_cipher_algo[i], "NOT_SUPPORTED");
-
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_AES_CBC], "AES_CBC");
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_AES_CTR], "AES_CTR");
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_AES_GCM], "AES_GCM");
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_NULL], "NULL");
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_SNOW3G_UEA2], "SNOW3G_UEA2");
-       strcpy(supported_cipher_algo[RTE_CRYPTO_CIPHER_KASUMI_F8], "KASUMI_F8");
-}
-
-
 static int
 l2fwd_crypto_send_burst(struct lcore_queue_conf *qconf, unsigned n,
                struct l2fwd_crypto_params *cparams)
@@ -417,98 +387,154 @@ l2fwd_simple_crypto_enqueue(struct rte_mbuf *m,
                struct rte_crypto_op *op,
                struct l2fwd_crypto_params *cparams)
 {
-       struct ether_hdr *eth_hdr;
-       struct ipv4_hdr *ip_hdr;
+       struct rte_ether_hdr *eth_hdr;
+       struct rte_ipv4_hdr *ip_hdr;
 
-       unsigned ipdata_offset, pad_len, data_len;
+       uint32_t ipdata_offset, data_len;
+       uint32_t pad_len = 0;
        char *padding;
 
-       eth_hdr = rte_pktmbuf_mtod(m, struct ether_hdr *);
+       eth_hdr = rte_pktmbuf_mtod(m, struct rte_ether_hdr *);
 
-       if (eth_hdr->ether_type != rte_cpu_to_be_16(ETHER_TYPE_IPv4))
+       if (eth_hdr->ether_type != rte_cpu_to_be_16(RTE_ETHER_TYPE_IPv4))
                return -1;
 
-       ipdata_offset = sizeof(struct ether_hdr);
+       ipdata_offset = sizeof(struct rte_ether_hdr);
 
-       ip_hdr = (struct ipv4_hdr *)(rte_pktmbuf_mtod(m, char *) +
+       ip_hdr = (struct rte_ipv4_hdr *)(rte_pktmbuf_mtod(m, char *) +
                        ipdata_offset);
 
-       ipdata_offset += (ip_hdr->version_ihl & IPV4_HDR_IHL_MASK)
-                       * IPV4_IHL_MULTIPLIER;
+       ipdata_offset += (ip_hdr->version_ihl & RTE_IPV4_HDR_IHL_MASK)
+                       * RTE_IPV4_IHL_MULTIPLIER;
 
 
        /* Zero pad data to be crypto'd so it is block aligned */
        data_len  = rte_pktmbuf_data_len(m) - ipdata_offset;
-       pad_len = data_len % cparams->block_size ? cparams->block_size -
-                       (data_len % cparams->block_size) : 0;
 
-       if (pad_len) {
-               padding = rte_pktmbuf_append(m, pad_len);
-               if (unlikely(!padding))
-                       return -1;
+       if ((cparams->do_hash || cparams->do_aead) && cparams->hash_verify)
+               data_len -= cparams->digest_length;
 
-               data_len += pad_len;
-               memset(padding, 0, pad_len);
+       if (cparams->do_cipher) {
+               /*
+                * Following algorithms are block cipher algorithms,
+                * and might need padding
+                */
+               switch (cparams->cipher_algo) {
+               case RTE_CRYPTO_CIPHER_AES_CBC:
+               case RTE_CRYPTO_CIPHER_AES_ECB:
+               case RTE_CRYPTO_CIPHER_DES_CBC:
+               case RTE_CRYPTO_CIPHER_3DES_CBC:
+               case RTE_CRYPTO_CIPHER_3DES_ECB:
+                       if (data_len % cparams->block_size)
+                               pad_len = cparams->block_size -
+                                       (data_len % cparams->block_size);
+                       break;
+               default:
+                       pad_len = 0;
+               }
+
+               if (pad_len) {
+                       padding = rte_pktmbuf_append(m, pad_len);
+                       if (unlikely(!padding))
+                               return -1;
+
+                       data_len += pad_len;
+                       memset(padding, 0, pad_len);
+               }
        }
 
        /* Set crypto operation data parameters */
        rte_crypto_op_attach_sym_session(op, cparams->session);
 
        if (cparams->do_hash) {
+               if (cparams->auth_iv.length) {
+                       uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op,
+                                               uint8_t *,
+                                               IV_OFFSET +
+                                               cparams->cipher_iv.length);
+                       /*
+                        * Copy IV at the end of the crypto operation,
+                        * after the cipher IV, if added
+                        */
+                       rte_memcpy(iv_ptr, cparams->auth_iv.data,
+                                       cparams->auth_iv.length);
+               }
                if (!cparams->hash_verify) {
                        /* Append space for digest to end of packet */
                        op->sym->auth.digest.data = (uint8_t *)rte_pktmbuf_append(m,
                                cparams->digest_length);
                } else {
-                       op->sym->auth.digest.data = (uint8_t *)rte_pktmbuf_append(m,
-                               cparams->digest_length);
+                       op->sym->auth.digest.data = rte_pktmbuf_mtod(m,
+                               uint8_t *) + ipdata_offset + data_len;
                }
 
-               op->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m,
+               op->sym->auth.digest.phys_addr = rte_pktmbuf_iova_offset(m,
                                rte_pktmbuf_pkt_len(m) - cparams->digest_length);
-               op->sym->auth.digest.length = cparams->digest_length;
 
-               /* For SNOW3G/KASUMI algorithms, offset/length must be in bits */
+               /* For wireless algorithms, offset/length must be in bits */
                if (cparams->auth_algo == RTE_CRYPTO_AUTH_SNOW3G_UIA2 ||
-                               cparams->auth_algo == RTE_CRYPTO_AUTH_KASUMI_F9) {
+                               cparams->auth_algo == RTE_CRYPTO_AUTH_KASUMI_F9 ||
+                               cparams->auth_algo == RTE_CRYPTO_AUTH_ZUC_EIA3) {
                        op->sym->auth.data.offset = ipdata_offset << 3;
                        op->sym->auth.data.length = data_len << 3;
                } else {
                        op->sym->auth.data.offset = ipdata_offset;
                        op->sym->auth.data.length = data_len;
                }
-
-               if (cparams->aad.length) {
-                       op->sym->auth.aad.data = cparams->aad.data;
-                       op->sym->auth.aad.phys_addr = cparams->aad.phys_addr;
-                       op->sym->auth.aad.length = cparams->aad.length;
-               }
        }
 
        if (cparams->do_cipher) {
-               op->sym->cipher.iv.data = cparams->iv.data;
-               op->sym->cipher.iv.phys_addr = cparams->iv.phys_addr;
-               op->sym->cipher.iv.length = cparams->iv.length;
+               uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *,
+                                                       IV_OFFSET);
+               /* Copy IV at the end of the crypto operation */
+               rte_memcpy(iv_ptr, cparams->cipher_iv.data,
+                               cparams->cipher_iv.length);
 
-               /* For SNOW3G algorithms, offset/length must be in bits */
+               /* For wireless algorithms, offset/length must be in bits */
                if (cparams->cipher_algo == RTE_CRYPTO_CIPHER_SNOW3G_UEA2 ||
-                               cparams->cipher_algo == RTE_CRYPTO_CIPHER_KASUMI_F8) {
+                               cparams->cipher_algo == RTE_CRYPTO_CIPHER_KASUMI_F8 ||
+                               cparams->cipher_algo == RTE_CRYPTO_CIPHER_ZUC_EEA3) {
                        op->sym->cipher.data.offset = ipdata_offset << 3;
-                       if (cparams->do_hash && cparams->hash_verify)
-                               /* Do not cipher the hash tag */
-                               op->sym->cipher.data.length = (data_len -
-                                       cparams->digest_length) << 3;
-                       else
-                               op->sym->cipher.data.length = data_len << 3;
-
+                       op->sym->cipher.data.length = data_len << 3;
                } else {
                        op->sym->cipher.data.offset = ipdata_offset;
-                       if (cparams->do_hash && cparams->hash_verify)
-                               /* Do not cipher the hash tag */
-                               op->sym->cipher.data.length = data_len -
-                                       cparams->digest_length;
-                       else
-                               op->sym->cipher.data.length = data_len;
+                       op->sym->cipher.data.length = data_len;
+               }
+       }
+
+       if (cparams->do_aead) {
+               uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *,
+                                                       IV_OFFSET);
+               /* Copy IV at the end of the crypto operation */
+               /*
+                * If doing AES-CCM, nonce is copied one byte
+                * after the start of IV field
+                */
+               if (cparams->aead_algo == RTE_CRYPTO_AEAD_AES_CCM)
+                       rte_memcpy(iv_ptr + 1, cparams->aead_iv.data,
+                                       cparams->aead_iv.length);
+               else
+                       rte_memcpy(iv_ptr, cparams->aead_iv.data,
+                                       cparams->aead_iv.length);
+
+               op->sym->aead.data.offset = ipdata_offset;
+               op->sym->aead.data.length = data_len;
+
+               if (!cparams->hash_verify) {
+                       /* Append space for digest to end of packet */
+                       op->sym->aead.digest.data = (uint8_t *)rte_pktmbuf_append(m,
+                               cparams->digest_length);
+               } else {
+                       op->sym->aead.digest.data = rte_pktmbuf_mtod(m,
+                               uint8_t *) + ipdata_offset + data_len;
+               }
+
+               op->sym->aead.digest.phys_addr = rte_pktmbuf_iova_offset(m,
+                               rte_pktmbuf_pkt_len(m) - cparams->digest_length);
+
+               if (cparams->aad.length) {
+                       op->sym->aead.aad.data = cparams->aad.data;
+                       op->sym->aead.aad.phys_addr = cparams->aad.phys_addr;
                }
        }
 
@@ -521,7 +547,7 @@ l2fwd_simple_crypto_enqueue(struct rte_mbuf *m,
 /* Send the burst of packets on an output interface */
 static int
 l2fwd_send_burst(struct lcore_queue_conf *qconf, unsigned n,
-               uint8_t port)
+               uint16_t port)
 {
        struct rte_mbuf **pkt_buffer;
        unsigned ret;
@@ -542,7 +568,7 @@ l2fwd_send_burst(struct lcore_queue_conf *qconf, unsigned n,
 
