> AESNI_MB SW PMDs increment Intel IPsec MB version to 1.4.
> A minimum IPsec Multi-buffer version of 1.4 or greater is now required
> for the 24.11 LTS release.
> 
> Signed-off-by: Brian Dooley <brian.doo...@intel.com>
> Acked-by: Kai Ji <kai...@intel.com>
> Acked-by: Pablo de Lara <pablo.de.lara.gua...@intel.com>
> ---
> This patch relates to a deprecation notice sent in the 24.03 release.

You should also remove the deprecation notice in this patch.

> Intel IPsec MB minimum version being bumped to 1.4 for the 24.11 release.
> https://patches.dpdk.org/project/dpdk/patch/20240314103731.3242086-2-brian.doo...@intel.com/
> 
> v2:
>       Added release note
>       Remove more IMB_VERSION checks
> ---
>  doc/guides/cryptodevs/aesni_gcm.rst         |   3 +-
>  doc/guides/cryptodevs/aesni_mb.rst          |   3 +-
>  doc/guides/cryptodevs/chacha20_poly1305.rst |   3 +-
>  doc/guides/cryptodevs/kasumi.rst            |   3 +-
>  doc/guides/cryptodevs/snow3g.rst            |   3 +-
>  doc/guides/cryptodevs/zuc.rst               |   3 +-
>  doc/guides/rel_notes/release_24_11.rst      |   7 +
>  drivers/crypto/ipsec_mb/ipsec_mb_ops.c      |  24 --
>  drivers/crypto/ipsec_mb/meson.build         |   2 +-
>  drivers/crypto/ipsec_mb/pmd_aesni_mb.c      | 268 +-------------------
>  drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h |   9 -
>  11 files changed, 23 insertions(+), 305 deletions(-)
> 
> diff --git a/doc/guides/cryptodevs/aesni_gcm.rst
> b/doc/guides/cryptodevs/aesni_gcm.rst
> index 3af1486553..7592d33da2 100644
> --- a/doc/guides/cryptodevs/aesni_gcm.rst
> +++ b/doc/guides/cryptodevs/aesni_gcm.rst
> @@ -74,7 +74,8 @@ and the external crypto libraries supported by them:
>     DPDK version   Crypto library version
>     =============  ================================
>     20.11 - 21.08  Multi-buffer library 0.53 - 1.3
> -   21.11+         Multi-buffer library 1.0  - 1.5
> +   21.11 - 24.07  Multi-buffer library 1.0  - 1.5
> +   24.11+         Multi-buffer library 1.4  - 1.5
>     =============  ================================
> 
>  Initialization
> diff --git a/doc/guides/cryptodevs/aesni_mb.rst
> b/doc/guides/cryptodevs/aesni_mb.rst
> index 3c77d0f463..c2f6633ee6 100644
> --- a/doc/guides/cryptodevs/aesni_mb.rst
> +++ b/doc/guides/cryptodevs/aesni_mb.rst
> @@ -132,7 +132,8 @@ and the Multi-Buffer library version supported by them:
>     DPDK version    Multi-buffer library version
>     ==============  ============================
>     20.11 - 21.08   0.53 - 1.3
> -   21.11+          1.0  - 1.5
> +   21.11 - 24.07   1.0  - 1.5
> +   24.11+          1.4  - 1.5
>     ==============  ============================
> 
>  Initialization
> diff --git a/doc/guides/cryptodevs/chacha20_poly1305.rst
> b/doc/guides/cryptodevs/chacha20_poly1305.rst
> index 44cff85918..b5a980b247 100644
> --- a/doc/guides/cryptodevs/chacha20_poly1305.rst
> +++ b/doc/guides/cryptodevs/chacha20_poly1305.rst
> @@ -66,7 +66,8 @@ and the external crypto libraries supported by them:
