get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/117093/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 117093,
    "url": "https://patches.dpdk.org/api/patches/117093/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20220929032746.10659-5-zhangfei.gao@linaro.org/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220929032746.10659-5-zhangfei.gao@linaro.org>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220929032746.10659-5-zhangfei.gao@linaro.org",
    "date": "2022-09-29T03:27:44",
    "name": "[v3,4/6] crypto/uadk: support cipher algorithms",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "3eb77144ed58660b7ec6abccd8f83aae8e448052",
    "submitter": {
        "id": 2701,
        "url": "https://patches.dpdk.org/api/people/2701/?format=api",
        "name": "Zhangfei Gao",
        "email": "zhangfei.gao@linaro.org"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20220929032746.10659-5-zhangfei.gao@linaro.org/mbox/",
    "series": [
        {
            "id": 24894,
            "url": "https://patches.dpdk.org/api/series/24894/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=24894",
            "date": "2022-09-29T03:27:40",
            "name": "crypto/uadk: introduce uadk crypto driver",
            "version": 3,
            "mbox": "https://patches.dpdk.org/series/24894/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/117093/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/117093/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id C0EB5A00C4;\n\tThu, 29 Sep 2022 05:28:23 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id DBD3941156;\n\tThu, 29 Sep 2022 05:28:21 +0200 (CEST)",
            "from mail-pl1-f181.google.com (mail-pl1-f181.google.com\n [209.85.214.181])\n by mails.dpdk.org (Postfix) with ESMTP id 173DC41156\n for <dev@dpdk.org>; Thu, 29 Sep 2022 05:28:21 +0200 (CEST)",
            "by mail-pl1-f181.google.com with SMTP id d11so145313pll.8\n for <dev@dpdk.org>; Wed, 28 Sep 2022 20:28:21 -0700 (PDT)",
            "from localhost.localdomain ([45.128.198.71])\n by smtp.gmail.com with ESMTPSA id\n gn4-20020a17090ac78400b001fd66d5c42csm2304271pjb.49.2022.09.28.20.28.15\n (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);\n Wed, 28 Sep 2022 20:28:19 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date;\n bh=80Q6NAXWkSzkrecz0WBIiJ7Vi8r454Ln1lJWXnlFNw4=;\n b=KCSbvBtFp6mFwIajR4GvOZjI+Ex1nucMGZt7ECoQvFHXZrL07nJOUz9Dby3T0zX3zo\n O3shqWzxZsqh8nCN97ID4u5vXAYEUvRmy0+AaHMU+wFOOMlOKgKbjsAx7BG7QU3A2p3t\n NZ0ntk443FJgq8u4tNX5ktQmn/DKl+q8Q3L6Fm1d7jQxFYTA9PUB41C00WTbtwI7NOph\n A05x6dqK2XjVL3TGLkMzizzZVNlTRIzDIXr5tllD2oFzw7SM/nHsUlO22dW5SVq2PhXv\n FdHKKRpMfeK6Rgynh622RfDQUEimtL9b4IpAMf47r57ewvWNaO22R01hrqcpUtBqGgHa\n ktgA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20210112;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc\n :subject:date;\n bh=80Q6NAXWkSzkrecz0WBIiJ7Vi8r454Ln1lJWXnlFNw4=;\n b=kHnz38XRfXSgT09YAVNV8hEkZYA2/2paOHdFxpxY6ZrMzrPD2G8zYnCQ0r9isXfbay\n SprQbdzKjvQUUVPyUYgGaW84Rc+1KL+q4UNyke7uPItnpZX5WJNpV3zygc737OscQMWR\n DBrzlpcAvCyn5yZCtgWnDUMpoXJmU+oT32rccdDgVJMbMMgZJ1tApB+dwiWYO9V4LRNH\n cylYsQ2WJRqFglsxdJgQjXOvF1srHbL1cArHNQpX8K7ijtiUSLhw1DJQRFIvGY79PwwF\n SyGExzhFJLZq45eTTNASlDxXEJrN1ejDcJWrRU1Z1WTti6Wyhgur4kduZ3Vf+m09snt+\n NlCw==",