 /* Enqueue packets for TX and prepare them to be sent */
 static int
-l2fwd_send_packet(struct rte_mbuf *m, uint8_t port)
+l2fwd_send_packet(struct rte_mbuf *m, uint16_t port)
 {
        unsigned lcore_id, len;
        struct lcore_queue_conf *qconf;
@@ -565,42 +591,68 @@ l2fwd_send_packet(struct rte_mbuf *m, uint8_t port)
 }
 
 static void
-l2fwd_simple_forward(struct rte_mbuf *m, unsigned portid)
+l2fwd_mac_updating(struct rte_mbuf *m, uint16_t dest_portid)
 {
-       struct ether_hdr *eth;
+       struct rte_ether_hdr *eth;
        void *tmp;
-       unsigned dst_port;
 
-       dst_port = l2fwd_dst_ports[portid];
-       eth = rte_pktmbuf_mtod(m, struct ether_hdr *);
+       eth = rte_pktmbuf_mtod(m, struct rte_ether_hdr *);
 
        /* 02:00:00:00:00:xx */
        tmp = &eth->d_addr.addr_bytes[0];
-       *((uint64_t *)tmp) = 0x000000000002 + ((uint64_t)dst_port << 40);
+       *((uint64_t *)tmp) = 0x000000000002 + ((uint64_t)dest_portid << 40);
 
        /* src addr */
-       ether_addr_copy(&l2fwd_ports_eth_addr[dst_port], &eth->s_addr);
+       rte_ether_addr_copy(&l2fwd_ports_eth_addr[dest_portid], &eth->s_addr);
+}
 
-       l2fwd_send_packet(m, (uint8_t) dst_port);
+static void
+l2fwd_simple_forward(struct rte_mbuf *m, uint16_t portid,
+               struct l2fwd_crypto_options *options)
+{
+       uint16_t dst_port;
+
+       dst_port = l2fwd_dst_ports[portid];
+
+       if (options->mac_updating)
+               l2fwd_mac_updating(m, dst_port);
+
+       l2fwd_send_packet(m, dst_port);
 }
 
 /** Generate random key */
 static void
 generate_random_key(uint8_t *key, unsigned length)
 {
-       unsigned i;
+       int fd;
+       int ret;
 
-       for (i = 0; i < length; i++)
-               key[i] = rand() % 0xff;
+       fd = open("/dev/urandom", O_RDONLY);
+       if (fd < 0)
+               rte_exit(EXIT_FAILURE, "Failed to generate random key\n");
+
+       ret = read(fd, key, length);
+       close(fd);
+
+       if (ret != (signed)length)
+               rte_exit(EXIT_FAILURE, "Failed to generate random key\n");
 }
 
 static struct rte_cryptodev_sym_session *
-initialize_crypto_session(struct l2fwd_crypto_options *options,
-               uint8_t cdev_id)
+initialize_crypto_session(struct l2fwd_crypto_options *options, uint8_t cdev_id)
 {
        struct rte_crypto_sym_xform *first_xform;
+       struct rte_cryptodev_sym_session *session;
+       int retval = rte_cryptodev_socket_id(cdev_id);
+
+       if (retval < 0)
+               return NULL;
 
-       if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH) {
+       uint8_t socket_id = (uint8_t) retval;
+
+       if (options->xform_chain == L2FWD_CRYPTO_AEAD) {
+               first_xform = &options->aead_xform;
+       } else if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH) {
                first_xform = &options->cipher_xform;
                first_xform->next = &options->auth_xform;
        } else if (options->xform_chain == L2FWD_CRYPTO_HASH_CIPHER) {
@@ -612,8 +664,17 @@ initialize_crypto_session(struct l2fwd_crypto_options *options,
                first_xform = &options->auth_xform;
        }
 
-       /* Setup Cipher Parameters */
-       return rte_cryptodev_sym_session_create(cdev_id, first_xform);
+       session = rte_cryptodev_sym_session_create(
+                       session_pool_socket[socket_id].sess_mp);
+       if (session == NULL)
+               return NULL;
+
+       if (rte_cryptodev_sym_session_init(cdev_id, session,
+                               first_xform,
+                               session_pool_socket[socket_id].priv_mp) < 0)
+               return NULL;
+
+       return session;
 }
 
 static void
@@ -628,12 +689,14 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
 
        unsigned lcore_id = rte_lcore_id();
        uint64_t prev_tsc = 0, diff_tsc, cur_tsc, timer_tsc = 0;
-       unsigned i, j, portid, nb_rx, len;
+       unsigned int i, j, nb_rx, len;
+       uint16_t portid;
        struct lcore_queue_conf *qconf = &lcore_queue_conf[lcore_id];
        const uint64_t drain_tsc = (rte_get_tsc_hz() + US_PER_S - 1) /
                        US_PER_S * BURST_TX_DRAIN_US;
        struct l2fwd_crypto_params *cparams;
        struct l2fwd_crypto_params port_cparams[qconf->nb_crypto_devs];
+       struct rte_cryptodev_sym_session *session;
 
        if (qconf->nb_rx_ports == 0) {
                RTE_LOG(INFO, L2FWD, "lcore %u has nothing to do\n", lcore_id);
@@ -652,8 +715,12 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
        for (i = 0; i < qconf->nb_crypto_devs; i++) {
                port_cparams[i].do_cipher = 0;
                port_cparams[i].do_hash = 0;
+               port_cparams[i].do_aead = 0;
 
                switch (options->xform_chain) {
+               case L2FWD_CRYPTO_AEAD:
+                       port_cparams[i].do_aead = 1;
+                       break;
                case L2FWD_CRYPTO_CIPHER_HASH:
                case L2FWD_CRYPTO_HASH_CIPHER:
                        port_cparams[i].do_cipher = 1;
@@ -673,43 +740,87 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                port_cparams[i].block_size = options->block_size;
 
                if (port_cparams[i].do_hash) {
+                       port_cparams[i].auth_iv.data = options->auth_iv.data;
+                       port_cparams[i].auth_iv.length = options->auth_iv.length;
+                       if (!options->auth_iv_param)
+                               generate_random_key(port_cparams[i].auth_iv.data,
+                                               port_cparams[i].auth_iv.length);
+                       if (options->auth_xform.auth.op == RTE_CRYPTO_AUTH_OP_VERIFY)
+                               port_cparams[i].hash_verify = 1;
+                       else
+                               port_cparams[i].hash_verify = 0;
+
+                       port_cparams[i].auth_algo = options->auth_xform.auth.algo;
                        port_cparams[i].digest_length =
                                        options->auth_xform.auth.digest_length;
-                       if (options->auth_xform.auth.add_auth_data_length) {
+                       /* Set IV parameters */
+                       if (options->auth_iv.length) {
+                               options->auth_xform.auth.iv.offset =
+                                       IV_OFFSET + options->cipher_iv.length;
+                               options->auth_xform.auth.iv.length =
+                                       options->auth_iv.length;
+                       }
+               }
+
+               if (port_cparams[i].do_aead) {
+                       port_cparams[i].aead_iv.data = options->aead_iv.data;
+                       port_cparams[i].aead_iv.length = options->aead_iv.length;
+                       if (!options->aead_iv_param)
+                               generate_random_key(port_cparams[i].aead_iv.data,
+                                               port_cparams[i].aead_iv.length);
+                       port_cparams[i].aead_algo = options->aead_xform.aead.algo;
+                       port_cparams[i].digest_length =
+                                       options->aead_xform.aead.digest_length;
+                       if (options->aead_xform.aead.aad_length) {
                                port_cparams[i].aad.data = options->aad.data;
-                               port_cparams[i].aad.length =
-                                       options->auth_xform.auth.add_auth_data_length;
                                port_cparams[i].aad.phys_addr = options->aad.phys_addr;
+                               port_cparams[i].aad.length = options->aad.length;
                                if (!options->aad_param)
                                        generate_random_key(port_cparams[i].aad.data,
                                                port_cparams[i].aad.length);
+                               /*
+                                * If doing AES-CCM, first 18 bytes has to be reserved,
+                                * and actual AAD should start from byte 18
+                                */
+                               if (port_cparams[i].aead_algo == RTE_CRYPTO_AEAD_AES_CCM)
+                                       memmove(port_cparams[i].aad.data + 18,
+                                                       port_cparams[i].aad.data,
+                                                       port_cparams[i].aad.length);
 
-                       }
+                       } else
+                               port_cparams[i].aad.length = 0;
 
-                       if (options->auth_xform.auth.op == RTE_CRYPTO_AUTH_OP_VERIFY)
+                       if (options->aead_xform.aead.op == RTE_CRYPTO_AEAD_OP_DECRYPT)
                                port_cparams[i].hash_verify = 1;
                        else
                                port_cparams[i].hash_verify = 0;
 
-                       port_cparams[i].auth_algo = options->auth_xform.auth.algo;
+                       /* Set IV parameters */
+                       options->aead_xform.aead.iv.offset = IV_OFFSET;
+                       options->aead_xform.aead.iv.length = options->aead_iv.length;
                }
 
                if (port_cparams[i].do_cipher) {
-                       port_cparams[i].iv.data = options->iv.data;
-                       port_cparams[i].iv.length = options->iv.length;
-                       port_cparams[i].iv.phys_addr = options->iv.phys_addr;
-                       if (!options->iv_param)
-                               generate_random_key(port_cparams[i].iv.data,
-                                               port_cparams[i].iv.length);
+                       port_cparams[i].cipher_iv.data = options->cipher_iv.data;
+                       port_cparams[i].cipher_iv.length = options->cipher_iv.length;
+                       if (!options->cipher_iv_param)
+                               generate_random_key(port_cparams[i].cipher_iv.data,
+                                               port_cparams[i].cipher_iv.length);
 
                        port_cparams[i].cipher_algo = options->cipher_xform.cipher.algo;
+                       /* Set IV parameters */
+                       options->cipher_xform.cipher.iv.offset = IV_OFFSET;
+                       options->cipher_xform.cipher.iv.length =
+                                               options->cipher_iv.length;
                }
 
-               port_cparams[i].session = initialize_crypto_session(options,
+               session = initialize_crypto_session(options,
                                port_cparams[i].dev_id);
+               if (session == NULL)
+                       rte_exit(EXIT_FAILURE, "Failed to initialize crypto session\n");
+
+               port_cparams[i].session = session;
 
-               if (port_cparams[i].session == NULL)
-                       return;
                RTE_LOG(INFO, L2FWD, " -- lcoreid=%u cryptoid=%u\n", lcore_id,
                                port_cparams[i].dev_id);
        }
@@ -744,7 +855,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                                        continue;
                                l2fwd_send_burst(&lcore_queue_conf[lcore_id],
                                                 qconf->pkt_buf[portid].len,
-                                                (uint8_t) portid);
+                                                portid);
                                qconf->pkt_buf[portid].len = 0;
                        }
 
@@ -778,7 +889,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
 
                        cparams = &port_cparams[i];
 