>     =============  ================================
>     DPDK version   Crypto library version
>     =============  ================================
> -   21.11+         Multi-buffer library 1.0-1.5
> +   21.11 - 24.07  Multi-buffer library 1.0  - 1.5
> +   24.11+         Multi-buffer library 1.4  - 1.5
>     =============  ================================
> 
>  Initialization
> diff --git a/doc/guides/cryptodevs/kasumi.rst
> b/doc/guides/cryptodevs/kasumi.rst
> index 4070f025e1..b57f18b56f 100644
> --- a/doc/guides/cryptodevs/kasumi.rst
> +++ b/doc/guides/cryptodevs/kasumi.rst
> @@ -80,7 +80,8 @@ and the external crypto libraries supported by them:
>     DPDK version   Crypto library version
>     =============  ================================
>     20.02 - 21.08  Multi-buffer library 0.53 - 1.3
> -   21.11+         Multi-buffer library 1.0  - 1.5
> +   21.11 - 24.07  Multi-buffer library 1.0  - 1.5
> +   24.11+         Multi-buffer library 1.4  - 1.5
>     =============  ================================
> 
>  Initialization
> diff --git a/doc/guides/cryptodevs/snow3g.rst
> b/doc/guides/cryptodevs/snow3g.rst
> index 6eb8229fb5..fb4e0448ac 100644
> --- a/doc/guides/cryptodevs/snow3g.rst
> +++ b/doc/guides/cryptodevs/snow3g.rst
> @@ -89,7 +89,8 @@ and the external crypto libraries supported by them:
>     DPDK version   Crypto library version
>     =============  ================================
>     20.02 - 21.08  Multi-buffer library 0.53 - 1.3
> -   21.11+         Multi-buffer library 1.0  - 1.5
> +   21.11 - 24.07  Multi-buffer library 1.0  - 1.5
> +   24.11+         Multi-buffer library 1.4  - 1.5
>     =============  ================================
> 
>  Initialization
> diff --git a/doc/guides/cryptodevs/zuc.rst b/doc/guides/cryptodevs/zuc.rst
> index 29fe6279aa..4615562246 100644
> --- a/doc/guides/cryptodevs/zuc.rst
> +++ b/doc/guides/cryptodevs/zuc.rst
> @@ -88,7 +88,8 @@ and the external crypto libraries supported by them:
>     DPDK version   Crypto library version
>     =============  ================================
>     20.02 - 21.08  Multi-buffer library 0.53 - 1.3
> -   21.11+         Multi-buffer library 1.0  - 1.5
> +   21.11 - 24.07  Multi-buffer library 1.0  - 1.5
> +   24.11+         Multi-buffer library 1.4  - 1.5
>     =============  ================================
> 
>  Initialization
> diff --git a/doc/guides/rel_notes/release_24_11.rst
> b/doc/guides/rel_notes/release_24_11.rst
> index e0a9aa55a1..11eb786fd4 100644
> --- a/doc/guides/rel_notes/release_24_11.rst
> +++ b/doc/guides/rel_notes/release_24_11.rst
> @@ -67,6 +67,13 @@ New Features
> 
>    The new statistics are useful for debugging and profiling.
> 
> +* **Updated IPsec_MB crypto driver.**
> +
> +  * In 24.11 LTS release the Intel IPsec Multi-buffer version is bumped to a
> +    minimum version of v1.4. This will effect the KASUMI, SNOW3G, ZUC,
> +    AESNI GCM, AESNI MB and CHACHAPOLY SW PMDs.