        "X-Gm-Message-State": "ACrzQf2r9CLFneHnWVzo83rfL/JSKj9++662/twstSOnSrw08+79x5hZ\n zap0gO+mBLSbu+uZGQsq9xdLtg==",
        "X-Google-Smtp-Source": "\n AMsMyM63C78fM/7QVUwTd50XeIaqDAMzjMJUnwG/A+fAQkyvympSRZBBf1KeD/dkFifV/tXhbej35A==",
        "X-Received": "by 2002:a17:902:d2d0:b0:178:329d:a5ed with SMTP id\n n16-20020a170902d2d000b00178329da5edmr1328847plc.142.1664422100275;\n Wed, 28 Sep 2022 20:28:20 -0700 (PDT)",
        "From": "Zhangfei Gao <zhangfei.gao@linaro.org>",
        "To": "Akhil Goyal <gakhil@marvell.com>,\n Declan Doherty <declan.doherty@intel.com>,\n Fan Zhang <roy.fan.zhang@intel.com>,\n Ashish Gupta <ashish.gupta@marvell.com>, Ray Kinsella <mdr@ashroe.eu>",
        "Cc": "dev@dpdk.org,\n\tacc@openeuler.org,\n\tZhangfei Gao <zhangfei.gao@linaro.org>",
        "Subject": "[PATCH v3 4/6] crypto/uadk: support cipher algorithms",
        "Date": "Thu, 29 Sep 2022 11:27:44 +0800",
        "Message-Id": "<20220929032746.10659-5-zhangfei.gao@linaro.org>",
        "X-Mailer": "git-send-email 2.36.1",
        "In-Reply-To": "<20220929032746.10659-1-zhangfei.gao@linaro.org>",
        "References": "<20220929032746.10659-1-zhangfei.gao@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Cipher algorithms:\n\n* ``RTE_CRYPTO_CIPHER_AES_ECB``\n* ``RTE_CRYPTO_CIPHER_AES_CBC``\n* ``RTE_CRYPTO_CIPHER_AES_XTS``\n* ``RTE_CRYPTO_CIPHER_DES_CBC``\n\nSigned-off-by: Zhangfei Gao <zhangfei.gao@linaro.org>\n---\n doc/guides/cryptodevs/features/uadk.ini |  10 +\n doc/guides/cryptodevs/uadk.rst          |   6 +\n drivers/crypto/uadk/uadk_crypto_pmd.c   | 345 +++++++++++++++++++++++-\n 3 files changed, 356 insertions(+), 5 deletions(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/uadk.ini b/doc/guides/cryptodevs/features/uadk.ini\nindex df5ad40e3d..005e08ac8d 100644\n--- a/doc/guides/cryptodevs/features/uadk.ini\n+++ b/doc/guides/cryptodevs/features/uadk.ini\n@@ -4,12 +4,22 @@\n ; Refer to default.ini for the full list of available PMD features.\n ;\n [Features]\n+Symmetric crypto       = Y\n HW Accelerated         = Y\n \n ;\n ; Supported crypto algorithms of the 'uadk' crypto driver.\n ;\n [Cipher]\n+AES CBC (128)  = Y\n+AES CBC (192)  = Y\n+AES CBC (256)  = Y\n+AES ECB (128)  = Y\n+AES ECB (192)  = Y\n+AES ECB (256)  = Y\n+AES XTS (128)  = Y\n+AES XTS (256)  = Y\n+DES CBC        = Y\n \n ;\n ; Supported authentication algorithms of the 'uadk' crypto driver.\ndiff --git a/doc/guides/cryptodevs/uadk.rst b/doc/guides/cryptodevs/uadk.rst\nindex a170224cac..054f5103cc 100644\n--- a/doc/guides/cryptodevs/uadk.rst\n+++ b/doc/guides/cryptodevs/uadk.rst\n@@ -15,6 +15,12 @@ Features\n \n UADK crypto PMD has support for:\n \n+Cipher algorithms:\n+\n+* ``RTE_CRYPTO_CIPHER_AES_ECB``\n+* ``RTE_CRYPTO_CIPHER_AES_CBC``\n+* ``RTE_CRYPTO_CIPHER_AES_XTS``\n+* ``RTE_CRYPTO_CIPHER_DES_CBC``\n \n Test steps\n -----------\ndiff --git a/drivers/crypto/uadk/uadk_crypto_pmd.c b/drivers/crypto/uadk/uadk_crypto_pmd.c\nindex 99a10e7d77..bf9fb1f6ce 100644\n--- a/drivers/crypto/uadk/uadk_crypto_pmd.c\n+++ b/drivers/crypto/uadk/uadk_crypto_pmd.c\n@@ -29,12 +29,35 @@ struct uadk_qp {\n \tuint8_t temp_digest[DIGEST_LENGTH_MAX];\n } __rte_cache_aligned;\n \n+enum uadk_chain_order {\n+\tUADK_CHAIN_ONLY_CIPHER,\n+\tUADK_CHAIN_NOT_SUPPORTED\n+};\n+\n+struct uadk_crypto_session {\n+\thandle_t handle_cipher;\n+\tenum uadk_chain_order chain_order;\n+\n+\t/* IV parameters */\n+\tstruct {\n+\t\tuint16_t length;\n+\t\tuint16_t offset;\n+\t} iv;\n+\n+\t/* Cipher Parameters */\n+\tstruct {\n+\t\tenum rte_crypto_cipher_operation direction;\n+\t\tstruct wd_cipher_req req;\n+\t} cipher;\n+} __rte_cache_aligned;\n+\n enum uadk_crypto_version {\n \tUADK_CRYPTO_V2,\n \tUADK_CRYPTO_V3,\n };\n \n struct uadk_crypto_priv {\n+\tbool env_cipher_init;\n \tenum uadk_crypto_version version;\n } __rte_cache_aligned;\n \n@@ -48,6 +71,86 @@ RTE_LOG_REGISTER_DEFAULT(uadk_crypto_logtype, INFO);\n \t\t## __VA_ARGS__)\n \n static const struct rte_cryptodev_capabilities uadk_crypto_v2_capabilities[] = {\n+\t{\t/* AES ECB */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CBC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES XTS */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_XTS,\n+\t\t\t\t.block_size = 1,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 32\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* DES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_DES_CBC,\n+\t\t\t\t.block_size = 8,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t/* End of capabilities */\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n@@ -75,8 +178,15 @@ uadk_crypto_pmd_stop(struct rte_cryptodev *dev __rte_unused)\n \n /* Close device */\n static int\n-uadk_crypto_pmd_close(struct rte_cryptodev *dev __rte_unused)\n+uadk_crypto_pmd_close(struct rte_cryptodev *dev)\n {\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\n+\tif (priv->env_cipher_init) {\n+\t\twd_cipher_env_uninit();\n+\t\tpriv->env_cipher_init = false;\n+\t}\n+\n \treturn 0;\n }\n \n@@ -223,6 +333,172 @@ uadk_crypto_pmd_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id,\n \treturn -EINVAL;\n }\n \n+static unsigned int\n+uadk_crypto_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)\n+{\n+\treturn sizeof(struct uadk_crypto_session);\n+}\n+\n+static enum uadk_chain_order\n+uadk_get_chain_order(const struct rte_crypto_sym_xform *xform)\n+{\n+\tenum uadk_chain_order res = UADK_CHAIN_NOT_SUPPORTED;\n+\n+\tif (xform != NULL) {\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n+\t\t\tif (xform->next == NULL)\n+\t\t\t\tres = UADK_CHAIN_ONLY_CIPHER;\n+\t\t}\n+\t}\n+\n+\treturn res;\n+}\n+\n+static int\n+uadk_set_session_cipher_parameters(struct rte_cryptodev *dev,\n+\t\t\t\t   struct uadk_crypto_session *sess,\n+\t\t\t\t   struct rte_crypto_sym_xform *xform)\n+{\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\tstruct rte_crypto_cipher_xform *cipher = &xform->cipher;\n+\tstruct wd_cipher_sess_setup setup = {0};\n+\tstruct sched_params params = {0};\n+\tint ret;\n+\n+\tif (!priv->env_cipher_init) {\n+\t\tret = wd_cipher_env_init(NULL);\n+\t\tif (ret < 0)\n+\t\t\treturn -EINVAL;\n+\t\tpriv->env_cipher_init = true;\n+\t}\n+\n+\tsess->cipher.direction = cipher->op;\n+\tsess->iv.offset = cipher->iv.offset;\n+\tsess->iv.length = cipher->iv.length;\n+\n+\tswitch (cipher->algo) {\n+\t/* Cover supported cipher algorithms */\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CTR;\n+\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_ECB;\n+\t\tsess->cipher.req.out_bytes = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CBC;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 16;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_XTS;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 32;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 512;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -ENOTSUP;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tparams.numa_id = -1;\t/* choose nearby numa node */\n+\tsetup.sched_param = &params;\n+\tsess->handle_cipher = wd_cipher_alloc_sess(&setup);\n+\tif (!sess->handle_cipher) {\n+\t\tUADK_LOG(ERR, \"uadk failed to alloc session!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tret = wd_cipher_set_key(sess->handle_cipher, cipher->key.data, cipher->key.length);\n+\tif (ret) {\n+\t\twd_cipher_free_sess(sess->handle_cipher);\n+\t\tUADK_LOG(ERR, \"uadk failed to set key!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\treturn 0;\n+\n+env_uninit:\n+\twd_cipher_env_uninit();\n+\tpriv->env_cipher_init = false;\n+\treturn ret;\n+}\n+\n+static int\n+uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n+\t\t\t\t  struct rte_crypto_sym_xform *xform,\n+\t\t\t\t  struct rte_cryptodev_sym_session *session,\n+\t\t\t\t  struct rte_mempool *mp)\n+{\n+\tstruct rte_crypto_sym_xform *cipher_xform = NULL;\n+\tstruct uadk_crypto_session *sess;\n+\tint ret;\n+\n+\tret = rte_mempool_get(mp, (void *)&sess);\n+\tif (ret != 0) {\n+\t\tUADK_LOG(ERR, \"Failed to get session %p private data from mempool\",\n+\t\t\t sess);\n+\t\treturn -ENOMEM;\n+\t}\n+\n+\tsess->chain_order = uadk_get_chain_order(xform);\n+\tswitch (sess->chain_order) {\n+\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\tcipher_xform = xform;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -ENOTSUP;\n+\t\tgoto err;\n+\t}\n+\n+\tif (cipher_xform) {\n+\t\tret = uadk_set_session_cipher_parameters(dev, sess, cipher_xform);\n+\t\tif (ret != 0) {\n+\t\t\tUADK_LOG(ERR,\n+\t\t\t\t\"Invalid/unsupported cipher parameters\");\n+\t\t\tgoto err;\n+\t\t}\n+\t}\n+\n+\tset_sym_session_private_data(session, dev->driver_id, sess);\n+\n+\treturn 0;\n+err:\n+\trte_mempool_put(mp, sess);\n+\treturn ret;\n+}\n+\n+static void\n+uadk_crypto_sym_session_clear(struct rte_cryptodev *dev,\n+\t\t\t      struct rte_cryptodev_sym_session *sess)\n+{\n+\tstruct uadk_crypto_session *priv_sess =\n+\t\t\tget_sym_session_private_data(sess, dev->driver_id);\n+\n+\tif (unlikely(priv_sess == NULL)) {\n+\t\tUADK_LOG(ERR, \"Failed to get session %p private data.\", priv_sess);\n+\t\treturn;\n+\t}\n+\n+\tif (priv_sess->handle_cipher) {\n+\t\twd_cipher_free_sess(priv_sess->handle_cipher);\n+\t\tpriv_sess->handle_cipher = 0;\n+\t}\n+\n+\tset_sym_session_private_data(sess, dev->driver_id, NULL);\n+\trte_mempool_put(rte_mempool_from_obj(priv_sess), priv_sess);\n+}\n+\n static struct rte_cryptodev_ops uadk_crypto_pmd_ops = {\n \t\t.dev_configure\t\t= uadk_crypto_pmd_config,\n \t\t.dev_start\t\t= uadk_crypto_pmd_start,\n@@ -233,16 +509,54 @@ static struct rte_cryptodev_ops uadk_crypto_pmd_ops = {\n \t\t.dev_infos_get\t\t= uadk_crypto_pmd_info_get,\n \t\t.queue_pair_setup\t= uadk_crypto_pmd_qp_setup,\n \t\t.queue_pair_release\t= uadk_crypto_pmd_qp_release,\n-\t\t.sym_session_get_size\t= NULL,\n-\t\t.sym_session_configure\t= NULL,\n-\t\t.sym_session_clear\t= NULL,\n+\t\t.sym_session_get_size\t= uadk_crypto_sym_session_get_size,\n+\t\t.sym_session_configure\t= uadk_crypto_sym_session_configure,\n+\t\t.sym_session_clear\t= uadk_crypto_sym_session_clear,\n };\n \n+static void\n+uadk_process_cipher_op(struct rte_crypto_op *op,\n+\t\t       struct uadk_crypto_session *sess,\n+\t\t       struct rte_mbuf *msrc, struct rte_mbuf *mdst)\n+{\n+\tuint32_t off = op->sym->cipher.data.offset;\n+\tint ret;\n+\n+\tif (!sess) {\n+\t\top->status = RTE_COMP_OP_STATUS_INVALID_ARGS;\n+\t\treturn;\n+\t}\n+\n+\tsess->cipher.req.src = rte_pktmbuf_mtod_offset(msrc, uint8_t *, off);\n+\tsess->cipher.req.in_bytes = op->sym->cipher.data.length;\n+\tsess->cipher.req.dst = rte_pktmbuf_mtod_offset(mdst, uint8_t *, off);\n+\tsess->cipher.req.out_buf_bytes = sess->cipher.req.in_bytes;\n+\tsess->cipher.req.iv_bytes = sess->iv.length;\n+\tsess->cipher.req.iv = rte_crypto_op_ctod_offset(op, uint8_t *,\n+\t\t\t\t\t\t\tsess->iv.offset);\n+\tif (sess->cipher.direction == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cipher.req.op_type = WD_CIPHER_ENCRYPTION;\n+\telse\n+\t\tsess->cipher.req.op_type = WD_CIPHER_DECRYPTION;\n+\n+\tdo {\n+\t\tret = wd_do_cipher_sync(sess->handle_cipher, &sess->cipher.req);\n+\t} while (ret == -WD_EBUSY);\n+\n+\tif (sess->cipher.req.out_buf_bytes > sess->cipher.req.in_bytes)\n+\t\top->status = RTE_COMP_OP_STATUS_OUT_OF_SPACE_TERMINATED;\n+\n+\tif (ret)\n+\t\top->status = RTE_COMP_OP_STATUS_ERROR;\n+}\n+\n static uint16_t\n uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\t\t  uint16_t nb_ops)\n {\n \tstruct uadk_qp *qp = queue_pair;\n+\tstruct uadk_crypto_session *sess = NULL;\n+\tstruct rte_mbuf *msrc, *mdst;\n \tstruct rte_crypto_op *op;\n \tuint16_t enqd = 0;\n \tint i, ret;\n@@ -250,6 +564,25 @@ uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \tfor (i = 0; i < nb_ops; i++) {\n \t\top = ops[i];\n \t\top->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;\n+\t\tmsrc = op->sym->m_src;\n+\t\tmdst = op->sym->m_dst ? op->sym->m_dst : op->sym->m_src;\n+\n+\t\tif (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {\n+\t\t\tif (likely(op->sym->session != NULL))\n+\t\t\t\tsess = (struct uadk_crypto_session *)\n+\t\t\t\t\tget_sym_session_private_data(\n+\t\t\t\t\t\top->sym->session,\n+\t\t\t\t\t\tuadk_cryptodev_driver_id);\n+\t\t}\n+\n+\t\tswitch (sess->chain_order) {\n+\t\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tbreak;\n+\t\t}\n \n \t\tif (op->status == RTE_CRYPTO_OP_STATUS_NOT_PROCESSED)\n \t\t\top->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n@@ -325,7 +658,9 @@ uadk_cryptodev_probe(struct rte_vdev_device *vdev)\n \tdev->driver_id = uadk_cryptodev_driver_id;\n \tdev->dequeue_burst = uadk_crypto_dequeue_burst;\n \tdev->enqueue_burst = uadk_crypto_enqueue_burst;\n-\tdev->feature_flags = RTE_CRYPTODEV_FF_HW_ACCELERATED;\n+\tdev->feature_flags = RTE_CRYPTODEV_FF_HW_ACCELERATED |\n+\t\t\t     RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO |\n+\t\t\t     RTE_CRYPTODEV_FF_SYM_SESSIONLESS;\n \tpriv = dev->data->dev_private;\n \tpriv->version = version;\n \n",
    "prefixes": [
        "v3",
        "4/6"
    ]
}