-                       nb_rx = rte_eth_rx_burst((uint8_t) portid, 0,
+                       nb_rx = rte_eth_rx_burst(portid, 0,
                                                 pkts_burst, MAX_PKT_BURST);
 
                        port_statistics[portid].rx += nb_rx;
@@ -795,7 +906,7 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                                                ops_burst, nb_rx) !=
                                                                nb_rx) {
                                        for (j = 0; j < nb_rx; j++)
-                                               rte_pktmbuf_free(pkts_burst[i]);
+                                               rte_pktmbuf_free(pkts_burst[j]);
 
                                        nb_rx = 0;
                                }
@@ -823,7 +934,8 @@ l2fwd_main_loop(struct l2fwd_crypto_options *options)
                                        m = ops_burst[j]->sym->m_src;
 
                                        rte_crypto_op_free(ops_burst[j]);
-                                       l2fwd_simple_forward(m, portid);
+                                       l2fwd_simple_forward(m, portid,
+                                                       options);
                                }
                        } while (nb_rx == MAX_PKT_BURST);
                }
@@ -849,24 +961,41 @@ l2fwd_crypto_usage(const char *prgname)
                " (0 to disable, 10 default, 86400 maximum)\n"
 
                "  --cdev_type HW / SW / ANY\n"
-               "  --chain HASH_CIPHER / CIPHER_HASH\n"
+               "  --chain HASH_CIPHER / CIPHER_HASH / CIPHER_ONLY /"
+               " HASH_ONLY / AEAD\n"
 
                "  --cipher_algo ALGO\n"
                "  --cipher_op ENCRYPT / DECRYPT\n"
                "  --cipher_key KEY (bytes separated with \":\")\n"
                "  --cipher_key_random_size SIZE: size of cipher key when generated randomly\n"
-               "  --iv IV (bytes separated with \":\")\n"
-               "  --iv_random_size SIZE: size of IV when generated randomly\n"
+               "  --cipher_iv IV (bytes separated with \":\")\n"
+               "  --cipher_iv_random_size SIZE: size of cipher IV when generated randomly\n"
 
                "  --auth_algo ALGO\n"
                "  --auth_op GENERATE / VERIFY\n"
                "  --auth_key KEY (bytes separated with \":\")\n"
                "  --auth_key_random_size SIZE: size of auth key when generated randomly\n"
+               "  --auth_iv IV (bytes separated with \":\")\n"
+               "  --auth_iv_random_size SIZE: size of auth IV when generated randomly\n"
+
+               "  --aead_algo ALGO\n"
+               "  --aead_op ENCRYPT / DECRYPT\n"
+               "  --aead_key KEY (bytes separated with \":\")\n"
+               "  --aead_key_random_size SIZE: size of AEAD key when generated randomly\n"
+               "  --aead_iv IV (bytes separated with \":\")\n"
+               "  --aead_iv_random_size SIZE: size of AEAD IV when generated randomly\n"
                "  --aad AAD (bytes separated with \":\")\n"
                "  --aad_random_size SIZE: size of AAD when generated randomly\n"
+
                "  --digest_size SIZE: size of digest to be generated/verified\n"
 
-               "  --sessionless\n",
+               "  --sessionless\n"
+               "  --cryptodev_mask MASK: hexadecimal bitmask of crypto devices to configure\n"
+
+               "  --[no-]mac-updating: Enable or disable MAC addresses updating (enabled by default)\n"
+               "      When enabled:\n"
+               "       - The source MAC address is replaced by the TX port MAC address\n"
+               "       - The destination MAC address is replaced by 02:00:00:00:00:TX_PORT_ID\n",
               prgname);
 }
 
@@ -904,6 +1033,9 @@ parse_crypto_opt_chain(struct l2fwd_crypto_options *options, char *optarg)
        } else if (strcmp("HASH_ONLY", optarg) == 0) {
                options->xform_chain = L2FWD_CRYPTO_HASH_ONLY;
                return 0;
+       } else if (strcmp("AEAD", optarg) == 0) {
+               options->xform_chain = L2FWD_CRYPTO_AEAD;
+               return 0;
        }
 
        return -1;
@@ -913,17 +1045,14 @@ parse_crypto_opt_chain(struct l2fwd_crypto_options *options, char *optarg)
 static int
 parse_cipher_algo(enum rte_crypto_cipher_algorithm *algo, char *optarg)
 {
-       unsigned i;
 
-       for (i = 0; i < RTE_CRYPTO_CIPHER_LIST_END; i++) {
-               if (!strcmp(supported_cipher_algo[i], optarg)) {
-                       *algo = (enum rte_crypto_cipher_algorithm)i;
-                       return 0;
-               }
+       if (rte_cryptodev_get_cipher_algo_enum(algo, optarg) < 0) {
+               RTE_LOG(ERR, USER1, "Cipher algorithm specified "
+                               "not supported!\n");
+               return -1;
        }
 
-       printf("Cipher algorithm  not supported!\n");
-       return -1;
+       return 0;
 }
 
 /** Parse crypto cipher operation command line argument */
@@ -942,15 +1071,16 @@ parse_cipher_op(enum rte_crypto_cipher_operation *op, char *optarg)
        return -1;
 }
 
-/** Parse crypto key command line argument */
+/** Parse bytes from command line argument */
 static int
-parse_key(uint8_t *data, char *input_arg)
+parse_bytes(uint8_t *data, char *input_arg, uint16_t max_size)
 {
        unsigned byte_count;
        char *token;
 
+       errno = 0;
        for (byte_count = 0, token = strtok(input_arg, ":");
-                       (byte_count < MAX_KEY_SIZE) && (token != NULL);
+                       (byte_count < max_size) && (token != NULL);
                        token = strtok(NULL, ":")) {
 
                int number = (int)strtol(token, NULL, 16);
@@ -989,17 +1119,13 @@ parse_size(int *size, const char *q_arg)
 static int
 parse_auth_algo(enum rte_crypto_auth_algorithm *algo, char *optarg)
 {
-       unsigned i;
-
-       for (i = 0; i < RTE_CRYPTO_AUTH_LIST_END; i++) {
-               if (!strcmp(supported_auth_algo[i], optarg)) {
-                       *algo = (enum rte_crypto_auth_algorithm)i;
-                       return 0;
-               }
+       if (rte_cryptodev_get_auth_algo_enum(algo, optarg) < 0) {
+               RTE_LOG(ERR, USER1, "Authentication algorithm specified "
+                               "not supported!\n");
+               return -1;
        }
 
-       printf("Authentication algorithm specified not supported!\n");
-       return -1;
+       return 0;
 }
 
 static int
@@ -1017,6 +1143,53 @@ parse_auth_op(enum rte_crypto_auth_operation *op, char *optarg)
        return -1;
 }
 
+static int
+parse_aead_algo(enum rte_crypto_aead_algorithm *algo, char *optarg)
+{
+       if (rte_cryptodev_get_aead_algo_enum(algo, optarg) < 0) {
+               RTE_LOG(ERR, USER1, "AEAD algorithm specified "
+                               "not supported!\n");
+               return -1;
+       }
+
+       return 0;
+}
+
+static int
+parse_aead_op(enum rte_crypto_aead_operation *op, char *optarg)
+{
+       if (strcmp("ENCRYPT", optarg) == 0) {
+               *op = RTE_CRYPTO_AEAD_OP_ENCRYPT;
+               return 0;
+       } else if (strcmp("DECRYPT", optarg) == 0) {
+               *op = RTE_CRYPTO_AEAD_OP_DECRYPT;
+               return 0;
+       }
+
+       printf("AEAD operation specified not supported!\n");
+       return -1;
+}
+static int
+parse_cryptodev_mask(struct l2fwd_crypto_options *options,
+               const char *q_arg)
+{
+       char *end = NULL;
+       uint64_t pm;
+
+       /* parse hexadecimal string */
+       pm = strtoul(q_arg, &end, 16);
+       if ((pm == '\0') || (end == NULL) || (*end != '\0'))
+               pm = 0;
+
+       options->cryptodev_mask = pm;
+       if (options->cryptodev_mask == 0) {
+               printf("invalid cryptodev_mask specified\n");
+               return -1;
+       }
+
+       return 0;
+}
+
 /** Parse long options */
 static int
 l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
@@ -1027,8 +1200,7 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        if (strcmp(lgopts[option_index].name, "cdev_type") == 0) {
                retval = parse_cryptodev_type(&options->type, optarg);
                if (retval == 0)
-                       snprintf(options->string_type, MAX_STR_LEN,
-                               "%s", optarg);
+                       strlcpy(options->string_type, optarg, MAX_STR_LEN);
                return retval;
        }
 
@@ -1047,7 +1219,8 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "cipher_key") == 0) {
                options->ckey_param = 1;
                options->cipher_xform.cipher.key.length =
-                       parse_key(options->cipher_xform.cipher.key.data, optarg);
+                       parse_bytes(options->cipher_xform.cipher.key.data, optarg,
+                                       MAX_KEY_SIZE);
                if (options->cipher_xform.cipher.key.length > 0)
                        return 0;
                else
@@ -1057,18 +1230,18 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "cipher_key_random_size") == 0)
                return parse_size(&options->ckey_random_size, optarg);
 
-       else if (strcmp(lgopts[option_index].name, "iv") == 0) {
-               options->iv_param = 1;
-               options->iv.length =
-                       parse_key(options->iv.data, optarg);
-               if (options->iv.length > 0)
+       else if (strcmp(lgopts[option_index].name, "cipher_iv") == 0) {
+               options->cipher_iv_param = 1;
+               options->cipher_iv.length =
+                       parse_bytes(options->cipher_iv.data, optarg, MAX_IV_SIZE);
+               if (options->cipher_iv.length > 0)
                        return 0;
                else
                        return -1;
        }
 
-       else if (strcmp(lgopts[option_index].name, "iv_random_size") == 0)
-               return parse_size(&options->iv_random_size, optarg);
+       else if (strcmp(lgopts[option_index].name, "cipher_iv_random_size") == 0)
+               return parse_size(&options->cipher_iv_random_size, optarg);
 
        /* Authentication options */
        else if (strcmp(lgopts[option_index].name, "auth_algo") == 0) {
@@ -1083,7 +1256,8 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "auth_key") == 0) {
                options->akey_param = 1;
                options->auth_xform.auth.key.length =
-                       parse_key(options->auth_xform.auth.key.data, optarg);
+                       parse_bytes(options->auth_xform.auth.key.data, optarg,
+                                       MAX_KEY_SIZE);
                if (options->auth_xform.auth.key.length > 0)
                        return 0;
                else
@@ -1094,10 +1268,61 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
                return parse_size(&options->akey_random_size, optarg);
        }
 
