get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/101924/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 101924,
    "url": "http://patches.dpdk.org/api/patches/101924/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20211017161651.9220-15-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20211017161651.9220-15-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20211017161651.9220-15-hemant.agrawal@nxp.com",
    "date": "2021-10-17T16:16:50",
    "name": "[v5,14/15] test/crypto: add raw API test for dpaax",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "74840a471eaf9d26e4a823a4dab3882c4de0d785",
    "submitter": {
        "id": 477,
        "url": "http://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20211017161651.9220-15-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 19714,
            "url": "http://patches.dpdk.org/api/series/19714/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=19714",
            "date": "2021-10-17T16:16:36",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 5,
            "mbox": "http://patches.dpdk.org/series/19714/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/101924/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/101924/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 0165AA0547;\n\tSun, 17 Oct 2021 18:23:06 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 8437C4114D;\n\tSun, 17 Oct 2021 18:21:58 +0200 (CEST)",
            "from EUR04-VI1-obe.outbound.protection.outlook.com\n (mail-eopbgr80081.outbound.protection.outlook.com [40.107.8.81])\n by mails.dpdk.org (Postfix) with ESMTP id 6FA4641162\n for <dev@dpdk.org>; Sun, 17 Oct 2021 18:21:55 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8615.eurprd04.prod.outlook.com (2603:10a6:10:2da::23)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.15; Sun, 17 Oct\n 2021 16:21:54 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%3]) with mapi id 15.20.4608.018; Sun, 17 Oct 2021\n 16:21:54 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SI2PR01CA0053.apcprd01.prod.exchangelabs.com (2603:1096:4:193::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.15 via Frontend\n Transport; Sun, 17 Oct 2021 16:21:52 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=ap3TO6jZ+Po1uSf3r+yWp8KUFQpiF9kbA7SJ0Gz9FRyngd/nhp0x8I+8+I/JxwHxgfcKrEcurFW6KBKQ2SoM4XtWAgEGeSd/Fv5GhofLU2dPaFzfn5rMhPTDDW0qJuzaqAUL2OhGPQ05i1QgsJzCgcGOKYDo4Kr/wgV9G/4DqPTPw2dU+dt1rMQH8HxXWibBg9uG8tR2abi6amkwDrp9us764MPu335KMQc/z0a+MMRxUMdNsNbQCxWJKkqRsCqT6s//7JWgbXipk4oma1HijLe55c3KuEToYGuT+RafrDed6jTKZh7PVMr+SInRd58VVQpO2Y00OqQ8A0zNLQyMZw==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=W2YLv0uyxyAbQiTeTxMq6ywrj909iVkIJSNzqNanqK8=;\n b=l+f4A70RaGsK2+oTyqKop/BucRIdh+yzjcD6NlX539GmWfXnC+/4YAg3vBtsmhK3ghdz1L2ulfia+vgDv//2kuuaUO5RcsdsaoA8u/ST6TxSMvhIGSlTpffTNZH1m6KF+LYk3/7xLmTsrIUC2SqJ/5H+BjKT46eeODybePcEEwa8oCxbC23wy3gBzYeUzElTTxi9TAo15Llkotnp6IkpFPnTYC/XndsdYqM4bMgIMa3j7BjE9UmwsYiNjVEBRGZ+E++YwgKbehNlnV1jXlmzKw8bZePHuSN2m1LPYFbmyVW1SocbpwNp33pHJUOdZCSEksIuCmZJYsCFSY+8SUNLmg==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=W2YLv0uyxyAbQiTeTxMq6ywrj909iVkIJSNzqNanqK8=;\n b=i90VsEqpFMClqYepeUeiOoqqci8WfgGy0d1HWAvUj1DTe/UpIDQyePzOSoLx62v+59zeZXipXA5jg+YTXbQkm5W4MOrFpxQ4huWB/k7vDWkyX3SuhcMZZqr0vCCiMVPuRlfscscdvC30TS2VAerfyKxiGl+jWKxvevoG927ySSs=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "konstantin.ananyev@intel.com, roy.fan.zhang@intel.com,\n Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Sun, 17 Oct 2021 21:46:50 +0530",
        "Message-Id": "<20211017161651.9220-15-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20211017161651.9220-1-hemant.agrawal@nxp.com>",
        "References": "<20211013190032.2308-1-hemant.agrawal@nxp.com>\n <20211017161651.9220-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SI2PR01CA0053.apcprd01.prod.exchangelabs.com\n (2603:1096:4:193::7) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "0edc318f-4d99-49bc-0092-08d9918a3bc9",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8615:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB8615A0A5E2054FDE617FB76489BB9@DU2PR04MB8615.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:469;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(366004)(6486002)(66476007)(8936002)(66556008)(66946007)(86362001)(52116002)(36756003)(5660300002)(38350700002)(8676002)(38100700002)(508600001)(6506007)(26005)(44832011)(4326008)(6512007)(2616005)(83380400001)(1076003)(2906002)(316002)(186003)(956004);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 0edc318f-4d99-49bc-0092-08d9918a3bc9",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "17 Oct 2021 16:21:54.5931 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n IVpXxVzwcc9XiwjB4rPDRXUS4sSkT8dCCwZv5f3qrQBlz2Z8d5df2r8UpADLI0FLRa6DxO48pgFQk1BjEIR7CA==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8615",