> +
> +
> 
>  Removed Items
>  -------------
> diff --git a/drivers/crypto/ipsec_mb/ipsec_mb_ops.c
> b/drivers/crypto/ipsec_mb/ipsec_mb_ops.c
> index ba899604d2..910efb1a97 100644
> --- a/drivers/crypto/ipsec_mb/ipsec_mb_ops.c
> +++ b/drivers/crypto/ipsec_mb/ipsec_mb_ops.c
> @@ -11,8 +11,6 @@
> 
>  #include "ipsec_mb_private.h"
> 
> -#define IMB_MP_REQ_VER_STR "1.1.0"
> -
>  /** Configure device */
>  int
>  ipsec_mb_config(__rte_unused struct rte_cryptodev *dev,
> @@ -147,15 +145,10 @@ ipsec_mb_qp_release(struct rte_cryptodev *dev,
> uint16_t qp_id)
>       if (rte_eal_process_type() == RTE_PROC_PRIMARY) {
>               rte_ring_free(rte_ring_lookup(qp->name));
> 
> -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM
> -             if (qp->mb_mgr)
> -                     free_mb_mgr(qp->mb_mgr);
> -#else
>               if (qp->mb_mgr_mz) {
>                       rte_memzone_free(qp->mb_mgr_mz);
>                       qp->mb_mgr = NULL;
>               }
> -#endif
>               rte_free(qp);
>               dev->data->queue_pairs[qp_id] = NULL;
>       } else { /* secondary process */
> @@ -211,7 +204,6 @@ static struct rte_ring
>                              RING_F_SP_ENQ | RING_F_SC_DEQ);
>  }
> 
> -#if IMB_VERSION(1, 1, 0) <= IMB_VERSION_NUM
>  static IMB_MGR *
>  ipsec_mb_alloc_mgr_from_memzone(const struct rte_memzone **mb_mgr_mz,
>               const char *mb_mgr_mz_name)
> @@ -244,7 +236,6 @@ ipsec_mb_alloc_mgr_from_memzone(const struct
> rte_memzone **mb_mgr_mz,
>       }
>       return mb_mgr;
>  }
> -#endif
> 
>  /** Setup a queue pair */
>  int
> @@ -260,12 +251,6 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev,
> uint16_t qp_id,
>       int ret;
> 
>       if (rte_eal_process_type() == RTE_PROC_SECONDARY) {
> -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM
> -             IPSEC_MB_LOG(ERR, "The intel-ipsec-mb version (%s) does not
> support multiprocess,"
> -                             "the minimum version required for this feature
> is %s.",
> -                             IMB_VERSION_STR, IMB_MP_REQ_VER_STR);
> -             return -EINVAL;
> -#endif
>               qp = dev->data->queue_pairs[qp_id];
>               if (qp == NULL) {
>                       IPSEC_MB_LOG(DEBUG, "Secondary process setting up
> device qp.");
> @@ -285,15 +270,11 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev,
> uint16_t qp_id,
>                       return -ENOMEM;
>       }
> 
> -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM
> -     qp->mb_mgr = alloc_init_mb_mgr();
> -#else
>       char mz_name[IPSEC_MB_MAX_MZ_NAME];
>       snprintf(mz_name, sizeof(mz_name), "IMB_MGR_DEV_%d_QP_%d",
>                       dev->data->dev_id, qp_id);
>       qp->mb_mgr = ipsec_mb_alloc_mgr_from_memzone(&(qp-
> >mb_mgr_mz),
>                       mz_name);
> -#endif
>       if (qp->mb_mgr == NULL) {
>               ret = -ENOMEM;
>               goto qp_setup_cleanup;
> @@ -330,14 +311,9 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev,
> uint16_t qp_id,
>       return 0;
> 
>  qp_setup_cleanup:
> -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM
> -     if (qp->mb_mgr)
> -             free_mb_mgr(qp->mb_mgr);
> -#else
>       if (rte_eal_process_type() == RTE_PROC_SECONDARY)
>               return ret;
>       rte_memzone_free(qp->mb_mgr_mz);
> -#endif
>       rte_free(qp);
>       return ret;
>  }
> diff --git a/drivers/crypto/ipsec_mb/meson.build
> b/drivers/crypto/ipsec_mb/meson.build
> index 87bf965554..0c988d7411 100644
> --- a/drivers/crypto/ipsec_mb/meson.build
> +++ b/drivers/crypto/ipsec_mb/meson.build
> @@ -7,7 +7,7 @@ if is_windows
>      subdir_done()
>  endif
> 
> -IMB_required_ver = '1.0.0'
> +IMB_required_ver = '1.4.0'
>  IMB_header = '#include<intel-ipsec-mb.h>'
>  if arch_subdir == 'arm'
>      IMB_header = '#include<ipsec-mb.h>'
> diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c
> b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c
> index f3633091a9..b8f103496f 100644
> --- a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c
> +++ b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c
> @@ -15,51 +15,6 @@ struct aesni_mb_op_buf_data {