+       else if (strcmp(lgopts[option_index].name, "auth_iv") == 0) {
+               options->auth_iv_param = 1;
+               options->auth_iv.length =
+                       parse_bytes(options->auth_iv.data, optarg, MAX_IV_SIZE);
+               if (options->auth_iv.length > 0)
+                       return 0;
+               else
+                       return -1;
+       }
+
+       else if (strcmp(lgopts[option_index].name, "auth_iv_random_size") == 0)
+               return parse_size(&options->auth_iv_random_size, optarg);
+
+       /* AEAD options */
+       else if (strcmp(lgopts[option_index].name, "aead_algo") == 0) {
+               return parse_aead_algo(&options->aead_xform.aead.algo,
+                               optarg);
+       }
+
+       else if (strcmp(lgopts[option_index].name, "aead_op") == 0)
+               return parse_aead_op(&options->aead_xform.aead.op,
+                               optarg);
+
+       else if (strcmp(lgopts[option_index].name, "aead_key") == 0) {
+               options->aead_key_param = 1;
+               options->aead_xform.aead.key.length =
+                       parse_bytes(options->aead_xform.aead.key.data, optarg,
+                                       MAX_KEY_SIZE);
+               if (options->aead_xform.aead.key.length > 0)
+                       return 0;
+               else
+                       return -1;
+       }
+
+       else if (strcmp(lgopts[option_index].name, "aead_key_random_size") == 0)
+               return parse_size(&options->aead_key_random_size, optarg);
+
+
+       else if (strcmp(lgopts[option_index].name, "aead_iv") == 0) {
+               options->aead_iv_param = 1;
+               options->aead_iv.length =
+                       parse_bytes(options->aead_iv.data, optarg, MAX_IV_SIZE);
+               if (options->aead_iv.length > 0)
+                       return 0;
+               else
+                       return -1;
+       }
+
+       else if (strcmp(lgopts[option_index].name, "aead_iv_random_size") == 0)
+               return parse_size(&options->aead_iv_random_size, optarg);
+
        else if (strcmp(lgopts[option_index].name, "aad") == 0) {
                options->aad_param = 1;
                options->aad.length =
-                       parse_key(options->aad.data, optarg);
+                       parse_bytes(options->aad.data, optarg, MAX_AAD_SIZE);
                if (options->aad.length > 0)
                        return 0;
                else
@@ -1117,6 +1342,19 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
                return 0;
        }
 
+       else if (strcmp(lgopts[option_index].name, "cryptodev_mask") == 0)
+               return parse_cryptodev_mask(options, optarg);
+
+       else if (strcmp(lgopts[option_index].name, "mac-updating") == 0) {
+               options->mac_updating = 1;
+               return 0;
+       }
+
+       else if (strcmp(lgopts[option_index].name, "no-mac-updating") == 0) {
+               options->mac_updating = 0;
+               return 0;
+       }
+
        return -1;
 }
 
@@ -1195,8 +1433,6 @@ l2fwd_crypto_parse_timer_period(struct l2fwd_crypto_options *options,
 static void
 l2fwd_crypto_default_options(struct l2fwd_crypto_options *options)
 {
-       srand(time(NULL));
-
        options->portmask = 0xffffffff;
        options->nb_ports_per_lcore = 1;
        options->refresh_period = 10000;
@@ -1211,9 +1447,9 @@ l2fwd_crypto_default_options(struct l2fwd_crypto_options *options)
        options->ckey_param = 0;
        options->ckey_random_size = -1;
        options->cipher_xform.cipher.key.length = 0;
-       options->iv_param = 0;
-       options->iv_random_size = -1;
-       options->iv.length = 0;
+       options->cipher_iv_param = 0;
+       options->cipher_iv_random_size = -1;
+       options->cipher_iv.length = 0;
 
        options->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
        options->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
@@ -1224,15 +1460,36 @@ l2fwd_crypto_default_options(struct l2fwd_crypto_options *options)
        options->akey_param = 0;
        options->akey_random_size = -1;
        options->auth_xform.auth.key.length = 0;
+       options->auth_iv_param = 0;
+       options->auth_iv_random_size = -1;
+       options->auth_iv.length = 0;
+
+       options->auth_xform.auth.algo = RTE_CRYPTO_AUTH_SHA1_HMAC;
+       options->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
+
+       /* AEAD Data */
+       options->aead_xform.type = RTE_CRYPTO_SYM_XFORM_AEAD;
+       options->aead_xform.next = NULL;
+       options->aead_key_param = 0;
+       options->aead_key_random_size = -1;
+       options->aead_xform.aead.key.length = 0;
+       options->aead_iv_param = 0;
+       options->aead_iv_random_size = -1;
+       options->aead_iv.length = 0;
+
+       options->aead_xform.aead.algo = RTE_CRYPTO_AEAD_AES_GCM;
+       options->aead_xform.aead.op = RTE_CRYPTO_AEAD_OP_ENCRYPT;
+
        options->aad_param = 0;
        options->aad_random_size = -1;
        options->aad.length = 0;
-       options->digest_size = -1;
 
-       options->auth_xform.auth.algo = RTE_CRYPTO_AUTH_SHA1_HMAC;
-       options->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
+       options->digest_size = -1;
 
        options->type = CDEV_TYPE_ANY;
+       options->cryptodev_mask = UINT64_MAX;
+
+       options->mac_updating = 1;
 }
 
 static void
@@ -1240,11 +1497,11 @@ display_cipher_info(struct l2fwd_crypto_options *options)
 {
        printf("\n---- Cipher information ---\n");
        printf("Algorithm: %s\n",
-               supported_cipher_algo[options->cipher_xform.cipher.algo]);
+               rte_crypto_cipher_algorithm_strings[options->cipher_xform.cipher.algo]);
        rte_hexdump(stdout, "Cipher key:",
                        options->cipher_xform.cipher.key.data,
                        options->cipher_xform.cipher.key.length);
-       rte_hexdump(stdout, "IV:", options->iv.data, options->iv.length);
+       rte_hexdump(stdout, "IV:", options->cipher_iv.data, options->cipher_iv.length);
 }
 
 static void
@@ -1252,10 +1509,23 @@ display_auth_info(struct l2fwd_crypto_options *options)
 {
        printf("\n---- Authentication information ---\n");
        printf("Algorithm: %s\n",
-               supported_auth_algo[options->auth_xform.auth.algo]);
+               rte_crypto_auth_algorithm_strings[options->auth_xform.auth.algo]);
        rte_hexdump(stdout, "Auth key:",
                        options->auth_xform.auth.key.data,
                        options->auth_xform.auth.key.length);
+       rte_hexdump(stdout, "IV:", options->auth_iv.data, options->auth_iv.length);
+}
+
+static void
+display_aead_info(struct l2fwd_crypto_options *options)
+{
+       printf("\n---- AEAD information ---\n");
+       printf("Algorithm: %s\n",
+               rte_crypto_aead_algorithm_strings[options->aead_xform.aead.algo]);
+       rte_hexdump(stdout, "AEAD key:",
+                       options->aead_xform.aead.key.data,
+                       options->aead_xform.aead.key.length);
+       rte_hexdump(stdout, "IV:", options->aead_iv.data, options->aead_iv.length);
        rte_hexdump(stdout, "AAD:", options->aad.data, options->aad.length);
 }
 
@@ -1264,6 +1534,7 @@ l2fwd_crypto_options_print(struct l2fwd_crypto_options *options)
 {
        char string_cipher_op[MAX_STR_LEN];
        char string_auth_op[MAX_STR_LEN];
+       char string_aead_op[MAX_STR_LEN];
 
        if (options->cipher_xform.cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)
                strcpy(string_cipher_op, "Encrypt");
@@ -1275,6 +1546,12 @@ l2fwd_crypto_options_print(struct l2fwd_crypto_options *options)
        else
                strcpy(string_auth_op, "Auth verify");
 
+       if (options->aead_xform.aead.op == RTE_CRYPTO_AEAD_OP_ENCRYPT)
+               strcpy(string_aead_op, "Authenticated encryption");
+       else
+               strcpy(string_aead_op, "Authenticated decryption");
+
+
        printf("Options:-\nn");
        printf("portmask: %x\n", options->portmask);
        printf("ports per lcore: %u\n", options->nb_ports_per_lcore);
@@ -1293,14 +1570,21 @@ l2fwd_crypto_options_print(struct l2fwd_crypto_options *options)
        if (options->akey_param && (options->akey_random_size != -1))
                printf("Auth key already parsed, ignoring size of random key\n");
 
-       if (options->iv_param && (options->iv_random_size != -1))
-               printf("IV already parsed, ignoring size of random IV\n");
+       if (options->cipher_iv_param && (options->cipher_iv_random_size != -1))
+               printf("Cipher IV already parsed, ignoring size of random IV\n");
+
+       if (options->auth_iv_param && (options->auth_iv_random_size != -1))
+               printf("Auth IV already parsed, ignoring size of random IV\n");
 
        if (options->aad_param && (options->aad_random_size != -1))
                printf("AAD already parsed, ignoring size of random AAD\n");
 
        printf("\nCrypto chain: ");
        switch (options->xform_chain) {
+       case L2FWD_CRYPTO_AEAD:
+               printf("Input --> %s --> Output\n", string_aead_op);
+               display_aead_info(options);
+               break;
        case L2FWD_CRYPTO_CIPHER_HASH:
                printf("Input --> %s --> %s --> Output\n",
                        string_cipher_op, string_auth_op);
@@ -1342,26 +1626,40 @@ l2fwd_crypto_parse_args(struct l2fwd_crypto_options *options,
                        { "cipher_op", required_argument, 0, 0 },
                        { "cipher_key", required_argument, 0, 0 },
                        { "cipher_key_random_size", required_argument, 0, 0 },
+                       { "cipher_iv", required_argument, 0, 0 },
+                       { "cipher_iv_random_size", required_argument, 0, 0 },
 
                        { "auth_algo", required_argument, 0, 0 },
                        { "auth_op", required_argument, 0, 0 },
                        { "auth_key", required_argument, 0, 0 },
                        { "auth_key_random_size", required_argument, 0, 0 },
+                       { "auth_iv", required_argument, 0, 0 },
+                       { "auth_iv_random_size", required_argument, 0, 0 },
+
+                       { "aead_algo", required_argument, 0, 0 },
+                       { "aead_op", required_argument, 0, 0 },
+                       { "aead_key", required_argument, 0, 0 },
+                       { "aead_key_random_size", required_argument, 0, 0 },
+                       { "aead_iv", required_argument, 0, 0 },
+                       { "aead_iv_random_size", required_argument, 0, 0 },
 
