get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/116707/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 116707,
    "url": "http://patches.dpdk.org/api/patches/116707/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20220923024023.15849-4-zhangfei.gao@linaro.org/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220923024023.15849-4-zhangfei.gao@linaro.org>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220923024023.15849-4-zhangfei.gao@linaro.org",
    "date": "2022-09-23T02:40:21",
    "name": "[v2,3/5] crypto/uadk: support cipher algorithms",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "54e8927cb27564b0313985da97d9aaf0e67d37da",
    "submitter": {
        "id": 2701,
        "url": "http://patches.dpdk.org/api/people/2701/?format=api",
        "name": "Zhangfei Gao",
        "email": "zhangfei.gao@linaro.org"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20220923024023.15849-4-zhangfei.gao@linaro.org/mbox/",
    "series": [
        {
            "id": 24792,
            "url": "http://patches.dpdk.org/api/series/24792/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=24792",
            "date": "2022-09-23T02:40:18",
            "name": "crypto/uadk: introduce uadk crypto driver",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/24792/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/116707/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/116707/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 54836A054A;\n\tFri, 23 Sep 2022 04:41:01 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 604F042B6E;\n\tFri, 23 Sep 2022 04:41:00 +0200 (CEST)",
            "from mail-pl1-f174.google.com (mail-pl1-f174.google.com\n [209.85.214.174])\n by mails.dpdk.org (Postfix) with ESMTP id 908B142836\n for <dev@dpdk.org>; Fri, 23 Sep 2022 04:40:59 +0200 (CEST)",
            "by mail-pl1-f174.google.com with SMTP id t3so10554531ply.2\n for <dev@dpdk.org>; Thu, 22 Sep 2022 19:40:59 -0700 (PDT)",
            "from localhost.localdomain ([199.101.192.56])\n by smtp.gmail.com with ESMTPSA id\n t5-20020a625f05000000b0053e8940c4absm5075011pfb.209.2022.09.22.19.40.50\n (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);\n Thu, 22 Sep 2022 19:40:58 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date;\n bh=47GX/bSxDO5Dj/HGxysTpVv0eGr5z+i20Q/9QaKJEcE=;\n b=A9kKS2HqfIDmaRO515rRGWd/gOldU0SxiQoBPFAxEuJ/uVvSFYaGYA1ugvgNKGtyYX\n Bkr6C6Onm8vvVcUWKlFKxFGjHKxIl64zEeJ/jTXlXVaL8651wB+JhPGxrKt4zlpYPUHO\n tNoqeo3Pq5PwFf5nveN8t3Hb6WLlSqXwh9Y6hYdSKPiLoHd+4E//AuyvAWZ97A1kl7fu\n WrzIPVxuJxgLvqGY5/VQFolnU40zZuc96vbU48GBF/z/1Eij8lWYCmzf56JEHkU1bRFu\n neh1YxTxraQqo68T1b2TWHDPqBzlHt7JJpEvf2VYMnZsuHUVdifQRorCyXq0ZaZ5bBZi\n xnJw==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20210112;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc\n :subject:date;\n bh=47GX/bSxDO5Dj/HGxysTpVv0eGr5z+i20Q/9QaKJEcE=;\n b=gsvjbXoZ2HpDCvq49JDCn7GbPQZy5IfwYGhIIJJqt3TfxxMUmzJkqYIevqb3qVisQG\n Yy2xshr3jHTyNP1IIxJ4kBp8bbwWjj8/fHgLP9ehuckSsLmFGJoTldBqYu2sDsE3xHi1\n 6rZKGhXDklQ3RqsLkQ/jALuiFSKdPTKnUCdB7ZXvk3J5jlwBZr/k3XrZSB96/RFP3RPh\n oMVNUtKe4iH5wPX3MJJfWZVxYNAgcp0wkrwq++64Se7ot3hsdNiYJMmfKJaPJkiQsgFR\n PxHbTT1IKhWybkGIf0hijsaOHwYAv8+zx7H8iOPAHcuwo0sGU8F/nSmZlshAoAYU/FTx\n C7PA==",