>       uint32_t offset;
>  };
> 
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -/**
> - * Calculate the authentication pre-computes
> - *
> - * @param one_block_hash     Function pointer
> - *                           to calculate digest on ipad/opad
> - * @param ipad                       Inner pad output byte array
> - * @param opad                       Outer pad output byte array
> - * @param hkey                       Authentication key
> - * @param hkey_len           Authentication key length
> - * @param blocksize          Block size of selected hash algo
> - */
> -static void
> -calculate_auth_precomputes(hash_one_block_t one_block_hash,
> -             uint8_t *ipad, uint8_t *opad,
> -             const uint8_t *hkey, uint16_t hkey_len,
> -             uint16_t blocksize)
> -{
> -     uint32_t i, length;
> -
> -     alignas(16) uint8_t ipad_buf[blocksize];
> -     alignas(16) uint8_t opad_buf[blocksize];
> -
> -     /* Setup inner and outer pads */
> -     memset(ipad_buf, HMAC_IPAD_VALUE, blocksize);
> -     memset(opad_buf, HMAC_OPAD_VALUE, blocksize);
> -
> -     /* XOR hash key with inner and outer pads */
> -     length = hkey_len > blocksize ? blocksize : hkey_len;
> -
> -     for (i = 0; i < length; i++) {
> -             ipad_buf[i] ^= hkey[i];
> -             opad_buf[i] ^= hkey[i];
> -     }
> -
> -     /* Compute partial hashes */
> -     (*one_block_hash)(ipad_buf, ipad);
> -     (*one_block_hash)(opad_buf, opad);
> -
> -     /* Clean up stack */
> -     memset(ipad_buf, 0, blocksize);
> -     memset(opad_buf, 0, blocksize);
> -}
> -#endif
> -
>  static inline int
>  is_aead_algo(IMB_HASH_ALG hash_alg, IMB_CIPHER_MODE cipher_mode)
>  {
> @@ -74,10 +29,6 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               struct aesni_mb_session *sess,
>               const struct rte_crypto_sym_xform *xform)
>  {
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -     hash_one_block_t hash_oneblock_fn = NULL;
> -     unsigned int key_larger_block_size = 0;
> -#endif
>       uint8_t hashed_key[HMAC_MAX_BLOCK_SIZE] = { 0 };
>       uint32_t auth_precompute = 1;
> 
> @@ -216,13 +167,9 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>                       }
>               } else if (xform->auth.key.length == 32) {
>                       sess->template_job.hash_alg =
> IMB_AUTH_ZUC256_EIA3_BITLEN;
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>                       if (sess->auth.req_digest_len != 4 &&
>                                       sess->auth.req_digest_len != 8 &&
>                                       sess->auth.req_digest_len != 16) {
> -#else
> -                     if (sess->auth.req_digest_len != 4) {
> -#endif
>                               IPSEC_MB_LOG(ERR, "Invalid digest size");
>                               return -EINVAL;
>                       }
> @@ -273,24 +220,15 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>       switch (xform->auth.algo) {
>       case RTE_CRYPTO_AUTH_MD5_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_MD5;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->md5_one_block;
> -#endif
>               break;
>       case RTE_CRYPTO_AUTH_SHA1_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_HMAC_SHA_1;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->sha1_one_block;
> -#endif
>               if (xform->auth.key.length > get_auth_algo_blocksize(
>                               IMB_AUTH_HMAC_SHA_1)) {
>                       IMB_SHA1(mb_mgr,
>                               xform->auth.key.data,
>                               xform->auth.key.length,
>                               hashed_key);
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -                     key_larger_block_size = 1;
> -#endif
>               }
>               break;
>       case RTE_CRYPTO_AUTH_SHA1:
> @@ -299,18 +237,12 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               break;
>       case RTE_CRYPTO_AUTH_SHA224_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_HMAC_SHA_224;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->sha224_one_block;
> -#endif
>               if (xform->auth.key.length > get_auth_algo_blocksize(
