get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/101468/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 101468,
    "url": "http://patches.dpdk.org/api/patches/101468/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20211013182720.32486-15-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20211013182720.32486-15-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20211013182720.32486-15-hemant.agrawal@nxp.com",
    "date": "2021-10-13T18:27:19",
    "name": "[v3,14/15] test/crypto: add raw API test for dpaax",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "74840a471eaf9d26e4a823a4dab3882c4de0d785",
    "submitter": {
        "id": 477,
        "url": "http://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20211013182720.32486-15-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 19612,
            "url": "http://patches.dpdk.org/api/series/19612/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=19612",
            "date": "2021-10-13T18:27:05",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 3,
            "mbox": "http://patches.dpdk.org/series/19612/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/101468/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/101468/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id AC07CA0C55;\n\tWed, 13 Oct 2021 20:33:29 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id D8C5D41226;\n\tWed, 13 Oct 2021 20:32:21 +0200 (CEST)",
            "from EUR05-AM6-obe.outbound.protection.outlook.com\n (mail-am6eur05on2055.outbound.protection.outlook.com [40.107.22.55])\n by mails.dpdk.org (Postfix) with ESMTP id EB0E041201\n for <dev@dpdk.org>; Wed, 13 Oct 2021 20:32:20 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8805.eurprd04.prod.outlook.com (2603:10a6:10:2e0::8) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.19; Wed, 13 Oct\n 2021 18:32:20 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%3]) with mapi id 15.20.4587.026; Wed, 13 Oct 2021\n 18:32:20 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG3P274CA0016.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::28) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4608.15 via Frontend Transport; Wed, 13 Oct 2021 18:32:18 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=oBZrefyysBhq3G6W9Y3ujU9USqDkA8vEUmP7Rg0kQSQ7yjC/8E/yMUWn+Q8AqqdFRRrOjQXUdTt5TmIroLqubcrjABFMlipU7VpOLrmFM+6YbGFn63fHQhvc0menWAHPQCFhtTOMp4LAWMHWJrz3Y6s7i/A39kC6FTNFArLIF4T18MVI9vhLU6KqpJ/YxhViZycOlG7gBpI2RlOqLol63pQinE+33Ax2OK6QEcpfcDiWOK1KJr87rtmDCUykLIz9/hPqph2k0tYohtlcLh6fgFKhDfNuCxZQCSFHaTS3lfnpX3hdYnyEZLdvp8De1pDs7qhnfSKszlyWe/pJzTso1w==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=KmJh6bj7qd80aDM51cp6vmmDFhxYMHIu1ZOgoVkvSmg=;\n b=jXS3uqr4JKhzXkUB4ziMYk4KeR8DiIRIQzHhBvgkZ+dVIKZzLdzXCUzESmRTFzg0ZBiaBJkZ9TL5x30edHD6Is3dJKrnUHNNUh/i11BYitiMq6YOlJqslzBGOz1I/ian81I8+kT/xmrdY66sI0jY6hifK0ax4PzWqvpU90uN8soGzHPqasHWNJw2Tx1DKsaPUSZuX/RTp+Awnj5tbY2qn3DWbVpbrRv5m7hyYVy0PI+PUG5fZNBrULAmINoHEH+DiRtbPTEaXKKBwv+kTgnrhXd6iIB3M3tjpJdJV81ovnTFiMEVmJcYlCGJszacBTEjp3i5PZDWD2XIwYvfaCd0GA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=KmJh6bj7qd80aDM51cp6vmmDFhxYMHIu1ZOgoVkvSmg=;\n b=i5/Xm5uymjLIrG5aG7gPaaS211+0u2eFKcXenoAUPHDNnxiE1LS/jTG63JB5SAUK6UShZ9c7bn8SR0WD7/R8SGfBjT8IL2YKjcmiqkDUpxhNpa7k+ljj1PhzhWOSPBHNP1XSMThOQb4jzUwVYb3SxlVudXBtqsKjj/h3ArDm+Io=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "roy.fan.zhang@intel.com, konstantin.ananyev@intel.com,\n Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Wed, 13 Oct 2021 23:57:19 +0530",
        "Message-Id": "<20211013182720.32486-15-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20211013182720.32486-1-hemant.agrawal@nxp.com>",
