get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/119029/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 119029,
    "url": "https://patches.dpdk.org/api/patches/119029/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20221024134409.1896776-5-zhangfei.gao@linaro.org/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221024134409.1896776-5-zhangfei.gao@linaro.org>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20221024134409.1896776-5-zhangfei.gao@linaro.org",
    "date": "2022-10-24T13:44:07",
    "name": "[resend,v5,4/6] crypto/uadk: support cipher algorithms",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "b45603ad459525372b9346ca69bea4f09d83b4cc",
    "submitter": {
        "id": 2701,
        "url": "https://patches.dpdk.org/api/people/2701/?format=api",
        "name": "Zhangfei Gao",
        "email": "zhangfei.gao@linaro.org"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20221024134409.1896776-5-zhangfei.gao@linaro.org/mbox/",
    "series": [
        {
            "id": 25388,
            "url": "https://patches.dpdk.org/api/series/25388/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=25388",
            "date": "2022-10-24T13:44:03",
            "name": "crypto/uadk: introduce uadk crypto driver",
            "version": 5,
            "mbox": "https://patches.dpdk.org/series/25388/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/119029/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/119029/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id DA8FCA04FD;\n\tMon, 24 Oct 2022 15:51:13 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 7CEE142BC4;\n\tMon, 24 Oct 2022 15:50:57 +0200 (CEST)",
            "from mail-wm1-f49.google.com (mail-wm1-f49.google.com\n [209.85.128.49]) by mails.dpdk.org (Postfix) with ESMTP id B030342BAF\n for <dev@dpdk.org>; Mon, 24 Oct 2022 15:50:52 +0200 (CEST)",
            "by mail-wm1-f49.google.com with SMTP id\n c7-20020a05600c0ac700b003c6cad86f38so9844017wmr.2\n for <dev@dpdk.org>; Mon, 24 Oct 2022 06:50:52 -0700 (PDT)",
            "from localhost.localdomain ([213.146.143.36])\n by smtp.gmail.com with ESMTPSA id\n t8-20020a0560001a4800b00236644228cfsm5764108wry.43.2022.10.24.06.50.51\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 24 Oct 2022 06:50:52 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=9wb0zMGn2afa2f4i5v3/bBV3r0nrExICG6ya5aJIDMg=;\n b=PBkr9jDPtmzwEZexbZWQ0qPC6gfcbh0gSYFsvscs/Qhon4VBX2vE3nol3elxrGA2M+\n C/Flczv8oNr0Wosrdv8l+53dgIFrbUd6ub/ifoqehrv7jv/5Zb0aLRjcKUqVv4zjjsv3\n kXOmqJZ8HPR6QP0mFVkWMGYd5SsLGSMTfqcm+4wwGHR3sibZrBPKJPd1A+0arCssp+W4\n xgHVXRiMDbML5yIWis3ytP2O3H2QDTRqdlAq2GYGB1p6BB0kuXwRQyGa0S65GfHQVgs3\n xMfKBiAUPEklXFIuBTTQzjLz2vBPya0tFwjWMoEGiVEkbrvOgsGQZJtRkqLO+egg5jRb\n 2OgA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20210112;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc\n :subject:date:message-id:reply-to;\n bh=9wb0zMGn2afa2f4i5v3/bBV3r0nrExICG6ya5aJIDMg=;\n b=x/ob9fm0KvLCt295kQmAuogwH28uyos4tvYDG30KpY6AgE8ZA+Ak5R2d13F08THPWU\n Mx390iA9CXLTVEKc2UXPw/DeIIh8WKTrkQmF5i8jOB65iVUdB2r6p9t1GLglp04iYSJo\n UVI8Y1UwTc8rQuA6upwkXItRitPlm1tM3WDeYFSzdJrT2nq1AEc/ekdyf3r8TkOzMBAN\n 3Ugft60T9ogh3pyUUxQ74x4Fxw+05LejadDYdPY4sEai2kHUGC79nS2n+qc2yi0eAV6u\n EIFcvM5PgPS08bGDmmUse3i2UmNnhKfnM5393QA5DYlKiMM2zvOg3OV6LJ00u+kacJC+\n TOkw==",