>                               IMB_AUTH_HMAC_SHA_224)) {
>                       IMB_SHA224(mb_mgr,
>                               xform->auth.key.data,
>                               xform->auth.key.length,
>                               hashed_key);
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -                     key_larger_block_size = 1;
> -#endif
>               }
>               break;
>       case RTE_CRYPTO_AUTH_SHA224:
> @@ -319,18 +251,12 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               break;
>       case RTE_CRYPTO_AUTH_SHA256_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_HMAC_SHA_256;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->sha256_one_block;
> -#endif
>               if (xform->auth.key.length > get_auth_algo_blocksize(
>                               IMB_AUTH_HMAC_SHA_256)) {
>                       IMB_SHA256(mb_mgr,
>                               xform->auth.key.data,
>                               xform->auth.key.length,
>                               hashed_key);
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -                     key_larger_block_size = 1;
> -#endif
>               }
>               break;
>       case RTE_CRYPTO_AUTH_SHA256:
> @@ -339,18 +265,12 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               break;
>       case RTE_CRYPTO_AUTH_SHA384_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_HMAC_SHA_384;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->sha384_one_block;
> -#endif
>               if (xform->auth.key.length > get_auth_algo_blocksize(
>                               IMB_AUTH_HMAC_SHA_384)) {
>                       IMB_SHA384(mb_mgr,
>                               xform->auth.key.data,
>                               xform->auth.key.length,
>                               hashed_key);
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -                     key_larger_block_size = 1;
> -#endif
>               }
>               break;
>       case RTE_CRYPTO_AUTH_SHA384:
> @@ -359,18 +279,12 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               break;
>       case RTE_CRYPTO_AUTH_SHA512_HMAC:
>               sess->template_job.hash_alg = IMB_AUTH_HMAC_SHA_512;
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -             hash_oneblock_fn = mb_mgr->sha512_one_block;
> -#endif
>               if (xform->auth.key.length > get_auth_algo_blocksize(
>                               IMB_AUTH_HMAC_SHA_512)) {
>                       IMB_SHA512(mb_mgr,
>                               xform->auth.key.data,
>                               xform->auth.key.length,
>                               hashed_key);
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -                     key_larger_block_size = 1;
> -#endif
>               }
>               break;
>       case RTE_CRYPTO_AUTH_SHA512:
> @@ -404,25 +318,9 @@ aesni_mb_set_session_auth_parameters(IMB_MGR
> *mb_mgr,
>               return 0;
> 
>       /* Calculate Authentication precomputes */
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
> -             imb_hmac_ipad_opad(mb_mgr, sess->template_job.hash_alg,
> -                                     xform->auth.key.data, xform-
> >auth.key.length,
> -                                     sess->auth.pads.inner, sess-
> >auth.pads.outer);
> -#else
> -     if (key_larger_block_size) {
> -             calculate_auth_precomputes(hash_oneblock_fn,
> -                     sess->auth.pads.inner, sess->auth.pads.outer,
> -                     hashed_key,
> -                     xform->auth.key.length,
> -                     get_auth_algo_blocksize(sess->template_job.hash_alg));
> -     } else {
> -             calculate_auth_precomputes(hash_oneblock_fn,
> -                     sess->auth.pads.inner, sess->auth.pads.outer,
> -                     xform->auth.key.data,
> -                     xform->auth.key.length,
> -                     get_auth_algo_blocksize(sess->template_job.hash_alg));
> -     }
> -#endif
> +     imb_hmac_ipad_opad(mb_mgr, sess->template_job.hash_alg,
> +                             xform->auth.key.data, xform->auth.key.length,
