get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/40812/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 40812,
    "url": "http://patches.dpdk.org/api/patches/40812/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20180608091001.16738-1-marko.kovacevic@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20180608091001.16738-1-marko.kovacevic@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20180608091001.16738-1-marko.kovacevic@intel.com",
    "date": "2018-06-08T09:10:01",
    "name": "[dpdk-dev,v1] crypto/aesni_mb: support 3DES",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "38c9dc5e770bdf56450deaa3651302370f466352",
    "submitter": {
        "id": 853,
        "url": "http://patches.dpdk.org/api/people/853/?format=api",
        "name": "Kovacevic, Marko",
        "email": "marko.kovacevic@intel.com"
    },
    "delegate": {
        "id": 22,
        "url": "http://patches.dpdk.org/api/users/22/?format=api",
        "username": "pdelarag",
        "first_name": "Pablo",
        "last_name": "de Lara Guarch",
        "email": "pablo.de.lara.guarch@intel.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20180608091001.16738-1-marko.kovacevic@intel.com/mbox/",
    "series": [
        {
            "id": 45,
            "url": "http://patches.dpdk.org/api/series/45/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=45",
            "date": "2018-06-08T09:10:01",
            "name": "[dpdk-dev,v1] crypto/aesni_mb: support 3DES",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/45/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/40812/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/40812/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 7CFBD7CBF;\n\tFri,  8 Jun 2018 11:10:31 +0200 (CEST)",
            "from mga11.intel.com (mga11.intel.com [192.55.52.93])\n\tby dpdk.org (Postfix) with ESMTP id AD0196904\n\tfor <dev@dpdk.org>; Fri,  8 Jun 2018 11:10:29 +0200 (CEST)",
            "from orsmga001.jf.intel.com ([10.7.209.18])\n\tby fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t08 Jun 2018 02:10:29 -0700",
            "from silpixa00399502.ir.intel.com (HELO\n\tsilpixa00399502.ger.corp.intel.com) ([10.237.223.218])\n\tby orsmga001.jf.intel.com with ESMTP; 08 Jun 2018 02:10:26 -0700"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.49,490,1520924400\"; d=\"scan'208\";a=\"62871205\"",
        "From": "\"Kovacevic, Marko\" <marko.kovacevic@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "pablo.de.lara.guarch@intel.com, deepak.k.jain@intel.com,\n\tMarko Kovacevic <marko.kovacevic@intel.com>",
        "Date": "Fri,  8 Jun 2018 10:10:01 +0100",
        "Message-Id": "<20180608091001.16738-1-marko.kovacevic@intel.com>",
        "X-Mailer": "git-send-email 2.9.5",
        "Subject": "[dpdk-dev] [PATCH v1] crypto/aesni_mb: support 3DES",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Marko Kovacevic <marko.kovacevic@intel.com>\n\nAdded support for 3DES cipher algorithm which\nwill support 8, 16 and 24 byte keys, which also has been\nadded in the v0.50 of the IPSec Multi-buffer lib.\n\nSigned-off-by: Marko Kovacevic <marko.kovacevic@intel.com>\n---\n doc/guides/cryptodevs/aesni_mb.rst                 |  1 +\n doc/guides/cryptodevs/features/aesni_mb.ini        |  1 +\n doc/guides/rel_notes/release_18_08.rst             |  5 ++\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c         | 68 +++++++++++++++++++++-\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c     | 20 +++++++\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h | 18 ++++--\n test/test/test_cryptodev.c                         | 20 +++++++\n test/test/test_cryptodev_des_test_vectors.h        | 48 +++++++++++++--\n 8 files changed, 169 insertions(+), 12 deletions(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst\nindex 236828c..e53b121 100644\n--- a/doc/guides/cryptodevs/aesni_mb.rst\n+++ b/doc/guides/cryptodevs/aesni_mb.rst\n@@ -27,6 +27,7 @@ Cipher algorithms:\n * RTE_CRYPTO_CIPHER_AES256_CTR\n * RTE_CRYPTO_CIPHER_AES_DOCSISBPI\n * RTE_CRYPTO_CIPHER_DES_CBC\n+* RTE_CRYPTO_CIPHER_3DES_CBC\n * RTE_CRYPTO_CIPHER_DES_DOCSISBPI\n \n Hash algorithms:\ndiff --git a/doc/guides/cryptodevs/features/aesni_mb.ini b/doc/guides/cryptodevs/features/aesni_mb.ini\nindex 1e263c2..f729574 100644\n--- a/doc/guides/cryptodevs/features/aesni_mb.ini\n+++ b/doc/guides/cryptodevs/features/aesni_mb.ini\n@@ -24,6 +24,7 @@ AES CTR (192)  = Y\n AES CTR (256)  = Y\n AES DOCSIS BPI = Y\n DES CBC        = Y\n+3DES CBC       = Y\n DES DOCSIS BPI = Y\n \n ;\ndiff --git a/doc/guides/rel_notes/release_18_08.rst b/doc/guides/rel_notes/release_18_08.rst\nindex 5bc23c5..b931665 100644\n--- a/doc/guides/rel_notes/release_18_08.rst\n+++ b/doc/guides/rel_notes/release_18_08.rst\n@@ -41,6 +41,11 @@ New Features\n      Also, make sure to start the actual text at the margin.