        "References": "<20211013182720.32486-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG3P274CA0016.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::28)\n To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "2ba07a3b-9d09-4811-0dbe-08d98e77ca79",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8805:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB8805047F8AC4020F1EC3F77989B79@DU2PR04MB8805.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:469;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n a6CgN92PtletDNyBdNHvvjxz7CqMkXGJ6sej+jPD+biea2XpO5Gl+VbE/RO+WDw27LbzFORhN9uP96G21BD3N2U/mUHkGyu4d0uunIS73/smDl/3MMp4n+tsDho1QWADx/RMPWKBnbQ6xuvD6Fclb2OD6rvJakP2vkD7y8t3W66pkQmEwnkyJc8JPisc3AZl4hLPJp9eQdqo+wZvUoZxZ4qTNzn26SF/+yE7ykskXNKm5t0ri9gTdgGhLcgiS/G+S7CqW/Iat135ekCDClUuL8kBiJsK12shPx+Dj9qGT9t4EPN3e8hnXSHLue3e2tUZ/IiXKKZ/B41uR8jXViJZtkdd8xBKLTuHZv9nem5BBtaZ8glIjO+payeiZbuorXbn5Qqxi37tCsYlZDKA6ZX8+DcpFZCkNF2qAq8y4sKWwoqyRZHvNhoNhqXxHbjmMV6yjPJygZwEuunvpNX0hnt1WDG5YKqhBWF9G4hUq5JV1dfr/wPBZttfv2FnGBYdluELRXAT6QX8Y8vPpC/+BdHdme+yiTGKF4ll9YLIt9plHSy4CwzjSENfgfx7sK1VznXJUoP31j24chAMk2k8CaHERAIBxP1DojR9Gf/ee2kn41bqeUqrtOjhHq0XjWMlyH8V9YSKjTeE4eedfRTbFkG4WpEazsm4Xb6t9wAYfzlhXWQoOiL3OCi9qbht5ecNqMXulOPZyrfyYAo3f4lgUIcsAA==",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(366004)(956004)(186003)(66476007)(26005)(44832011)(66556008)(52116002)(83380400001)(66946007)(8936002)(36756003)(8676002)(2616005)(1076003)(4326008)(508600001)(38100700002)(6486002)(86362001)(6506007)(38350700002)(316002)(2906002)(5660300002)(6512007);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 3ZDF3cBZQPMlEKJyfbgS8KhFNkJ7EjgjKI+QEdkxc4HkbEUzBJ4eMZDnYKGdsaxmKc/7EAmwnX4xaXr6MjnB1N4yrYgznlns7/hyuj6Ot+227B/iLJ1uIS0CD393aAWuPlHFcGweZTQqtmST1jsEON1KfJcGV3dyQNQuvz4SasNFdWB++OtMRN/ucLOS0kXy0CB5Z2Nc9XHWLc8jMw1fbz+pVd93lG2JfT/IOII3WGsibJq5kuuEbSMnipbUL7v7iD0j9Na8udeRngnqse7hn40LfHymrvQ73hPuEhIRXXgleUFjHjNWi8aBtsx4+OG8nwHLCbTmKOzPQJkgtgaKbnaynTabLwh6KF/C8jgi+ppkL+MZrKhFA9l6U2y81nscGr7t5SNewxLcX3eUnnLdxdXXHs4eDa5qq2YBscQU4fL/o2SdSLaJ9QWQfDBJVK4MeF4bqgBVbdEiUm61fXQe/WKuT/SxEX9q4C5/RRL8xwSQ+UvvKe5ffNwRKYKxpczwtIZ/J7LF8WLWakqMZge3FriBcx+L5Zt7uSkA+ZxjqvWRXo1bIRclhA5AQ5AVjaqdjwbFJH6GJbKm0235UAHNIi9zANKCtdCS+Nypb4lrZD+DwfFo33AE/mPRBjjYK5POHn9tpOsm19Naqy4sg1lHRevmhQiqkA64DAHIqKUXPg5/oxLaFdWg2PPvcKPzAFrehVurv82XAxWPV2bfxKeOSUAGVGfcR4hkOu9Y8Z1s9suG2vGQTZH7J8zzUerpQpDokj5DCJiZ9Di96UVf9cZ5jeCFixsjYjOJEgxxrWWtUnKqY1ke7oJKxrmh9Jqzst/bOIRJ4ju5/jKPefgnQCCFOXs+CngxliqWLFNtluCRtRuQmeSP/nGg+3nRzxGpKymWW3Il2EyYM3pkkD5Xj2AIu5LYBJUTEcvsi7CI768d8T5sYrmdn7wm2gJ4JndIFrbYo4D4GRIZT3DynxPcygjfgnagCLHE1WF4q0o1LyVY0EmzlNP4NoUMC9mZaG4h7uuUjw5gro0S8WdFKcLKkR/CgAsflc3LnExeC3Geks/UjxUBRQF7UDI+Zj9Z911+mSpaO5fPYFowmM5OnBfBk723dB96K1mhjIQ77VaU1n1BHE3C2EFNSjdeC8DzdboCm5cHVhvRJSFVgoadYl57OVTuFTkd+ftn0dfuskfP8v0hRUUXJHccHOQSEK2Psj01VPS6y2cNZRE8HcXxAwgy1HStMOjSK3GnDrumvNOEM4HwExd9Pn4sTIMIVUDzROuQuzpkPCutuzXnnwt4GveRNlP4B64eVpGX9s89iGmauVGiWo23V8oVYIDy8onHXPtOhSlk",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 2ba07a3b-9d09-4811-0dbe-08d98e77ca79",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "13 Oct 2021 18:32:20.0223 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n wuVPvw7ovu4fLC3MS0gaQrQGdvq8k2Mj7GTfs9JFLdl+wiPQTDcMrfsRRE6QzxtSbNMB5GlkxK9heNuaDMfAZA==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8805",
        "Subject": "[dpdk-dev] [PATCH v3 14/15] test/crypto: add raw API test for dpaax",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support for raw API tests for\ndpaa_sec and dpaa2_sec platforms.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n app/test/test_cryptodev.c | 116 +++++++++++++++++++++++++++++++++++---\n 1 file changed, 109 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex 1e951981c2..6a9761c3d8 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -184,11 +184,11 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n {\n \tstruct rte_crypto_sym_op *sop = op->sym;\n \tstruct rte_crypto_op *ret_op = NULL;\n-\tstruct rte_crypto_vec data_vec[UINT8_MAX];\n+\tstruct rte_crypto_vec data_vec[UINT8_MAX], dest_data_vec[UINT8_MAX];\n \tstruct rte_crypto_va_iova_ptr cipher_iv, digest, aad_auth_iv;\n \tunion rte_crypto_sym_ofs ofs;\n \tstruct rte_crypto_sym_vec vec;\n-\tstruct