> +                             sess->auth.pads.inner, sess->auth.pads.outer);
>       sess->template_job.u.HMAC._hashed_auth_key_xor_ipad =
>               sess->auth.pads.inner;
>       sess->template_job.u.HMAC._hashed_auth_key_xor_opad =
> @@ -879,11 +777,9 @@ aesni_mb_session_configure(IMB_MGR *mb_mgr,
>               }
>       }
> 
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>       sess->session_id = imb_set_session(mb_mgr, &sess->template_job);
>       sess->pid = getpid();
>       RTE_PER_LCORE(pid) = sess->pid;
> -#endif
> 
>       return 0;
>  }
> @@ -1016,9 +912,7 @@ aesni_mb_set_docsis_sec_session_parameters(
>               goto error_exit;
>       }
> 
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>       ipsec_sess->session_id = imb_set_session(mb_mgr, &ipsec_sess-
> >template_job);
> -#endif
> 
>  error_exit:
>       free_mb_mgr(mb_mgr);
> @@ -1273,7 +1167,6 @@ imb_lib_support_sgl_algo(IMB_CIPHER_MODE alg)
>       return 0;
>  }
> 
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>  static inline int
>  single_sgl_job(IMB_JOB *job, struct rte_crypto_op *op,
>               int oop, uint32_t offset, struct rte_mbuf *m_src,
> @@ -1358,7 +1251,6 @@ single_sgl_job(IMB_JOB *job, struct rte_crypto_op
> *op,
>       job->sgl_io_segs = sgl_segs;
>       return 0;
>  }
> -#endif
> 
>  static inline int
>  multi_sgl_job(IMB_JOB *job, struct rte_crypto_op *op,
> @@ -1428,9 +1320,7 @@ set_gcm_job(IMB_MGR *mb_mgr, IMB_JOB *job,
> const uint8_t sgl,
>               job->msg_len_to_hash_in_bytes = 0;
>               job->msg_len_to_cipher_in_bytes = 0;
>               job->cipher_start_src_offset_in_bytes = 0;
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>               imb_set_session(mb_mgr, job);
> -#endif
>       } else {
>               job->hash_start_src_offset_in_bytes =
>                               op->sym->aead.data.offset;
> @@ -1458,13 +1348,11 @@ set_gcm_job(IMB_MGR *mb_mgr, IMB_JOB *job,
> const uint8_t sgl,
>               job->src = NULL;
>               job->dst = NULL;
> 
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>               if (m_src->nb_segs <= MAX_NUM_SEGS)
>                       return single_sgl_job(job, op, oop,
>                                       m_offset, m_src, m_dst,
>                                       qp_data->sgl_segs);
>               else
> -#endif
>                       return multi_sgl_job(job, op, oop,
>                                       m_offset, m_src, m_dst, mb_mgr);
>       } else {
> @@ -1554,10 +1442,6 @@ set_mb_job_params(IMB_JOB *job, struct
> ipsec_mb_qp *qp,
>       uint8_t sgl = 0;
>       uint8_t lb_sgl = 0;
> 
> -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM
> -     (void) pid;
> -#endif
> -
>       session = ipsec_mb_get_session_private(qp, op);
>       if (session == NULL) {
>               op->status = RTE_CRYPTO_OP_STATUS_INVALID_SESSION;
> @@ -1567,12 +1451,10 @@ set_mb_job_params(IMB_JOB *job, struct
> ipsec_mb_qp *qp,
>       const IMB_CIPHER_MODE cipher_mode =
>                       session->template_job.cipher_mode;
> 
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>       if (session->pid != pid) {
>               memcpy(job, &session->template_job, sizeof(IMB_JOB));
>               imb_set_session(mb_mgr, job);
>       } else if (job->session_id != session->session_id)
> -#endif
>               memcpy(job, &session->template_job, sizeof(IMB_JOB));
> 
>       if (!op->sym->m_dst) {
> @@ -1613,9 +1495,7 @@ set_mb_job_params(IMB_JOB *job, struct
> ipsec_mb_qp *qp,
>                       job->u.GCM.ctx = &qp_data->gcm_sgl_ctx;
>                       job->cipher_mode = IMB_CIPHER_GCM_SGL;
>                       job->hash_alg = IMB_AUTH_GCM_SGL;
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>                       imb_set_session(mb_mgr, job);
> -#endif
>               }
>               break;
>       case IMB_AUTH_AES_GMAC_128:
> @@ -1640,9 +1520,7 @@ set_mb_job_params(IMB_JOB *job, struct
> ipsec_mb_qp *qp,
>                       job->u.CHACHA20_POLY1305.ctx = &qp_data-
> >chacha_sgl_ctx;
>                       job->cipher_mode =
> IMB_CIPHER_CHACHA20_POLY1305_SGL;