        "X-Gm-Message-State": "ACrzQf2kur8IaJeOcSf0sJk+tyWKSRbmYvUCt/OGRL1lnWJhCo5RZaey\n xXEjOAv+YaB1RKLrw5+R3FbskReCf0X9GLP4",
        "X-Google-Smtp-Source": "\n AMsMyM56Khuux8ee0UpGwWyZxP7JrjGPusaLtMDxrpvectTnhmv/sbkYhcuIJRCV9KC1WwdPYhqTdw==",
        "X-Received": "by 2002:a17:90b:1bc3:b0:203:84d:59b1 with SMTP id\n oa3-20020a17090b1bc300b00203084d59b1mr18889570pjb.37.1663900858915;\n Thu, 22 Sep 2022 19:40:58 -0700 (PDT)",
        "From": "Zhangfei Gao <zhangfei.gao@linaro.org>",
        "To": "Akhil Goyal <gakhil@marvell.com>,\n Declan Doherty <declan.doherty@intel.com>,\n Fan Zhang <roy.fan.zhang@intel.com>,\n Ashish Gupta <ashish.gupta@marvell.com>, Ray Kinsella <mdr@ashroe.eu>",
        "Cc": "dev@dpdk.org,\n\tacc@openeuler.org,\n\tZhangfei Gao <zhangfei.gao@linaro.org>",
        "Subject": "[PATCH v2 3/5] crypto/uadk: support cipher algorithms",
        "Date": "Fri, 23 Sep 2022 10:40:21 +0800",
        "Message-Id": "<20220923024023.15849-4-zhangfei.gao@linaro.org>",
        "X-Mailer": "git-send-email 2.36.1",
        "In-Reply-To": "<20220923024023.15849-1-zhangfei.gao@linaro.org>",
        "References": "<20220923024023.15849-1-zhangfei.gao@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Cipher algorithms:\n\n* ``RTE_CRYPTO_CIPHER_AES_ECB``\n* ``RTE_CRYPTO_CIPHER_AES_CBC``\n* ``RTE_CRYPTO_CIPHER_AES_XTS``\n* ``RTE_CRYPTO_CIPHER_DES_CBC``\n\nSigned-off-by: Zhangfei Gao <zhangfei.gao@linaro.org>\n---\n drivers/crypto/uadk/uadk_crypto_pmd.c | 254 +++++++++++++++++++++++++-\n 1 file changed, 252 insertions(+), 2 deletions(-)",
    "diff": "diff --git a/drivers/crypto/uadk/uadk_crypto_pmd.c b/drivers/crypto/uadk/uadk_crypto_pmd.c\nindex aad42524d6..592d747a5d 100644\n--- a/drivers/crypto/uadk/uadk_crypto_pmd.c\n+++ b/drivers/crypto/uadk/uadk_crypto_pmd.c\n@@ -30,11 +30,26 @@ struct uadk_qp {\n } __rte_cache_aligned;\n \n enum uadk_chain_order {\n+\tUADK_CHAIN_ONLY_CIPHER,\n \tUADK_CHAIN_NOT_SUPPORTED\n };\n \n struct uadk_crypto_session {\n+\thandle_t handle_cipher;\n \tenum uadk_chain_order chain_order;\n+\n+\t/* IV parameters */\n+\tstruct {\n+\t\tuint16_t length;\n+\t\tuint16_t offset;\n+\t} iv;\n+\n+\t/* Cipher Parameters */\n+\tstruct {\n+\t\tenum rte_crypto_cipher_operation direction;\n+\t\t/* cipher operation direction */\n+\t\tstruct wd_cipher_req req;\n+\t} cipher;\n } __rte_cache_aligned;\n \n enum uadk_crypto_version {\n@@ -43,6 +58,7 @@ enum uadk_crypto_version {\n };\n \n struct uadk_crypto_priv {\n+\tbool env_cipher_init;\n \tenum uadk_crypto_version version;\n } __rte_cache_aligned;\n \n@@ -56,6 +72,86 @@ RTE_LOG_REGISTER_DEFAULT(uadk_crypto_logtype, INFO);\n \t\t## __VA_ARGS__)\n \n static const struct rte_cryptodev_capabilities uadk_crypto_v2_capabilities[] = {\n+\t{\t/* AES ECB */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CBC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES XTS */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_XTS,\n+\t\t\t\t.block_size = 1,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 32\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* DES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_DES_CBC,\n+\t\t\t\t.block_size = 8,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t/* End of symmetric capabilities */\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n@@ -83,8 +179,15 @@ uadk_crypto_pmd_stop(struct rte_cryptodev *dev __rte_unused)\n \n /* Close device */\n static int\n-uadk_crypto_pmd_close(struct rte_cryptodev *dev __rte_unused)\n+uadk_crypto_pmd_close(struct rte_cryptodev *dev)\n {\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\n+\tif (priv->env_cipher_init) {\n+\t\twd_cipher_env_uninit();\n+\t\tpriv->env_cipher_init = false;\n+\t}\n+\n \treturn 0;\n }\n \n@@ -238,19 +341,107 @@ uadk_crypto_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)\n }\n \n static enum uadk_chain_order\n-uadk_get_chain_order(const struct rte_crypto_sym_xform *xform __rte_unused)\n+uadk_get_chain_order(const struct rte_crypto_sym_xform *xform)\n {\n \tenum uadk_chain_order res = UADK_CHAIN_NOT_SUPPORTED;\n \n+\tif (xform != NULL) {\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n+\t\t\tif (xform->next == NULL)\n+\t\t\t\tres = UADK_CHAIN_ONLY_CIPHER;\n+\t\t}\n+\t}\n+\n \treturn res;\n }\n \n+static int\n+uadk_set_session_cipher_parameters(struct rte_cryptodev *dev,\n+\t\t\t\t   struct uadk_crypto_session *sess,\n+\t\t\t\t   struct rte_crypto_sym_xform *xform)\n+{\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\tstruct rte_crypto_cipher_xform *cipher = &xform->cipher;\n+\tstruct wd_cipher_sess_setup setup = {0};\n+\tstruct sched_params params = {0};\n+\tint ret;\n+\n+\tif (!priv->env_cipher_init) {\n+\t\tret = wd_cipher_env_init(NULL);\n+\t\tif (ret < 0)\n+\t\t\treturn -EINVAL;\n+\t\tpriv->env_cipher_init = true;\n+\t}\n+\n+\tsess->cipher.direction = cipher->op;\n+\tsess->iv.offset = cipher->iv.offset;\n+\tsess->iv.length = cipher->iv.length;\n+\n+\tswitch (cipher->algo) {\n+\t/* Cover supported cipher algorithms */\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CTR;\n+\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_ECB;\n+\t\tsess->cipher.req.out_bytes = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CBC;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 16;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_XTS;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 32;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 512;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -ENOTSUP;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tparams.numa_id = -1;\t/* choose nearby numa node */\n+\tsetup.sched_param = &params;\n+\tsess->handle_cipher = wd_cipher_alloc_sess(&setup);\n+\tif (!sess->handle_cipher) {\n+\t\tUADK_LOG(ERR, \"uadk failed to alloc session!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tret = wd_cipher_set_key(sess->handle_cipher, cipher->key.data, cipher->key.length);\n+\tif (ret) {\n+\t\twd_cipher_free_sess(sess->handle_cipher);\n+\t\tUADK_LOG(ERR, \"uadk failed to set key!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\treturn 0;\n+\n+env_uninit:\n+\twd_cipher_env_uninit();\n+\tpriv->env_cipher_init = false;\n+\treturn ret;\n+}\n+\n static int\n uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \t\t\t\t  struct rte_crypto_sym_xform *xform,\n \t\t\t\t  struct rte_cryptodev_sym_session *session,\n \t\t\t\t  struct rte_mempool *mp)\n {\n+\tstruct rte_crypto_sym_xform *cipher_xform = NULL;\n \tstruct uadk_crypto_session *sess;\n \tint ret;\n \n@@ -263,11 +454,23 @@ uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \n \tsess->chain_order = uadk_get_chain_order(xform);\n \tswitch (sess->chain_order) {\n+\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\tcipher_xform = xform;\n+\t\tbreak;\n \tdefault:\n \t\tret = -ENOTSUP;\n \t\tgoto err;\n \t}\n \n+\tif (cipher_xform) {\n+\t\tret = uadk_set_session_cipher_parameters(dev, sess, cipher_xform);\n+\t\tif (ret != 0) {\n+\t\t\tUADK_LOG(ERR,\n+\t\t\t\t\"Invalid/unsupported cipher parameters\");\n+\t\t\tgoto err;\n+\t\t}\n+\t}\n+\n \tset_sym_session_private_data(session, dev->driver_id, sess);\n \n \treturn 0;\n@@ -288,6 +491,11 @@ uadk_crypto_sym_session_clear(struct rte_cryptodev *dev,\n \t\treturn;\n \t}\n \n+\tif (priv_sess->handle_cipher) {\n+\t\twd_cipher_free_sess(priv_sess->handle_cipher);\n+\t\tpriv_sess->handle_cipher = 0;\n+\t}\n+\n \tset_sym_session_private_data(sess, dev->driver_id, NULL);\n \trte_mempool_put(rte_mempool_from_obj(priv_sess), priv_sess);\n }\n@@ -307,12 +515,49 @@ static struct rte_cryptodev_ops uadk_crypto_pmd_ops = {\n \t\t.sym_session_clear\t= uadk_crypto_sym_session_clear,\n };\n \n+static void\n+uadk_process_cipher_op(struct rte_crypto_op *op,\n+\t\t       struct uadk_crypto_session *sess,\n+\t\t       struct rte_mbuf *msrc, struct rte_mbuf *mdst)\n+{\n+\tuint32_t off = op->sym->cipher.data.offset;\n+\tint ret;\n+\n+\tif (!sess) {\n+\t\top->status = RTE_COMP_OP_STATUS_INVALID_ARGS;\n+\t\treturn;\n+\t}\n+\n+\tsess->cipher.req.src = rte_pktmbuf_mtod_offset(msrc, uint8_t *, off);\n+\tsess->cipher.req.in_bytes = op->sym->cipher.data.length;\n+\tsess->cipher.req.dst = rte_pktmbuf_mtod_offset(mdst, uint8_t *, off);\n+\tsess->cipher.req.out_buf_bytes = sess->cipher.req.in_bytes;\n+\tsess->cipher.req.iv_bytes = sess->iv.length;\n+\tsess->cipher.req.iv = rte_crypto_op_ctod_offset(op, uint8_t *,\n+\t\t\t\t\t\t\tsess->iv.offset);\n+\tif (sess->cipher.direction == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cipher.req.op_type = WD_CIPHER_ENCRYPTION;\n+\telse\n+\t\tsess->cipher.req.op_type = WD_CIPHER_DECRYPTION;\n+\n+\tdo {\n+\t\tret = wd_do_cipher_sync(sess->handle_cipher, &sess->cipher.req);\n+\t} while (ret == -WD_EBUSY);\n+\n+\tif (sess->cipher.req.out_buf_bytes > sess->cipher.req.in_bytes)\n+\t\top->status = RTE_COMP_OP_STATUS_OUT_OF_SPACE_TERMINATED;\n+\n+\tif (ret)\n+\t\top->status = RTE_COMP_OP_STATUS_ERROR;\n+}\n+\n static uint16_t\n uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\t\t  uint16_t nb_ops)\n {\n \tstruct uadk_qp *qp = queue_pair;\n \tstruct uadk_crypto_session *sess = NULL;\n+\tstruct rte_mbuf *msrc, *mdst;\n \tstruct rte_crypto_op *op;\n \tuint16_t enqd = 0;\n \tint i, ret;\n@@ -320,6 +565,8 @@ uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \tfor (i = 0; i < nb_ops; i++) {\n \t\top = ops[i];\n \t\top->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;\n+\t\tmsrc = op->sym->m_src;\n+\t\tmdst = op->sym->m_dst ? op->sym->m_dst : op->sym->m_src;\n \n \t\tif (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {\n \t\t\tif (likely(op->sym->session != NULL))\n@@ -330,6 +577,9 @@ uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\t}\n \n \t\tswitch (sess->chain_order) {\n+\t\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n+\t\t\tbreak;\n \t\tdefault:\n \t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n \t\t\tbreak;\n",
    "prefixes": [
        "v2",
        "3/5"
    ]
}