-                       { "iv", required_argument, 0, 0 },
-                       { "iv_random_size", required_argument, 0, 0 },
                        { "aad", required_argument, 0, 0 },
                        { "aad_random_size", required_argument, 0, 0 },
+
                        { "digest_size", required_argument, 0, 0 },
 
                        { "sessionless", no_argument, 0, 0 },
+                       { "cryptodev_mask", required_argument, 0, 0},
+
+                       { "mac-updating", no_argument, 0, 0},
+                       { "no-mac-updating", no_argument, 0, 0},
 
                        { NULL, 0, 0, 0 }
        };
 
        l2fwd_crypto_default_options(options);
 
-       while ((opt = getopt_long(argc, argvopt, "p:q:st:", lgopts,
+       while ((opt = getopt_long(argc, argvopt, "p:q:sT:", lgopts,
                        &option_index)) != EOF) {
                switch (opt) {
                /* long options */
@@ -1419,25 +1717,26 @@ l2fwd_crypto_parse_args(struct l2fwd_crypto_options *options,
                argv[optind-1] = prgname;
 
        retval = optind-1;
-       optind = 0; /* reset getopt lib */
+       optind = 1; /* reset getopt lib */
 
        return retval;
 }
 
 /* Check the link status of all ports in up to 9s, and print them finally */
 static void
-check_all_ports_link_status(uint8_t port_num, uint32_t port_mask)
+check_all_ports_link_status(uint32_t port_mask)
 {
 #define CHECK_INTERVAL 100 /* 100ms */
 #define MAX_CHECK_TIME 90 /* 9s (90 * 100ms) in total */
-       uint8_t portid, count, all_ports_up, print_flag = 0;
+       uint16_t portid;
+       uint8_t count, all_ports_up, print_flag = 0;
        struct rte_eth_link link;
 
        printf("\nChecking link status");
        fflush(stdout);
        for (count = 0; count <= MAX_CHECK_TIME; count++) {
                all_ports_up = 1;
-               for (portid = 0; portid < port_num; portid++) {
+               RTE_ETH_FOREACH_DEV(portid) {
                        if ((port_mask & (1 << portid)) == 0)
                                continue;
                        memset(&link, 0, sizeof(link));
@@ -1445,14 +1744,13 @@ check_all_ports_link_status(uint8_t port_num, uint32_t port_mask)
                        /* print link status if flag set */
                        if (print_flag == 1) {
                                if (link.link_status)
-                                       printf("Port %d Link Up - speed %u "
-                                               "Mbps - %s\n", (uint8_t)portid,
-                                               (unsigned)link.link_speed,
+                                       printf(
+                                       "Port%d Link Up. Speed %u Mbps - %s\n",
+                                               portid, link.link_speed,
                                (link.link_duplex == ETH_LINK_FULL_DUPLEX) ?
                                        ("full-duplex") : ("half-duplex\n"));
                                else
-                                       printf("Port %d Link Down\n",
-                                               (uint8_t)portid);
+                                       printf("Port %d Link Down\n", portid);
                                continue;
                        }
                        /* clear all_ports_up flag if any link down */
@@ -1481,7 +1779,8 @@ check_all_ports_link_status(uint8_t port_num, uint32_t port_mask)
 
 /* Check if device has to be HW/SW or any */
 static int
-check_type(struct l2fwd_crypto_options *options, struct rte_cryptodev_info *dev_info)
+check_type(const struct l2fwd_crypto_options *options,
+               const struct rte_cryptodev_info *dev_info)
 {
        if (options->type == CDEV_TYPE_HW &&
                        (dev_info->feature_flags & RTE_CRYPTODEV_FF_HW_ACCELERATED))
@@ -1495,6 +1794,119 @@ check_type(struct l2fwd_crypto_options *options, struct rte_cryptodev_info *dev_
        return -1;
 }
 
+static const struct rte_cryptodev_capabilities *
+check_device_support_cipher_algo(const struct l2fwd_crypto_options *options,
+               const struct rte_cryptodev_info *dev_info,
+               uint8_t cdev_id)
+{
+       unsigned int i = 0;
+       const struct rte_cryptodev_capabilities *cap = &dev_info->capabilities[0];
+       enum rte_crypto_cipher_algorithm cap_cipher_algo;
+       enum rte_crypto_cipher_algorithm opt_cipher_algo =
+                                       options->cipher_xform.cipher.algo;
+
+       while (cap->op != RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               cap_cipher_algo = cap->sym.cipher.algo;
+               if (cap->sym.xform_type == RTE_CRYPTO_SYM_XFORM_CIPHER) {
+                       if (cap_cipher_algo == opt_cipher_algo) {
+                               if (check_type(options, dev_info) == 0)
+                                       break;
+                       }
+               }
+               cap = &dev_info->capabilities[++i];
+       }
+
+       if (cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               printf("Algorithm %s not supported by cryptodev %u"
+                       " or device not of preferred type (%s)\n",
+                       rte_crypto_cipher_algorithm_strings[opt_cipher_algo],
+                       cdev_id,
+                       options->string_type);
+               return NULL;
+       }
+
+       return cap;
+}
+
+static const struct rte_cryptodev_capabilities *
+check_device_support_auth_algo(const struct l2fwd_crypto_options *options,
+               const struct rte_cryptodev_info *dev_info,
+               uint8_t cdev_id)
+{
+       unsigned int i = 0;
+       const struct rte_cryptodev_capabilities *cap = &dev_info->capabilities[0];
+       enum rte_crypto_auth_algorithm cap_auth_algo;
+       enum rte_crypto_auth_algorithm opt_auth_algo =
+                                       options->auth_xform.auth.algo;
+
+       while (cap->op != RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               cap_auth_algo = cap->sym.auth.algo;
+               if (cap->sym.xform_type == RTE_CRYPTO_SYM_XFORM_AUTH) {
+                       if (cap_auth_algo == opt_auth_algo) {
+                               if (check_type(options, dev_info) == 0)
+                                       break;
+                       }
+               }
+               cap = &dev_info->capabilities[++i];
+       }
+
+       if (cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               printf("Algorithm %s not supported by cryptodev %u"
+                       " or device not of preferred type (%s)\n",
+                       rte_crypto_auth_algorithm_strings[opt_auth_algo],
+                       cdev_id,
+                       options->string_type);
+               return NULL;
+       }
+
+       return cap;
+}
+
+static const struct rte_cryptodev_capabilities *
+check_device_support_aead_algo(const struct l2fwd_crypto_options *options,
+               const struct rte_cryptodev_info *dev_info,
+               uint8_t cdev_id)
+{
+       unsigned int i = 0;
+       const struct rte_cryptodev_capabilities *cap = &dev_info->capabilities[0];
+       enum rte_crypto_aead_algorithm cap_aead_algo;
+       enum rte_crypto_aead_algorithm opt_aead_algo =
+                                       options->aead_xform.aead.algo;
+
+       while (cap->op != RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               cap_aead_algo = cap->sym.aead.algo;
+               if (cap->sym.xform_type == RTE_CRYPTO_SYM_XFORM_AEAD) {
+                       if (cap_aead_algo == opt_aead_algo) {
+                               if (check_type(options, dev_info) == 0)
+                                       break;
+                       }
+               }
+               cap = &dev_info->capabilities[++i];
+       }
+
+       if (cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               printf("Algorithm %s not supported by cryptodev %u"
+                       " or device not of preferred type (%s)\n",
+                       rte_crypto_aead_algorithm_strings[opt_aead_algo],
+                       cdev_id,
+                       options->string_type);
+               return NULL;
+       }
+
+       return cap;
+}
+
+/* Check if the device is enabled by cryptodev_mask */
+static int
+check_cryptodev_mask(struct l2fwd_crypto_options *options,
+               uint8_t cdev_id)
+{
+       if (options->cryptodev_mask & (1 << cdev_id))
+               return 0;
+
+       return -1;
+}
+
 static inline int
 check_supported_size(uint16_t length, uint16_t min, uint16_t max,
                uint16_t increment)
@@ -1517,16 +1929,288 @@ check_supported_size(uint16_t length, uint16_t min, uint16_t max,
 