>                       job->hash_alg =
> IMB_AUTH_CHACHA20_POLY1305_SGL;
> -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM
>                       imb_set_session(mb_mgr, job);
> -#endif
>               }
>               break;
>       default:
> @@ -1838,13 +1716,11 @@ set_mb_job_params(IMB_JOB *job, struct
> ipsec_mb_qp *qp,
>               if (lb_sgl)
>                       return handle_sgl_linear(job, op, m_offset, session);
> 
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>               if (m_src->nb_segs <= MAX_NUM_SEGS)
>                       return single_sgl_job(job, op, oop,
>                                       m_offset, m_src, m_dst,
>                                       qp_data->sgl_segs);
>               else
> -#endif
>                       return multi_sgl_job(job, op, oop,
>                                       m_offset, m_src, m_dst, mb_mgr);
>       }
> @@ -2164,7 +2040,6 @@ set_job_null_op(IMB_JOB *job, struct rte_crypto_op
> *op)
>       return job;
>  }
> 
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>  uint16_t
>  aesni_mb_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops,
>               uint16_t nb_ops)
> @@ -2297,144 +2172,7 @@ aesni_mb_dequeue_burst(void *queue_pair, struct
> rte_crypto_op **ops,
> 
>       return processed_jobs;
>  }
> -#else
> -
> -/**
> - * Process a completed IMB_JOB job and keep processing jobs until
> - * get_completed_job return NULL
> - *
> - * @param qp         Queue Pair to process
> - * @param mb_mgr     IMB_MGR to use
> - * @param job                IMB_JOB job
> - * @param ops                crypto ops to fill
> - * @param nb_ops     number of crypto ops
> - *
> - * @return
> - * - Number of processed jobs
> - */
> -static unsigned
> -handle_completed_jobs(struct ipsec_mb_qp *qp, IMB_MGR *mb_mgr,
> -             IMB_JOB *job, struct rte_crypto_op **ops,
> -             uint16_t nb_ops)
> -{
> -     struct rte_crypto_op *op = NULL;
> -     uint16_t processed_jobs = 0;
> -
> -     while (job != NULL) {
> -             op = post_process_mb_job(qp, job);
> -
> -             if (op) {
> -                     ops[processed_jobs++] = op;
> -                     qp->stats.dequeued_count++;
> -             } else {
> -                     qp->stats.dequeue_err_count++;
> -                     break;
> -             }
> -             if (processed_jobs == nb_ops)
> -                     break;
> -
> -             job = IMB_GET_COMPLETED_JOB(mb_mgr);
> -     }
> -
> -     return processed_jobs;
> -}
> -
> -static inline uint16_t
> -flush_mb_mgr(struct ipsec_mb_qp *qp, IMB_MGR *mb_mgr,
> -             struct rte_crypto_op **ops, uint16_t nb_ops)
> -{
> -     int processed_ops = 0;
> -
> -     /* Flush the remaining jobs */
> -     IMB_JOB *job = IMB_FLUSH_JOB(mb_mgr);
> -
> -     if (job)
> -             processed_ops += handle_completed_jobs(qp, mb_mgr, job,
> -                             &ops[processed_ops], nb_ops - processed_ops);
> -
> -     return processed_ops;
> -}
> -
> -uint16_t
> -aesni_mb_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops,
> -             uint16_t nb_ops)
> -{
> -     struct ipsec_mb_qp *qp = queue_pair;
> -     IMB_MGR *mb_mgr = qp->mb_mgr;
> -     struct rte_crypto_op *op;
> -     IMB_JOB *job;
> -     int retval, processed_jobs = 0;
> -     pid_t pid = 0;
> -
> -     if (unlikely(nb_ops == 0 || mb_mgr == NULL))
> -             return 0;
> -
> -     uint8_t digest_idx = qp->digest_idx;
> 
> -     do {
> -             /* Get next free mb job struct from mb manager */
> -             job = IMB_GET_NEXT_JOB(mb_mgr);
> -             if (unlikely(job == NULL)) {
> -                     /* if no free mb job structs we need to flush mb_mgr */
> -                     processed_jobs += flush_mb_mgr(qp, mb_mgr,
> -                                     &ops[processed_jobs],
> -                                     nb_ops - processed_jobs);
> -
> -                     if (nb_ops == processed_jobs)
> -                             break;
> -
> -                     job = IMB_GET_NEXT_JOB(mb_mgr);
> -             }
> -
> -             /*
> -              * Get next operation to process from ingress queue.