rte_crypto_sgl sgl;\n+\tstruct rte_crypto_sgl sgl, dest_sgl;\n \tuint32_t max_len;\n \tunion rte_cryptodev_session_ctx sess;\n \tuint32_t count = 0;\n@@ -324,6 +324,19 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t}\n \n \tsgl.num = n;\n+\t/* Out of place */\n+\tif (sop->m_dst != NULL) {\n+\t\tdest_sgl.vec = dest_data_vec;\n+\t\tvec.dest_sgl = &dest_sgl;\n+\t\tn = rte_crypto_mbuf_to_vec(sop->m_dst, 0, max_len,\n+\t\t\t\tdest_data_vec, RTE_DIM(dest_data_vec));\n+\t\tif (n < 0 || n > sop->m_dst->nb_segs) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tdest_sgl.num = n;\n+\t} else\n+\t\tvec.dest_sgl = NULL;\n \n \tif (rte_cryptodev_raw_enqueue_burst(ctx, &vec, ofs, (void **)&op,\n \t\t\t&enqueue_status) < 1) {\n@@ -8379,10 +8392,21 @@ test_pdcp_proto_SGL(int i, int oop,\n \tint to_trn_tbl[16];\n \tint segs = 1;\n \tunsigned int trn_data = 0;\n+\tstruct rte_cryptodev_info dev_info;\n+\tuint64_t feat_flags;\n \tstruct rte_security_ctx *ctx = (struct rte_security_ctx *)\n \t\t\t\trte_cryptodev_get_sec_ctx(\n \t\t\t\tts_params->valid_devs[0]);\n+\tstruct rte_mbuf *temp_mbuf;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tfeat_flags = dev_info.feature_flags;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \t/* Verify the capabilities */\n \tstruct rte_security_capability_idx sec_cap_idx;\n \n@@ -8566,8 +8590,23 @@ test_pdcp_proto_SGL(int i, int oop,\n \t\tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (process_crypto_request(ts_params->valid_devs[0], ut_params->op)\n-\t\t== NULL) {\n+\ttemp_mbuf = ut_params->op->sym->m_src;\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\t/* filling lengths */\n+\t\twhile (temp_mbuf) {\n+\t\t\tut_params->op->sym->cipher.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\tut_params->op->sym->auth.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\ttemp_mbuf = temp_mbuf->next;\n+\t\t}\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 1, 0, 0);\n+\t} else {\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\t\t\t\t\t\t\tut_params->op);\n+\t}\n+\tif (ut_params->op == NULL) {\n \t\tprintf(\"TestCase %s()-%d line %d failed %s: \",\n \t\t\t__func__, i, __LINE__,\n \t\t\t\"failed to process sym crypto op\");\n@@ -10424,6 +10463,7 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tint retval;\n \tuint8_t *ciphertext, *auth_tag;\n \tuint16_t plaintext_pad_len;\n+\tstruct rte_cryptodev_info dev_info;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10433,7 +10473,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \t\t\t&cap_idx) == NULL)\n \t\treturn TEST_SKIPPED;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n+\n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))\n \t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto */\n@@ -10470,7 +10514,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -10516,6 +10564,10 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \n \tint retval;\n \tuint8_t *plaintext;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10530,6 +10582,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \t\t\tglobal_api_test_type == CRYPTODEV_RAW_API_TEST)\n \t\treturn TEST_SKIPPED;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn TEST_SKIPPED;\n+\t}\n+\n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n \t\t\ttdata->algo,\n@@ -10560,7 +10618,11 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -15400,6 +15462,46 @@ test_cryptodev_cn10k(void)\n \treturn run_cryptodev_testsuite(RTE_STR(CRYPTODEV_NAME_CN10K_PMD));\n }\n \n+static int\n+test_cryptodev_dpaa2_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_cryptodev_dpaa_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa2_sec_raw_api);\n+REGISTER_TEST_COMMAND(cryptodev_dpaa_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa_sec_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_raw_api_autotest,\n \t\ttest_cryptodev_qat_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat);\n",
    "prefixes": [
        "v3",
        "14/15"
    ]
}