        return -1;
 }
+
+static int
+check_iv_param(const struct rte_crypto_param_range *iv_range_size,
+               unsigned int iv_param, int iv_random_size,
+               uint16_t iv_length)
+{
+       /*
+        * Check if length of provided IV is supported
+        * by the algorithm chosen.
+        */
+       if (iv_param) {
+               if (check_supported_size(iv_length,
+                               iv_range_size->min,
+                               iv_range_size->max,
+                               iv_range_size->increment)
+                                       != 0)
+                       return -1;
+       /*
+        * Check if length of IV to be randomly generated
+        * is supported by the algorithm chosen.
+        */
+       } else if (iv_random_size != -1) {
+               if (check_supported_size(iv_random_size,
+                               iv_range_size->min,
+                               iv_range_size->max,
+                               iv_range_size->increment)
+                                       != 0)
+                       return -1;
+       }
+
+       return 0;
+}
+
+static int
+check_capabilities(struct l2fwd_crypto_options *options, uint8_t cdev_id)
+{
+       struct rte_cryptodev_info dev_info;
+       const struct rte_cryptodev_capabilities *cap;
+
+       rte_cryptodev_info_get(cdev_id, &dev_info);
+
+       /* Set AEAD parameters */
+       if (options->xform_chain == L2FWD_CRYPTO_AEAD) {
+               /* Check if device supports AEAD algo */
+               cap = check_device_support_aead_algo(options, &dev_info,
+                                               cdev_id);
+               if (cap == NULL)
+                       return -1;
+
+               if (check_iv_param(&cap->sym.aead.iv_size,
+                               options->aead_iv_param,
+                               options->aead_iv_random_size,
+                               options->aead_iv.length) != 0) {
+                       RTE_LOG(DEBUG, USER1,
+                               "Device %u does not support IV length\n",
+                               cdev_id);
+                       return -1;
+               }
+
+               /*
+                * Check if length of provided AEAD key is supported
+                * by the algorithm chosen.
+                */
+               if (options->aead_key_param) {
+                       if (check_supported_size(
+                                       options->aead_xform.aead.key.length,
+                                       cap->sym.aead.key_size.min,
+                                       cap->sym.aead.key_size.max,
+                                       cap->sym.aead.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "AEAD key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               /*
+                * Check if length of the aead key to be randomly generated
+                * is supported by the algorithm chosen.
+                */
+               } else if (options->aead_key_random_size != -1) {
+                       if (check_supported_size(options->aead_key_random_size,
+                                       cap->sym.aead.key_size.min,
+                                       cap->sym.aead.key_size.max,
+                                       cap->sym.aead.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "AEAD key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+
+
+               /*
+                * Check if length of provided AAD is supported
+                * by the algorithm chosen.
+                */
+               if (options->aad_param) {
+                       if (check_supported_size(options->aad.length,
+                                       cap->sym.aead.aad_size.min,
+                                       cap->sym.aead.aad_size.max,
+                                       cap->sym.aead.aad_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "AAD length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               /*
+                * Check if length of AAD to be randomly generated
+                * is supported by the algorithm chosen.
+                */
+               } else if (options->aad_random_size != -1) {
+                       if (check_supported_size(options->aad_random_size,
+                                       cap->sym.aead.aad_size.min,
+                                       cap->sym.aead.aad_size.max,
+                                       cap->sym.aead.aad_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "AAD length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+
+               /* Check if digest size is supported by the algorithm. */
+               if (options->digest_size != -1) {
+                       if (check_supported_size(options->digest_size,
+                                       cap->sym.aead.digest_size.min,
+                                       cap->sym.aead.digest_size.max,
+                                       cap->sym.aead.digest_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "digest length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+       }
+
+       /* Set cipher parameters */
+       if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH ||
+                       options->xform_chain == L2FWD_CRYPTO_HASH_CIPHER ||
+                       options->xform_chain == L2FWD_CRYPTO_CIPHER_ONLY) {
+               /* Check if device supports cipher algo */
+               cap = check_device_support_cipher_algo(options, &dev_info,
+                                               cdev_id);
+               if (cap == NULL)
+                       return -1;
+
+               if (check_iv_param(&cap->sym.cipher.iv_size,
+                               options->cipher_iv_param,
+                               options->cipher_iv_random_size,
+                               options->cipher_iv.length) != 0) {
+                       RTE_LOG(DEBUG, USER1,
+                               "Device %u does not support IV length\n",
+                               cdev_id);
+                       return -1;
+               }
+
+               /*
+                * Check if length of provided cipher key is supported
+                * by the algorithm chosen.
+                */
+               if (options->ckey_param) {
+                       if (check_supported_size(
+                                       options->cipher_xform.cipher.key.length,
+                                       cap->sym.cipher.key_size.min,
+                                       cap->sym.cipher.key_size.max,
+                                       cap->sym.cipher.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support cipher "
+                                       "key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               /*
+                * Check if length of the cipher key to be randomly generated
+                * is supported by the algorithm chosen.
+                */
+               } else if (options->ckey_random_size != -1) {
+                       if (check_supported_size(options->ckey_random_size,
+                                       cap->sym.cipher.key_size.min,
+                                       cap->sym.cipher.key_size.max,
+                                       cap->sym.cipher.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support cipher "
+                                       "key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+       }
+
+       /* Set auth parameters */
+       if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH ||
+                       options->xform_chain == L2FWD_CRYPTO_HASH_CIPHER ||
+                       options->xform_chain == L2FWD_CRYPTO_HASH_ONLY) {
+               /* Check if device supports auth algo */
+               cap = check_device_support_auth_algo(options, &dev_info,
+                                               cdev_id);
+               if (cap == NULL)
+                       return -1;
+
+               if (check_iv_param(&cap->sym.auth.iv_size,
+                               options->auth_iv_param,
+                               options->auth_iv_random_size,
+                               options->auth_iv.length) != 0) {
+                       RTE_LOG(DEBUG, USER1,
+                               "Device %u does not support IV length\n",
+                               cdev_id);
+                       return -1;
+               }
+               /*
+                * Check if length of provided auth key is supported
+                * by the algorithm chosen.
+                */
+               if (options->akey_param) {
+                       if (check_supported_size(
+                                       options->auth_xform.auth.key.length,
+                                       cap->sym.auth.key_size.min,
+                                       cap->sym.auth.key_size.max,
+                                       cap->sym.auth.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support auth "
+                                       "key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               /*
+                * Check if length of the auth key to be randomly generated
+                * is supported by the algorithm chosen.
+                */
+               } else if (options->akey_random_size != -1) {
+                       if (check_supported_size(options->akey_random_size,
+                                       cap->sym.auth.key_size.min,
+                                       cap->sym.auth.key_size.max,
+                                       cap->sym.auth.key_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support auth "
+                                       "key length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+
+               /* Check if digest size is supported by the algorithm. */
+               if (options->digest_size != -1) {
+                       if (check_supported_size(options->digest_size,
+                                       cap->sym.auth.digest_size.min,
+                                       cap->sym.auth.digest_size.max,
+                                       cap->sym.auth.digest_size.increment)
+                                               != 0) {
+                               RTE_LOG(DEBUG, USER1,
+                                       "Device %u does not support "
+                                       "digest length\n",
+                                       cdev_id);
+                               return -1;
+                       }
+               }
+       }
+
+       return 0;
+}
+
 static int
 initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                uint8_t *enabled_cdevs)
 {
-       unsigned i, cdev_id, cdev_count, enabled_cdev_count = 0;
+       uint8_t cdev_id, cdev_count, enabled_cdev_count = 0;
        const struct rte_cryptodev_capabilities *cap;
-       enum rte_crypto_auth_algorithm cap_auth_algo;
-       enum rte_crypto_auth_algorithm opt_auth_algo;
-       enum rte_crypto_cipher_algorithm cap_cipher_algo;
-       enum rte_crypto_cipher_algorithm opt_cipher_algo;
+       unsigned int sess_sz, max_sess_sz = 0;
+       uint32_t sessions_needed = 0;
        int retval;
 
        cdev_count = rte_cryptodev_count();
@@ -1537,237 +2221,236 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
 
        for (cdev_id = 0; cdev_id < cdev_count && enabled_cdev_count < nb_ports;
                        cdev_id++) {
+               if (check_cryptodev_mask(options, cdev_id) < 0)
+                       continue;
+
+               if (check_capabilities(options, cdev_id) < 0)
+                       continue;
+
+               sess_sz = rte_cryptodev_sym_get_private_session_size(cdev_id);
+               if (sess_sz > max_sess_sz)
+                       max_sess_sz = sess_sz;
+
+               l2fwd_enabled_crypto_mask |= (((uint64_t)1) << cdev_id);
+
+               enabled_cdevs[cdev_id] = 1;
+               enabled_cdev_count++;
+       }
+
+       for (cdev_id = 0; cdev_id < cdev_count; cdev_id++) {
                struct rte_cryptodev_qp_conf qp_conf;
                struct rte_cryptodev_info dev_info;
 
+               if (enabled_cdevs[cdev_id] == 0)
+                       continue;
+
+               retval = rte_cryptodev_socket_id(cdev_id);
+
+               if (retval < 0) {
+                       printf("Invalid crypto device id used\n");
+                       return -1;
+               }
+
+               uint8_t socket_id = (uint8_t) retval;
+
                struct rte_cryptodev_config conf = {
                        .nb_queue_pairs = 1,
-                       .socket_id = SOCKET_ID_ANY,
-                       .session_mp = {
-                               .nb_objs = 2048,
-                               .cache_size = 64
-                       }
+                       .socket_id = socket_id,
                };
 
                rte_cryptodev_info_get(cdev_id, &dev_info);
 
+               /*
+                * Two sessions objects are required for each session
+                * (one for the header, one for the private data)
+                */
+               if (!strcmp(dev_info.driver_name, "crypto_scheduler")) {
+#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
+                       uint32_t nb_slaves =
+                               rte_cryptodev_scheduler_slaves_get(cdev_id,
+                                                               NULL);
+
+                       sessions_needed = enabled_cdev_count * nb_slaves;
+#endif
+               } else
+                       sessions_needed = enabled_cdev_count;
+
+               if (session_pool_socket[socket_id].priv_mp == NULL) {
+                       char mp_name[RTE_MEMPOOL_NAMESIZE];
+
+                       snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
+                               "priv_sess_mp_%u", socket_id);
+
+                       session_pool_socket[socket_id].priv_mp =
+                                       rte_mempool_create(mp_name,
+                                               sessions_needed,
+                                               max_sess_sz,
+                                               0, 0, NULL, NULL, NULL,
+                                               NULL, socket_id,
+                                               0);
+
+                       if (session_pool_socket[socket_id].priv_mp == NULL) {
+                               printf("Cannot create pool on socket %d\n",
+                                       socket_id);
+                               return -ENOMEM;
+                       }
+
+                       printf("Allocated pool \"%s\" on socket %d\n",
+                               mp_name, socket_id);
+               }
+
+               if (session_pool_socket[socket_id].sess_mp == NULL) {
+                       char mp_name[RTE_MEMPOOL_NAMESIZE];
+                       snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
+                               "sess_mp_%u", socket_id);
+
+                       session_pool_socket[socket_id].sess_mp =
+                                       rte_cryptodev_sym_session_pool_create(
+                                                       mp_name,
+                                                       sessions_needed,
+                                                       0, 0, 0, socket_id);
+
+                       if (session_pool_socket[socket_id].sess_mp == NULL) {
+                               printf("Cannot create pool on socket %d\n",
+                                       socket_id);
+                               return -ENOMEM;
+                       }
+
+                       printf("Allocated pool \"%s\" on socket %d\n",
+                               mp_name, socket_id);
+               }
+
+               /* Set AEAD parameters */
+               if (options->xform_chain == L2FWD_CRYPTO_AEAD) {
+                       cap = check_device_support_aead_algo(options, &dev_info,
+                                                       cdev_id);
+
+                       options->block_size = cap->sym.aead.block_size;
+
+                       /* Set IV if not provided from command line */
+                       if (options->aead_iv_param == 0) {
+                               if (options->aead_iv_random_size != -1)
+                                       options->aead_iv.length =
+                                               options->aead_iv_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->aead_iv.length =
+                                               cap->sym.aead.iv_size.min;
+                       }
+
+                       /* Set key if not provided from command line */
+                       if (options->aead_key_param == 0) {
+                               if (options->aead_key_random_size != -1)
+                                       options->aead_xform.aead.key.length =
+                                               options->aead_key_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->aead_xform.aead.key.length =
+                                               cap->sym.aead.key_size.min;
+
+                               generate_random_key(
+                                       options->aead_xform.aead.key.data,
+                                       options->aead_xform.aead.key.length);
+                       }
+
+                       /* Set AAD if not provided from command line */
+                       if (options->aad_param == 0) {
+                               if (options->aad_random_size != -1)
+                                       options->aad.length =
+                                               options->aad_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->aad.length =
+                                               cap->sym.auth.aad_size.min;
+                       }
+
+                       options->aead_xform.aead.aad_length =
+                                               options->aad.length;
+
+                       /* Set digest size if not provided from command line */
+                       if (options->digest_size != -1)
+                               options->aead_xform.aead.digest_length =
+                                                       options->digest_size;
+                               /* No size provided, use minimum size. */
+                       else
+                               options->aead_xform.aead.digest_length =
+                                               cap->sym.aead.digest_size.min;
+               }
+
                /* Set cipher parameters */
                if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH ||
                                options->xform_chain == L2FWD_CRYPTO_HASH_CIPHER ||
                                options->xform_chain == L2FWD_CRYPTO_CIPHER_ONLY) {
-                       /* Check if device supports cipher algo */
-                       i = 0;
-                       opt_cipher_algo = options->cipher_xform.cipher.algo;
-                       cap = &dev_info.capabilities[i];
-                       while (cap->op != RTE_CRYPTO_OP_TYPE_UNDEFINED) {
-                               cap_cipher_algo = cap->sym.cipher.algo;
-                               if (cap->sym.xform_type ==
-                                               RTE_CRYPTO_SYM_XFORM_CIPHER) {
-                                       if (cap_cipher_algo == opt_cipher_algo) {
-                                               if (check_type(options, &dev_info) == 0)
-                                                       break;
-                                       }
-                               }
-                               cap = &dev_info.capabilities[++i];
-                       }
+                       cap = check_device_support_cipher_algo(options, &dev_info,
+                                                       cdev_id);
+                       options->block_size = cap->sym.cipher.block_size;
 