> -              * There is no need to return the job to the IMB_MGR
> -              * if there are no more operations to process, since the
> IMB_MGR
> -              * can use that pointer again in next get_next calls.
> -              */
> -             retval = rte_ring_dequeue(qp->ingress_queue, (void **)&op);
> -             if (retval < 0)
> -                     break;
> -
> -             if (op->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION)
> -                     retval = set_sec_mb_job_params(job, qp, op,
> -                                             &digest_idx);
> -             else
> -                     retval = set_mb_job_params(job, qp, op,
> -                             &digest_idx, mb_mgr, pid);
> -
> -             if (unlikely(retval != 0)) {
> -                     qp->stats.dequeue_err_count++;
> -                     set_job_null_op(job, op);
> -             }
> -
> -             /* Submit job to multi-buffer for processing */
> -#ifdef RTE_LIBRTE_PMD_AESNI_MB_DEBUG
> -             job = IMB_SUBMIT_JOB(mb_mgr);
> -#else
> -             job = IMB_SUBMIT_JOB_NOCHECK(mb_mgr);
> -#endif
> -             /*
> -              * If submit returns a processed job then handle it,
> -              * before submitting subsequent jobs
> -              */
> -             if (job)
> -                     processed_jobs += handle_completed_jobs(qp, mb_mgr,
> -                                     job, &ops[processed_jobs],
> -                                     nb_ops - processed_jobs);
> -
> -     } while (processed_jobs < nb_ops);
> -
> -     qp->digest_idx = digest_idx;
> -
> -     if (processed_jobs < 1)
> -             processed_jobs += flush_mb_mgr(qp, mb_mgr,
> -                             &ops[processed_jobs],
> -                             nb_ops - processed_jobs);
> -
> -     return processed_jobs;
> -}
> -#endif
>  static inline int
>  check_crypto_sgl(union rte_crypto_sym_ofs so, const struct rte_crypto_sgl 
> *sgl)
>  {
> diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
> b/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
> index d6af2d4ded..6af699bfdd 100644
> --- a/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
> +++ b/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
> @@ -17,9 +17,7 @@
>  #define HMAC_IPAD_VALUE                      (0x36)
>  #define HMAC_OPAD_VALUE                      (0x5C)
> 
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>  #define MAX_NUM_SEGS 16
> -#endif
> 
>  int
>  aesni_mb_session_configure(IMB_MGR * m __rte_unused, void *priv_sess,
> @@ -580,13 +578,8 @@ static const struct rte_cryptodev_capabilities
> aesni_mb_capabilities[] = {
>                               },
>                               .digest_size = {
>                                       .min = 4,
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>                                       .max = 16,
>                                       .increment = 4
> -#else
> -                                     .max = 4,
> -                                     .increment = 0
> -#endif
>                               },
>                               .iv_size = {
>                                       .min = 16,
> @@ -741,9 +734,7 @@ struct aesni_mb_qp_data {
>        * by the driver when verifying a digest provided
>        * by the user (using authentication verify operation)
>        */
> -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM
>       struct IMB_SGL_IOV sgl_segs[MAX_NUM_SEGS];
> -#endif
>       union {
>               struct gcm_context_data gcm_sgl_ctx;
>               struct chacha20_poly1305_context_data chacha_sgl_ctx;
> --
> 2.25.1

Reply via email to