        "X-Gm-Message-State": "ACrzQf11ThMeNFdEcnH7qJP3to5YY7BLeUhDsvE+MxkaKwcrUBPQBDYh\n sHQzPAMyWY0JgB5qryki6Rk8xQ==",
        "X-Google-Smtp-Source": "\n AMsMyM6CkmiCCcTDEmqqg3phmocOEK9DYS9n4OK36Nn3CPJr+7tPgqt+UuGpUhMsVbAUqY3Cl6fkWA==",
        "X-Received": "by 2002:a7b:c30a:0:b0:3c1:bf95:e17b with SMTP id\n k10-20020a7bc30a000000b003c1bf95e17bmr23388581wmj.31.1666619452366;\n Mon, 24 Oct 2022 06:50:52 -0700 (PDT)",
        "From": "Zhangfei Gao <zhangfei.gao@linaro.org>",
        "To": "Akhil Goyal <gakhil@marvell.com>,\n Declan Doherty <declan.doherty@intel.com>,\n Fan Zhang <royzhang1980@gmail.com>,\n Ashish Gupta <ashish.gupta@marvell.com>, Ray Kinsella <mdr@ashroe.eu>,\n \"thomas@monjalon.net\" <thomas@monjalon.net>",
        "Cc": "dev@dpdk.org,\n\tacc@openeuler.org,\n\tZhangfei Gao <zhangfei.gao@linaro.org>",
        "Subject": "[PATCH resend v5 4/6] crypto/uadk: support cipher algorithms",
        "Date": "Mon, 24 Oct 2022 21:44:07 +0800",
        "Message-Id": "<20221024134409.1896776-5-zhangfei.gao@linaro.org>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20221024134409.1896776-1-zhangfei.gao@linaro.org>",
        "References": "<20221024134409.1896776-1-zhangfei.gao@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Cipher algorithms:\n\n* ``RTE_CRYPTO_CIPHER_AES_ECB``\n* ``RTE_CRYPTO_CIPHER_AES_CBC``\n* ``RTE_CRYPTO_CIPHER_AES_XTS``\n* ``RTE_CRYPTO_CIPHER_DES_CBC``\n\nSigned-off-by: Zhangfei Gao <zhangfei.gao@linaro.org>\n---\n doc/guides/cryptodevs/features/uadk.ini |  10 +\n doc/guides/cryptodevs/uadk.rst          |   6 +\n drivers/crypto/uadk/uadk_crypto_pmd.c   | 327 +++++++++++++++++++++++-\n 3 files changed, 338 insertions(+), 5 deletions(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/uadk.ini b/doc/guides/cryptodevs/features/uadk.ini\nindex df5ad40e3d..005e08ac8d 100644\n--- a/doc/guides/cryptodevs/features/uadk.ini\n+++ b/doc/guides/cryptodevs/features/uadk.ini\n@@ -4,12 +4,22 @@\n ; Refer to default.ini for the full list of available PMD features.\n ;\n [Features]\n+Symmetric crypto       = Y\n HW Accelerated         = Y\n \n ;\n ; Supported crypto algorithms of the 'uadk' crypto driver.\n ;\n [Cipher]\n+AES CBC (128)  = Y\n+AES CBC (192)  = Y\n+AES CBC (256)  = Y\n+AES ECB (128)  = Y\n+AES ECB (192)  = Y\n+AES ECB (256)  = Y\n+AES XTS (128)  = Y\n+AES XTS (256)  = Y\n+DES CBC        = Y\n \n ;\n ; Supported authentication algorithms of the 'uadk' crypto driver.\ndiff --git a/doc/guides/cryptodevs/uadk.rst b/doc/guides/cryptodevs/uadk.rst\nindex 1dfaab73c8..7b5c1af144 100644\n--- a/doc/guides/cryptodevs/uadk.rst\n+++ b/doc/guides/cryptodevs/uadk.rst\n@@ -15,6 +15,12 @@ Features\n \n UADK crypto PMD has support for:\n \n+Cipher algorithms:\n+\n+* ``RTE_CRYPTO_CIPHER_AES_ECB``\n+* ``RTE_CRYPTO_CIPHER_AES_CBC``\n+* ``RTE_CRYPTO_CIPHER_AES_XTS``\n+* ``RTE_CRYPTO_CIPHER_DES_CBC``\n \n Test steps\n ----------\ndiff --git a/drivers/crypto/uadk/uadk_crypto_pmd.c b/drivers/crypto/uadk/uadk_crypto_pmd.c\nindex 84cb1dab25..f9699e6b7e 100644\n--- a/drivers/crypto/uadk/uadk_crypto_pmd.c\n+++ b/drivers/crypto/uadk/uadk_crypto_pmd.c\n@@ -30,12 +30,35 @@ struct uadk_qp {\n \tuint8_t temp_digest[DIGEST_LENGTH_MAX];\n } __rte_cache_aligned;\n \n+enum uadk_chain_order {\n+\tUADK_CHAIN_ONLY_CIPHER,\n+\tUADK_CHAIN_NOT_SUPPORTED\n+};\n+\n+struct uadk_crypto_session {\n+\thandle_t handle_cipher;\n+\tenum uadk_chain_order chain_order;\n+\n+\t/* IV parameters */\n+\tstruct {\n+\t\tuint16_t length;\n+\t\tuint16_t offset;\n+\t} iv;\n+\n+\t/* Cipher Parameters */\n+\tstruct {\n+\t\tenum rte_crypto_cipher_operation direction;\n+\t\tstruct wd_cipher_req req;\n+\t} cipher;\n+} __rte_cache_aligned;\n+\n enum uadk_crypto_version {\n \tUADK_CRYPTO_V2,\n \tUADK_CRYPTO_V3,\n };\n \n struct uadk_crypto_priv {\n+\tbool env_cipher_init;\n \tenum uadk_crypto_version version;\n } __rte_cache_aligned;\n \n@@ -49,6 +72,86 @@ RTE_LOG_REGISTER_DEFAULT(uadk_crypto_logtype, INFO);\n \t\t## __VA_ARGS__)\n \n static const struct rte_cryptodev_capabilities uadk_crypto_v2_capabilities[] = {\n+\t{\t/* AES ECB */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_ECB,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CBC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES XTS */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_XTS,\n+\t\t\t\t.block_size = 1,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 32\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* DES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_DES_CBC,\n+\t\t\t\t.block_size = 8,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t/* End of capabilities */\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n@@ -76,8 +179,15 @@ uadk_crypto_pmd_stop(struct rte_cryptodev *dev __rte_unused)\n \n /* Close device */\n static int\n-uadk_crypto_pmd_close(struct rte_cryptodev *dev __rte_unused)\n+uadk_crypto_pmd_close(struct rte_cryptodev *dev)\n {\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\n+\tif (priv->env_cipher_init) {\n+\t\twd_cipher_env_uninit();\n+\t\tpriv->env_cipher_init = false;\n+\t}\n+\n \treturn 0;\n }\n \n@@ -224,6 +334,159 @@ uadk_crypto_pmd_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id,\n \treturn -EINVAL;\n }\n \n+static unsigned int\n+uadk_crypto_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)\n+{\n+\treturn sizeof(struct uadk_crypto_session);\n+}\n+\n+static enum uadk_chain_order\n+uadk_get_chain_order(const struct rte_crypto_sym_xform *xform)\n+{\n+\tenum uadk_chain_order res = UADK_CHAIN_NOT_SUPPORTED;\n+\n+\tif (xform != NULL) {\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n+\t\t\tif (xform->next == NULL)\n+\t\t\t\tres = UADK_CHAIN_ONLY_CIPHER;\n+\t\t}\n+\t}\n+\n+\treturn res;\n+}\n+\n+static int\n+uadk_set_session_cipher_parameters(struct rte_cryptodev *dev,\n+\t\t\t\t   struct uadk_crypto_session *sess,\n+\t\t\t\t   struct rte_crypto_sym_xform *xform)\n+{\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\tstruct rte_crypto_cipher_xform *cipher = &xform->cipher;\n+\tstruct wd_cipher_sess_setup setup = {0};\n+\tstruct sched_params params = {0};\n+\tint ret;\n+\n+\tif (!priv->env_cipher_init) {\n+\t\tret = wd_cipher_env_init(NULL);\n+\t\tif (ret < 0)\n+\t\t\treturn -EINVAL;\n+\t\tpriv->env_cipher_init = true;\n+\t}\n+\n+\tsess->cipher.direction = cipher->op;\n+\tsess->iv.offset = cipher->iv.offset;\n+\tsess->iv.length = cipher->iv.length;\n+\n+\tswitch (cipher->algo) {\n+\t/* Cover supported cipher algorithms */\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CTR;\n+\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_ECB;\n+\t\tsess->cipher.req.out_bytes = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_CBC;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 16;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 64;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tsetup.alg = WD_CIPHER_AES;\n+\t\tsetup.mode = WD_CIPHER_XTS;\n+\t\tif (cipher->key.length == 16)\n+\t\t\tsess->cipher.req.out_bytes = 32;\n+\t\telse\n+\t\t\tsess->cipher.req.out_bytes = 512;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -ENOTSUP;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tparams.numa_id = -1;\t/* choose nearby numa node */\n+\tsetup.sched_param = &params;\n+\tsess->handle_cipher = wd_cipher_alloc_sess(&setup);\n+\tif (!sess->handle_cipher) {\n+\t\tUADK_LOG(ERR, \"uadk failed to alloc session!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tret = wd_cipher_set_key(sess->handle_cipher, cipher->key.data, cipher->key.length);\n+\tif (ret) {\n+\t\twd_cipher_free_sess(sess->handle_cipher);\n+\t\tUADK_LOG(ERR, \"uadk failed to set key!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\treturn 0;\n+\n+env_uninit:\n+\twd_cipher_env_uninit();\n+\tpriv->env_cipher_init = false;\n+\treturn ret;\n+}\n+\n+static int\n+uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n+\t\t\t\t  struct rte_crypto_sym_xform *xform,\n+\t\t\t\t  struct rte_cryptodev_sym_session *session)\n+{\n+\tstruct rte_crypto_sym_xform *cipher_xform = NULL;\n+\tstruct uadk_crypto_session *sess = CRYPTODEV_GET_SYM_SESS_PRIV(session);\n+\tint ret;\n+\n+\tif (unlikely(!sess)) {\n+\t\tUADK_LOG(ERR, \"Session not available\");\n+\t\treturn -EINVAL;\n+\t}\n+\n+\tsess->chain_order = uadk_get_chain_order(xform);\n+\tswitch (sess->chain_order) {\n+\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\tcipher_xform = xform;\n+\t\tbreak;\n+\tdefault:\n+\t\treturn -ENOTSUP;\n+\t}\n+\n+\tif (cipher_xform) {\n+\t\tret = uadk_set_session_cipher_parameters(dev, sess, cipher_xform);\n+\t\tif (ret != 0) {\n+\t\t\tUADK_LOG(ERR,\n+\t\t\t\t\"Invalid/unsupported cipher parameters\");\n+\t\t\treturn ret;\n+\t\t}\n+\t}\n+\n+\treturn 0;\n+}\n+\n+static void\n+uadk_crypto_sym_session_clear(struct rte_cryptodev *dev __rte_unused,\n+\t\t\t      struct rte_cryptodev_sym_session *session)\n+{\n+\tstruct uadk_crypto_session *sess = CRYPTODEV_GET_SYM_SESS_PRIV(session);\n+\n+\tif (unlikely(sess == NULL)) {\n+\t\tUADK_LOG(ERR, \"Session not available\");\n+\t\treturn;\n+\t}\n+\n+\tif (sess->handle_cipher) {\n+\t\twd_cipher_free_sess(sess->handle_cipher);\n+\t\tsess->handle_cipher = 0;\n+\t}\n+}\n+\n static struct rte_cryptodev_ops uadk_crypto_pmd_ops = {\n \t\t.dev_configure\t\t= uadk_crypto_pmd_config,\n \t\t.dev_start\t\t= uadk_crypto_pmd_start,\n@@ -234,16 +497,51 @@ static struct rte_cryptodev_ops uadk_crypto_pmd_ops = {\n \t\t.dev_infos_get\t\t= uadk_crypto_pmd_info_get,\n \t\t.queue_pair_setup\t= uadk_crypto_pmd_qp_setup,\n \t\t.queue_pair_release\t= uadk_crypto_pmd_qp_release,\n-\t\t.sym_session_get_size\t= NULL,\n-\t\t.sym_session_configure\t= NULL,\n-\t\t.sym_session_clear\t= NULL,\n+\t\t.sym_session_get_size\t= uadk_crypto_sym_session_get_size,\n+\t\t.sym_session_configure\t= uadk_crypto_sym_session_configure,\n+\t\t.sym_session_clear\t= uadk_crypto_sym_session_clear,\n };\n \n+static void\n+uadk_process_cipher_op(struct rte_crypto_op *op,\n+\t\t       struct uadk_crypto_session *sess,\n+\t\t       struct rte_mbuf *msrc, struct rte_mbuf *mdst)\n+{\n+\tuint32_t off = op->sym->cipher.data.offset;\n+\tint ret;\n+\n+\tif (!sess) {\n+\t\top->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS;\n+\t\treturn;\n+\t}\n+\n+\tsess->cipher.req.src = rte_pktmbuf_mtod_offset(msrc, uint8_t *, off);\n+\tsess->cipher.req.in_bytes = op->sym->cipher.data.length;\n+\tsess->cipher.req.dst = rte_pktmbuf_mtod_offset(mdst, uint8_t *, off);\n+\tsess->cipher.req.out_buf_bytes = sess->cipher.req.in_bytes;\n+\tsess->cipher.req.iv_bytes = sess->iv.length;\n+\tsess->cipher.req.iv = rte_crypto_op_ctod_offset(op, uint8_t *,\n+\t\t\t\t\t\t\tsess->iv.offset);\n+\tif (sess->cipher.direction == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cipher.req.op_type = WD_CIPHER_ENCRYPTION;\n+\telse\n+\t\tsess->cipher.req.op_type = WD_CIPHER_DECRYPTION;\n+\n+\tdo {\n+\t\tret = wd_do_cipher_sync(sess->handle_cipher, &sess->cipher.req);\n+\t} while (ret == -WD_EBUSY);\n+\n+\tif (ret)\n+\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+}\n+\n static uint16_t\n uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\t\t  uint16_t nb_ops)\n {\n \tstruct uadk_qp *qp = queue_pair;\n+\tstruct uadk_crypto_session *sess = NULL;\n+\tstruct rte_mbuf *msrc, *mdst;\n \tstruct rte_crypto_op *op;\n \tuint16_t enqd = 0;\n \tint i, ret;\n@@ -251,6 +549,23 @@ uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \tfor (i = 0; i < nb_ops; i++) {\n \t\top = ops[i];\n \t\top->status = RTE_CRYPTO_OP_STATUS_NOT_PROCESSED;\n+\t\tmsrc = op->sym->m_src;\n+\t\tmdst = op->sym->m_dst ? op->sym->m_dst : op->sym->m_src;\n+\n+\t\tif (op->sess_type == RTE_CRYPTO_OP_WITH_SESSION) {\n+\t\t\tif (likely(op->sym->session != NULL))\n+\t\t\t\tsess = CRYPTODEV_GET_SYM_SESS_PRIV(\n+\t\t\t\t\top->sym->session);\n+\t\t}\n+\n+\t\tswitch (sess->chain_order) {\n+\t\tcase UADK_CHAIN_ONLY_CIPHER:\n+\t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tbreak;\n+\t\t}\n \n \t\tif (op->status == RTE_CRYPTO_OP_STATUS_NOT_PROCESSED)\n \t\t\top->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n@@ -326,7 +641,9 @@ uadk_cryptodev_probe(struct rte_vdev_device *vdev)\n \tdev->driver_id = uadk_cryptodev_driver_id;\n \tdev->dequeue_burst = uadk_crypto_dequeue_burst;\n \tdev->enqueue_burst = uadk_crypto_enqueue_burst;\n-\tdev->feature_flags = RTE_CRYPTODEV_FF_HW_ACCELERATED;\n+\tdev->feature_flags = RTE_CRYPTODEV_FF_HW_ACCELERATED |\n+\t\t\t     RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO |\n+\t\t\t     RTE_CRYPTODEV_FF_SYM_SESSIONLESS;\n \tpriv = dev->data->dev_private;\n \tpriv->version = version;\n \n",
    "prefixes": [
        "resend",
        "v5",
        "4/6"
    ]
}