        "Subject": "[dpdk-dev] [PATCH v5 14/15] test/crypto: add raw API test for dpaax",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support for raw API tests for\ndpaa_sec and dpaa2_sec platforms.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n app/test/test_cryptodev.c | 116 +++++++++++++++++++++++++++++++++++---\n 1 file changed, 109 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex 4778dafbe5..73c64301f7 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -186,11 +186,11 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n {\n \tstruct rte_crypto_sym_op *sop = op->sym;\n \tstruct rte_crypto_op *ret_op = NULL;\n-\tstruct rte_crypto_vec data_vec[UINT8_MAX];\n+\tstruct rte_crypto_vec data_vec[UINT8_MAX], dest_data_vec[UINT8_MAX];\n \tstruct rte_crypto_va_iova_ptr cipher_iv, digest, aad_auth_iv;\n \tunion rte_crypto_sym_ofs ofs;\n \tstruct rte_crypto_sym_vec vec;\n-\tstruct rte_crypto_sgl sgl;\n+\tstruct rte_crypto_sgl sgl, dest_sgl;\n \tuint32_t max_len;\n \tunion rte_cryptodev_session_ctx sess;\n \tuint32_t count = 0;\n@@ -326,6 +326,19 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t}\n \n \tsgl.num = n;\n+\t/* Out of place */\n+\tif (sop->m_dst != NULL) {\n+\t\tdest_sgl.vec = dest_data_vec;\n+\t\tvec.dest_sgl = &dest_sgl;\n+\t\tn = rte_crypto_mbuf_to_vec(sop->m_dst, 0, max_len,\n+\t\t\t\tdest_data_vec, RTE_DIM(dest_data_vec));\n+\t\tif (n < 0 || n > sop->m_dst->nb_segs) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tdest_sgl.num = n;\n+\t} else\n+\t\tvec.dest_sgl = NULL;\n \n \tif (rte_cryptodev_raw_enqueue_burst(ctx, &vec, ofs, (void **)&op,\n \t\t\t&enqueue_status) < 1) {\n@@ -8381,10 +8394,21 @@ test_pdcp_proto_SGL(int i, int oop,\n \tint to_trn_tbl[16];\n \tint segs = 1;\n \tunsigned int trn_data = 0;\n+\tstruct rte_cryptodev_info dev_info;\n+\tuint64_t feat_flags;\n \tstruct rte_security_ctx *ctx = (struct rte_security_ctx *)\n \t\t\t\trte_cryptodev_get_sec_ctx(\n \t\t\t\tts_params->valid_devs[0]);\n+\tstruct rte_mbuf *temp_mbuf;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tfeat_flags = dev_info.feature_flags;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \t/* Verify the capabilities */\n \tstruct rte_security_capability_idx sec_cap_idx;\n \n@@ -8568,8 +8592,23 @@ test_pdcp_proto_SGL(int i, int oop,\n \t\tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (process_crypto_request(ts_params->valid_devs[0], ut_params->op)\n-\t\t== NULL) {\n+\ttemp_mbuf = ut_params->op->sym->m_src;\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\t/* filling lengths */\n+\t\twhile (temp_mbuf) {\n+\t\t\tut_params->op->sym->cipher.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\tut_params->op->sym->auth.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\ttemp_mbuf = temp_mbuf->next;\n+\t\t}\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 1, 0, 0);\n+\t} else {\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\t\t\t\t\t\t\tut_params->op);\n+\t}\n+\tif (ut_params->op == NULL) {\n \t\tprintf(\"TestCase %s()-%d line %d failed %s: \",\n \t\t\t__func__, i, __LINE__,\n \t\t\t\"failed to process sym crypto op\");\n@@ -10450,6 +10489,7 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tint retval;\n \tuint8_t *ciphertext, *auth_tag;\n \tuint16_t plaintext_pad_len;\n+\tstruct rte_cryptodev_info dev_info;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10459,7 +10499,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \t\t\t&cap_idx) == NULL)\n \t\treturn TEST_SKIPPED;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n+\n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))\n \t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto */\n@@ -10496,7 +10540,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -10542,6 +10590,10 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \n \tint retval;\n \tuint8_t *plaintext;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10556,6 +10608,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \t\t\tglobal_api_test_type == CRYPTODEV_RAW_API_TEST)\n \t\treturn TEST_SKIPPED;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn TEST_SKIPPED;\n+\t}\n+\n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n \t\t\ttdata->algo,\n@@ -10586,7 +10644,11 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -15434,6 +15496,46 @@ test_cryptodev_cn10k(void)\n \treturn run_cryptodev_testsuite(RTE_STR(CRYPTODEV_NAME_CN10K_PMD));\n }\n \n+static int\n+test_cryptodev_dpaa2_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_cryptodev_dpaa_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa2_sec_raw_api);\n+REGISTER_TEST_COMMAND(cryptodev_dpaa_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa_sec_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_raw_api_autotest,\n \t\ttest_cryptodev_qat_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat);\n",
    "prefixes": [
        "v5",
        "14/15"
    ]
}