Please disregard the patch. Didn't realizes commented changes for meson.
> -----Original Message-----
> From: Gujjar, Abhinandan S <abhinandan.guj...@intel.com>
> Sent: Thursday, September 17, 2020 6:28 AM
> To: dev@dpdk.org; jer...@marvell.com
> Cc: Vangati, Narender <narender.vang...@intel.com>; Gujjar, Abhinandan S
> <abhinandan.guj...@intel.com>
> Subject: [PATCH] test/event_crypto_adapter: fix conf issue
>
> This patch updates the xform with right configuration.
> For session based ops, sym session pool is created with valid userdata size.
>
> Signed-off-by: Abhinandan Gujjar <abhinandan.guj...@intel.com>
>
> ---
> app/test/test_event_crypto_adapter.c | 24 +++++-------------------
> drivers/crypto/meson.build | 12 ++++++------
> 2 files changed, 11 insertions(+), 25 deletions(-)
>
> diff --git a/app/test/test_event_crypto_adapter.c
> b/app/test/test_event_crypto_adapter.c
> index 8d42462..530ce96 100644
> --- a/app/test/test_event_crypto_adapter.c
> +++ b/app/test/test_event_crypto_adapter.c
> @@ -171,7 +171,6 @@ struct rte_event_crypto_request request_info = {
> struct rte_event ev;
> uint32_t cap;
> int ret;
> - uint8_t cipher_key[17];
>
> memset(&m_data, 0, sizeof(m_data));
>
> @@ -183,14 +182,7 @@ struct rte_event_crypto_request request_info = {
> /* Setup Cipher Parameters */
> cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> cipher_xform.next = NULL;
> -
> - cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
> - cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
> -
> - cipher_xform.cipher.key.data = cipher_key;
> - cipher_xform.cipher.key.length = 16;
> - cipher_xform.cipher.iv.offset = IV_OFFSET;
> - cipher_xform.cipher.iv.length = 16;
> + cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
>
> op = rte_crypto_op_alloc(params.op_mpool,
> RTE_CRYPTO_OP_TYPE_SYMMETRIC);
> @@ -378,7 +370,6 @@ struct rte_event_crypto_request request_info = {
> struct rte_mbuf *m;
> uint32_t cap;
> int ret;
> - uint8_t cipher_key[17];
>
> memset(&m_data, 0, sizeof(m_data));
>
> @@ -390,14 +381,7 @@ struct rte_event_crypto_request request_info = {
> /* Setup Cipher Parameters */
> cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> cipher_xform.next = NULL;
> -
> - cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
> - cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
> -
> - cipher_xform.cipher.key.data = cipher_key;
> - cipher_xform.cipher.key.length = 16;
> - cipher_xform.cipher.iv.offset = IV_OFFSET;
> - cipher_xform.cipher.iv.length = 16;
> + cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
>
> op = rte_crypto_op_alloc(params.op_mpool,
> RTE_CRYPTO_OP_TYPE_SYMMETRIC);
> @@ -564,7 +548,9 @@ struct rte_event_crypto_request request_info = {
>
> params.session_mpool = rte_cryptodev_sym_session_pool_create(
> "CRYPTO_ADAPTER_SESSION_MP",
> - MAX_NB_SESSIONS, 0, 0, 0, SOCKET_ID_ANY);
> + MAX_NB_SESSIONS, 0, 0,
> + sizeof(union rte_event_crypto_metadata),
> + SOCKET_ID_ANY);
> TEST_ASSERT_NOT_NULL(params.session_mpool,
> "session mempool allocation failed\n");
>
> diff --git a/drivers/crypto/meson.build b/drivers/crypto/meson.build index
> a242350..149a8e1 100644
> --- a/drivers/crypto/meson.build
> +++ b/drivers/crypto/meson.build
> @@ -5,14 +5,14 @@ if is_windows
> subdir_done()
> endif
>
> -drivers = ['aesni_gcm',
> - 'aesni_mb',
> +drivers = [#'aesni_gcm',
> + #'aesni_mb',
> 'armv8',
> 'caam_jr',
> 'ccp',
> 'dpaa_sec',
> 'dpaa2_sec',
> - 'kasumi',
> + # 'kasumi',
> 'mvsam',
> 'nitrox',
> 'null',
> @@ -21,9 +21,9 @@ drivers = ['aesni_gcm',
> 'openssl',
> 'qat',
> 'scheduler',
> - 'snow3g',
> - 'virtio',
> - 'zuc']
> + #'snow3g',
> + 'virtio']
> + #'zuc']
>
> std_deps = ['cryptodev'] # cryptodev pulls in all other needed deps
> config_flag_fmt = 'RTE_LIBRTE_@0@_PMD'
> --
> 1.9.1