-                       if (cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED) {
-                               printf("Algorithm %s not supported by cryptodev %u"
-                                       " or device not of preferred type (%s)\n",
-                                       supported_cipher_algo[opt_cipher_algo],
-                                       cdev_id,
-                                       options->string_type);
-                               continue;
+                       /* Set IV if not provided from command line */
+                       if (options->cipher_iv_param == 0) {
+                               if (options->cipher_iv_random_size != -1)
+                                       options->cipher_iv.length =
+                                               options->cipher_iv_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->cipher_iv.length =
+                                               cap->sym.cipher.iv_size.min;
                        }
 
-                       options->block_size = cap->sym.cipher.block_size;
-                       /*
-                        * Check if length of provided IV is supported
-                        * by the algorithm chosen.
-                        */
-                       if (options->iv_param) {
-                               if (check_supported_size(options->iv.length,
-                                               cap->sym.cipher.iv_size.min,
-                                               cap->sym.cipher.iv_size.max,
-                                               cap->sym.cipher.iv_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported IV length\n");
-                                       return -1;
-                               }
-                       /*
-                        * Check if length of IV to be randomly generated
-                        * is supported by the algorithm chosen.
-                        */
-                       } else if (options->iv_random_size != -1) {
-                               if (check_supported_size(options->iv_random_size,
-                                               cap->sym.cipher.iv_size.min,
-                                               cap->sym.cipher.iv_size.max,
-                                               cap->sym.cipher.iv_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported IV length\n");
-                                       return -1;
-                               }
-                               options->iv.length = options->iv_random_size;
-                       /* No size provided, use minimum size. */
-                       } else
-                               options->iv.length = cap->sym.cipher.iv_size.min;
-
-                       /*
-                        * Check if length of provided cipher key is supported
-                        * by the algorithm chosen.
-                        */
-                       if (options->ckey_param) {
-                               if (check_supported_size(
-                                               options->cipher_xform.cipher.key.length,
-                                               cap->sym.cipher.key_size.min,
-                                               cap->sym.cipher.key_size.max,
-                                               cap->sym.cipher.key_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported cipher key length\n");
-                                       return -1;
-                               }
-                       /*
-                        * Check if length of the cipher key to be randomly generated
-                        * is supported by the algorithm chosen.
-                        */
-                       } else if (options->ckey_random_size != -1) {
-                               if (check_supported_size(options->ckey_random_size,
-                                               cap->sym.cipher.key_size.min,
-                                               cap->sym.cipher.key_size.max,
-                                               cap->sym.cipher.key_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported cipher key length\n");
-                                       return -1;
-                               }
-                               options->cipher_xform.cipher.key.length =
-                                                       options->ckey_random_size;
-                       /* No size provided, use minimum size. */
-                       } else
-                               options->cipher_xform.cipher.key.length =
+                       /* Set key if not provided from command line */
+                       if (options->ckey_param == 0) {
+                               if (options->ckey_random_size != -1)
+                                       options->cipher_xform.cipher.key.length =
+                                               options->ckey_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->cipher_xform.cipher.key.length =
                                                cap->sym.cipher.key_size.min;
 
-                       if (!options->ckey_param)
                                generate_random_key(
                                        options->cipher_xform.cipher.key.data,
                                        options->cipher_xform.cipher.key.length);
-
+                       }
                }
 
                /* Set auth parameters */
                if (options->xform_chain == L2FWD_CRYPTO_CIPHER_HASH ||
                                options->xform_chain == L2FWD_CRYPTO_HASH_CIPHER ||
                                options->xform_chain == L2FWD_CRYPTO_HASH_ONLY) {
-                       /* Check if device supports auth algo */
-                       i = 0;
-                       opt_auth_algo = options->auth_xform.auth.algo;
-                       cap = &dev_info.capabilities[i];
-                       while (cap->op != RTE_CRYPTO_OP_TYPE_UNDEFINED) {
-                               cap_auth_algo = cap->sym.auth.algo;
-                               if ((cap->sym.xform_type == RTE_CRYPTO_SYM_XFORM_AUTH) &&
-                                               (cap_auth_algo == opt_auth_algo) &&
-                                               (check_type(options, &dev_info) == 0)) {
-                                       break;
-                               }
-                               cap = &dev_info.capabilities[++i];
-                       }
-
-                       if (cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED) {
-                               printf("Algorithm %s not supported by cryptodev %u"
-                                       " or device not of preferred type (%s)\n",
-                                       supported_auth_algo[opt_auth_algo],
-                                       cdev_id,
-                                       options->string_type);
-                               continue;
+                       cap = check_device_support_auth_algo(options, &dev_info,
+                                                       cdev_id);
+
+                       /* Set IV if not provided from command line */
+                       if (options->auth_iv_param == 0) {
+                               if (options->auth_iv_random_size != -1)
+                                       options->auth_iv.length =
+                                               options->auth_iv_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->auth_iv.length =
+                                               cap->sym.auth.iv_size.min;
                        }
 
-                       options->block_size = cap->sym.auth.block_size;
-                       /*
-                        * Check if length of provided AAD is supported
-                        * by the algorithm chosen.
-                        */
-                       if (options->aad_param) {
-                               if (check_supported_size(options->aad.length,
-                                               cap->sym.auth.aad_size.min,
-                                               cap->sym.auth.aad_size.max,
-                                               cap->sym.auth.aad_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported AAD length\n");
-                                       return -1;
-                               }
-                       /*
-                        * Check if length of AAD to be randomly generated
-                        * is supported by the algorithm chosen.
-                        */
-                       } else if (options->aad_random_size != -1) {
-                               if (check_supported_size(options->aad_random_size,
-                                               cap->sym.auth.aad_size.min,
-                                               cap->sym.auth.aad_size.max,
-                                               cap->sym.auth.aad_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported AAD length\n");
-                                       return -1;
-                               }
-                               options->aad.length = options->aad_random_size;
-                       /* No size provided, use minimum size. */
-                       } else
-                               options->aad.length = cap->sym.auth.aad_size.min;
-
-                       options->auth_xform.auth.add_auth_data_length =
-                                               options->aad.length;
-
-                       /*
-                        * Check if length of provided auth key is supported
-                        * by the algorithm chosen.
-                        */
-                       if (options->akey_param) {
-                               if (check_supported_size(
-                                               options->auth_xform.auth.key.length,
-                                               cap->sym.auth.key_size.min,
-                                               cap->sym.auth.key_size.max,
-                                               cap->sym.auth.key_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported auth key length\n");
-                                       return -1;
-                               }
-                       /*
-                        * Check if length of the auth key to be randomly generated
-                        * is supported by the algorithm chosen.
-                        */
-                       } else if (options->akey_random_size != -1) {
-                               if (check_supported_size(options->akey_random_size,
-                                               cap->sym.auth.key_size.min,
-                                               cap->sym.auth.key_size.max,
-                                               cap->sym.auth.key_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported auth key length\n");
-                                       return -1;
-                               }
-                               options->auth_xform.auth.key.length =
-                                                       options->akey_random_size;
-                       /* No size provided, use minimum size. */
-                       } else
-                               options->auth_xform.auth.key.length =
+                       /* Set key if not provided from command line */
+                       if (options->akey_param == 0) {
+                               if (options->akey_random_size != -1)
+                                       options->auth_xform.auth.key.length =
+                                               options->akey_random_size;
+                               /* No size provided, use minimum size. */
+                               else
+                                       options->auth_xform.auth.key.length =
                                                cap->sym.auth.key_size.min;
 
-                       if (!options->akey_param)
                                generate_random_key(
                                        options->auth_xform.auth.key.data,
                                        options->auth_xform.auth.key.length);
+                       }
 
-                       /* Check if digest size is supported by the algorithm. */
-                       if (options->digest_size != -1) {
-                               if (check_supported_size(options->digest_size,
-                                               cap->sym.auth.digest_size.min,
-                                               cap->sym.auth.digest_size.max,
-                                               cap->sym.auth.digest_size.increment)
-                                                       != 0) {
-                                       printf("Unsupported digest length\n");
-                                       return -1;
-                               }
+                       /* Set digest size if not provided from command line */
+                       if (options->digest_size != -1)
                                options->auth_xform.auth.digest_length =
                                                        options->digest_size;
-                       /* No size provided, use minimum size. */
-                       else
+                               /* No size provided, use minimum size. */
+                       else
                                options->auth_xform.auth.digest_length =
                                                cap->sym.auth.digest_size.min;
                }
@@ -1779,19 +2462,24 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                }
 
                qp_conf.nb_descriptors = 2048;
+               qp_conf.mp_session = session_pool_socket[socket_id].sess_mp;
+               qp_conf.mp_session_private =
+                               session_pool_socket[socket_id].priv_mp;
 
                retval = rte_cryptodev_queue_pair_setup(cdev_id, 0, &qp_conf,
-                               SOCKET_ID_ANY);
+                               socket_id);
                if (retval < 0) {
                        printf("Failed to setup queue pair %u on cryptodev %u",
                                        0, cdev_id);
                        return -1;
                }
 
-               l2fwd_enabled_crypto_mask |= (1 << cdev_id);
-
-               enabled_cdevs[cdev_id] = 1;
-               enabled_cdev_count++;
+               retval = rte_cryptodev_start(cdev_id);
+               if (retval < 0) {
+                       printf("Failed to start device %u: error %d\n",
+                                       cdev_id, retval);
+                       return -1;
+               }
        }
 
        return enabled_cdev_count;
@@ -1800,9 +2488,9 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
 static int
 initialize_ports(struct l2fwd_crypto_options *options)
 {
-       uint8_t last_portid, portid;
+       uint16_t last_portid = 0, portid;
        unsigned enabled_portcount = 0;
-       unsigned nb_ports = rte_eth_dev_count();
+       unsigned nb_ports = rte_eth_dev_count_avail();
 
        if (nb_ports == 0) {
                printf("No Ethernet ports - bye\n");
@@ -1813,42 +2501,62 @@ initialize_ports(struct l2fwd_crypto_options *options)
        for (portid = 0; portid < RTE_MAX_ETHPORTS; portid++)
                l2fwd_dst_ports[portid] = 0;
 
-       for (last_portid = 0, portid = 0; portid < nb_ports; portid++) {
+       RTE_ETH_FOREACH_DEV(portid) {
                int retval;
+               struct rte_eth_dev_info dev_info;
+               struct rte_eth_rxconf rxq_conf;
+               struct rte_eth_txconf txq_conf;
+               struct rte_eth_conf local_port_conf = port_conf;
 
                /* Skip ports that are not enabled */
                if ((options->portmask & (1 << portid)) == 0)
                        continue;
 
                /* init port */
-               printf("Initializing port %u... ", (unsigned) portid);
+               printf("Initializing port %u... ", portid);
                fflush(stdout);
-               retval = rte_eth_dev_configure(portid, 1, 1, &port_conf);
+               rte_eth_dev_info_get(portid, &dev_info);
+               if (dev_info.tx_offload_capa & DEV_TX_OFFLOAD_MBUF_FAST_FREE)
+                       local_port_conf.txmode.offloads |=
+                               DEV_TX_OFFLOAD_MBUF_FAST_FREE;
+               retval = rte_eth_dev_configure(portid, 1, 1, &local_port_conf);
                if (retval < 0) {
                        printf("Cannot configure device: err=%d, port=%u\n",
-                                 retval, (unsigned) portid);
+                                 retval, portid);
+                       return -1;
+               }
+
+               retval = rte_eth_dev_adjust_nb_rx_tx_desc(portid, &nb_rxd,
+                                                         &nb_txd);
+               if (retval < 0) {
+                       printf("Cannot adjust number of descriptors: err=%d, port=%u\n",
+                               retval, portid);
                        return -1;
                }
 
                /* init one RX queue */
                fflush(stdout);
+               rxq_conf = dev_info.default_rxconf;
+               rxq_conf.offloads = local_port_conf.rxmode.offloads;
                retval = rte_eth_rx_queue_setup(portid, 0, nb_rxd,
                                             rte_eth_dev_socket_id(portid),
-                                            NULL, l2fwd_pktmbuf_pool);
+                                            &rxq_conf, l2fwd_pktmbuf_pool);
                if (retval < 0) {
                        printf("rte_eth_rx_queue_setup:err=%d, port=%u\n",
-                                       retval, (unsigned) portid);
+                                       retval, portid);
                        return -1;
                }
 
                /* init one TX queue on each port */
                fflush(stdout);
+               txq_conf = dev_info.default_txconf;
+               txq_conf.offloads = local_port_conf.txmode.offloads;
                retval = rte_eth_tx_queue_setup(portid, 0, nb_txd,
                                rte_eth_dev_socket_id(portid),
-                               NULL);
+                               &txq_conf);
                if (retval < 0) {
                        printf("rte_eth_tx_queue_setup:err=%d, port=%u\n",
-                               retval, (unsigned) portid);
+                               retval, portid);
 
                        return -1;
                }
@@ -1857,7 +2565,7 @@ initialize_ports(struct l2fwd_crypto_options *options)
                retval = rte_eth_dev_start(portid);
                if (retval < 0) {
                        printf("rte_eth_dev_start:err=%d, port=%u\n",
-                                       retval, (unsigned) portid);
+                                       retval, portid);
                        return -1;
                }
 
@@ -1866,7 +2574,7 @@ initialize_ports(struct l2fwd_crypto_options *options)
                rte_eth_macaddr_get(portid, &l2fwd_ports_eth_addr[portid]);
 
                printf("Port %u, MAC address: %02X:%02X:%02X:%02X:%02X:%02X\n\n",
-                               (unsigned) portid,
+                               portid,
                                l2fwd_ports_eth_addr[portid].addr_bytes[0],
                                l2fwd_ports_eth_addr[portid].addr_bytes[1],
                                l2fwd_ports_eth_addr[portid].addr_bytes[2],
@@ -1896,7 +2604,7 @@ initialize_ports(struct l2fwd_crypto_options *options)
                return -1;
        }
 
-       check_all_ports_link_status(nb_ports, l2fwd_enabled_port_mask);
+       check_all_ports_link_status(l2fwd_enabled_port_mask);
 
        return enabled_portcount;
 }
@@ -1909,31 +2617,43 @@ reserve_key_memory(struct l2fwd_crypto_options *options)
        if (options->cipher_xform.cipher.key.data == NULL)
                rte_exit(EXIT_FAILURE, "Failed to allocate memory for cipher key");
 
-
        options->auth_xform.auth.key.data = rte_malloc("auth key",
                                                MAX_KEY_SIZE, 0);
        if (options->auth_xform.auth.key.data == NULL)
                rte_exit(EXIT_FAILURE, "Failed to allocate memory for auth key");
 
-       options->iv.data = rte_malloc("iv", MAX_KEY_SIZE, 0);
-       if (options->iv.data == NULL)
-               rte_exit(EXIT_FAILURE, "Failed to allocate memory for IV");
-       options->iv.phys_addr = rte_malloc_virt2phy(options->iv.data);
+       options->aead_xform.aead.key.data = rte_malloc("aead key",
+                                               MAX_KEY_SIZE, 0);
+       if (options->aead_xform.aead.key.data == NULL)
+               rte_exit(EXIT_FAILURE, "Failed to allocate memory for AEAD key");
+
+       options->cipher_iv.data = rte_malloc("cipher iv", MAX_KEY_SIZE, 0);
+       if (options->cipher_iv.data == NULL)
+               rte_exit(EXIT_FAILURE, "Failed to allocate memory for cipher IV");
+
+       options->auth_iv.data = rte_malloc("auth iv", MAX_KEY_SIZE, 0);
+       if (options->auth_iv.data == NULL)
+               rte_exit(EXIT_FAILURE, "Failed to allocate memory for auth IV");
+
+       options->aead_iv.data = rte_malloc("aead_iv", MAX_KEY_SIZE, 0);
+       if (options->aead_iv.data == NULL)
+               rte_exit(EXIT_FAILURE, "Failed to allocate memory for AEAD iv");
 
        options->aad.data = rte_malloc("aad", MAX_KEY_SIZE, 0);
        if (options->aad.data == NULL)
                rte_exit(EXIT_FAILURE, "Failed to allocate memory for AAD");
-       options->aad.phys_addr = rte_malloc_virt2phy(options->aad.data);
+       options->aad.phys_addr = rte_malloc_virt2iova(options->aad.data);
 }
 
 int
 main(int argc, char **argv)
 {
-       struct lcore_queue_conf *qconf;
+       struct lcore_queue_conf *qconf = NULL;
        struct l2fwd_crypto_options options;
 
-       uint8_t nb_ports, nb_cryptodevs, portid, cdev_id;
-       unsigned lcore_id, rx_lcore_id;
+       uint8_t nb_cryptodevs, cdev_id;
+       uint16_t portid;
+       unsigned lcore_id, rx_lcore_id = 0;
        int ret, enabled_cdevcount, enabled_portcount;
        uint8_t enabled_cdevs[RTE_CRYPTO_MAX_DEVS] = {0};
 
@@ -1947,14 +2667,14 @@ main(int argc, char **argv)
        /* reserve memory for Cipher/Auth key and IV */
        reserve_key_memory(&options);
 
-       /* fill out the supported algorithm tables */
-       fill_supported_algorithm_tables();
-
        /* parse application arguments (after the EAL ones) */
        ret = l2fwd_crypto_parse_args(&options, argc, argv);
        if (ret < 0)
                rte_exit(EXIT_FAILURE, "Invalid L2FWD-CRYPTO arguments\n");
 
+       printf("MAC updating %s\n",
+                       options.mac_updating ? "enabled" : "disabled");
+
        /* create the mbuf pool */
        l2fwd_pktmbuf_pool = rte_pktmbuf_pool_create("mbuf_pool", NB_MBUF, 512,
                        sizeof(struct rte_crypto_op),
@@ -1964,7 +2684,7 @@ main(int argc, char **argv)
 
        /* create crypto op pool */
        l2fwd_crypto_op_pool = rte_crypto_op_pool_create("crypto_op_pool",
-                       RTE_CRYPTO_OP_TYPE_SYMMETRIC, NB_MBUF, 128, 0,
+                       RTE_CRYPTO_OP_TYPE_SYMMETRIC, NB_MBUF, 128, MAXIMUM_IV_LENGTH,
                        rte_socket_id());
        if (l2fwd_crypto_op_pool == NULL)
                rte_exit(EXIT_FAILURE, "Cannot create crypto op pool\n");
@@ -1974,10 +2694,8 @@ main(int argc, char **argv)
        if (enabled_portcount < 1)
                rte_exit(EXIT_FAILURE, "Failed to initial Ethernet ports\n");
 
-       nb_ports = rte_eth_dev_count();
        /* Initialize the port/queue configuration of each logical core */
-       for (rx_lcore_id = 0, qconf = NULL, portid = 0;
-                       portid < nb_ports; portid++) {
+       RTE_ETH_FOREACH_DEV(portid) {
 
                /* skip ports that are not enabled */
                if ((options.portmask & (1 << portid)) == 0)
@@ -2009,7 +2727,7 @@ main(int argc, char **argv)
                qconf->rx_port_list[qconf->nb_rx_ports] = portid;
                qconf->nb_rx_ports++;
 
-               printf("Lcore %u: RX port %u\n", rx_lcore_id, (unsigned)portid);
+               printf("Lcore %u: RX port %u\n", rx_lcore_id, portid);
        }
 
        /* Enable Crypto devices */