\n      =========================================================\n \n+* **Updated the AESNI MB PMD.**\n+\n+  The AESNI MB PMD has been updated with additional support for:\n+\n+  * 3DES for 8, 16 and 24 byte keys.\n \n API Changes\n -----------\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\nindex bb35c66..80a0372 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c\n@@ -182,6 +182,7 @@ aesni_mb_set_session_cipher_parameters(const struct aesni_mb_op_fns *mb_ops,\n \t\tconst struct rte_crypto_sym_xform *xform)\n {\n \tuint8_t is_aes = 0;\n+\tuint8_t is_3DES = 0;\n \taes_keyexp_t aes_keyexp_fn;\n \n \tif (xform == NULL) {\n@@ -227,6 +228,10 @@ aesni_mb_set_session_cipher_parameters(const struct aesni_mb_op_fns *mb_ops,\n \tcase RTE_CRYPTO_CIPHER_DES_DOCSISBPI:\n \t\tsess->cipher.mode = DOCSIS_DES;\n \t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CBC:\n+\t\tsess->cipher.mode = DES3;\n+\t\tis_3DES = 1;\n+\t\tbreak;\n \tdefault:\n \t\tMB_LOG_ERR(\"Unsupported cipher mode parameter\");\n \t\treturn -ENOTSUP;\n@@ -261,11 +266,58 @@ aesni_mb_set_session_cipher_parameters(const struct aesni_mb_op_fns *mb_ops,\n \t\t\t\tsess->cipher.expanded_aes_keys.encode,\n \t\t\t\tsess->cipher.expanded_aes_keys.decode);\n \n+\t} else if (is_3DES) {\n+\n+\t\tuint64_t *keys[3] = {sess->cipher.exp_3des_keys.key[0],\n+\t\t\t\tsess->cipher.exp_3des_keys.key[1],\n+\t\t\t\tsess->cipher.exp_3des_keys.key[2]};\n+\n+\t\tswitch (xform->cipher.key.length) {\n+\n+\t\tcase  24:\n+\t\t\tdes_key_schedule(keys[0], xform->cipher.key.data);\n+\t\t\tdes_key_schedule(keys[1], xform->cipher.key.data+8);\n+\t\t\tdes_key_schedule(keys[2], xform->cipher.key.data+16);\n+\n+\t\t\t/* Initialize keys - 24 bytes: [K1-K2-K3] */\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[0] = keys[0];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[1] = keys[1];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[2] = keys[2];\n+\t\t\tbreak;\n+\n+\t\tcase 16:\n+\t\t\tdes_key_schedule(keys[0], xform->cipher.key.data);\n+\t\t\tdes_key_schedule(keys[1], xform->cipher.key.data+8);\n+\n+\t\t\t/* Initialize keys - 16 bytes: [K1=K1,K2=K2,K3=K1] */\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[0] = keys[0];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[1] = keys[1];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[2] = keys[0];\n+\t\t\tbreak;\n+\n+\t\tcase 8:\n+\t\t\tdes_key_schedule(keys[0], xform->cipher.key.data);\n+\n+\t\t\t/* Initialize keys - 8 bytes: [K1 = K2 = K3] */\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[0] = keys[0];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[1] = keys[0];\n+\t\t\tsess->cipher.exp_3des_keys.ks_ptr[2] = keys[0];\n+\t\t\tbreak;\n+\n+\t\tdefault:\n+\t\t\tMB_LOG_ERR(\"Invalid cipher key length\");\n+\t\t\treturn -EINVAL;\n+\t}\n+\n+\t\tsess->cipher.key_length_in_bytes = 24;\n+\n \t} else {\n+\n \t\tif (xform->cipher.key.length != 8) {\n \t\t\tMB_LOG_ERR(\"Invalid cipher key length\");\n \t\t\treturn -EINVAL;\n \t\t}\n+\n \t\tsess->cipher.key_length_in_bytes = 8;\n \n \t\tdes_key_schedule((uint64_t *)sess->cipher.expanded_aes_keys.encode,\n@@ -524,8 +576,20 @@ set_mb_job_params(JOB_AES_HMAC *job, struct aesni_mb_qp *qp,\n \tjob->cipher_mode = session->cipher.mode;\n \n \tjob->aes_key_len_in_bytes = session->cipher.key_length_in_bytes;\n-\tjob->aes_enc_key_expanded = session->cipher.expanded_aes_keys.encode;\n-\tjob->aes_dec_key_expanded = session->cipher.expanded_aes_keys.decode;\n+\n+\tif (job->cipher_mode == DES3) {\n+\t\tjob->aes_enc_key_expanded =\n+\t\t\tsession->cipher.exp_3des_keys.ks_ptr;\n+\t\tjob->aes_dec_key_expanded =\n+\t\t\tsession->cipher.exp_3des_keys.ks_ptr;\n+\t} else {\n+\t\tjob->aes_enc_key_expanded =\n+\t\t\tsession->cipher.expanded_aes_keys.encode;\n+\t\tjob->aes_dec_key_expanded =\n+\t\t\tsession->cipher.expanded_aes_keys.decode;\n+\t}\n+\n+\n \n \n \t/* Set authentication parameters */\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\nindex 0153052..a674afb 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c\n@@ -239,6 +239,26 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/*  3DES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_3DES_CBC,\n+\t\t\t\t.block_size = 8,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 24,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* DES DOCSIS BPI */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\nindex a33b2f6..b6920bc 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\n@@ -173,12 +173,18 @@ struct aesni_mb_session {\n \n \t\tuint64_t key_length_in_bytes;\n \n-\t\tstruct {\n-\t\t\tuint32_t encode[60] __rte_aligned(16);\n-\t\t\t/**< encode key */\n-\t\t\tuint32_t decode[60] __rte_aligned(16);\n-\t\t\t/**< decode key */\n-\t\t} expanded_aes_keys;\n+\t\tunion {\n+\t\t\tstruct {\n+\t\t\t\tuint32_t encode[60] __rte_aligned(16);\n+\t\t\t\t/**< encode key */\n+\t\t\t\tuint32_t decode[60] __rte_aligned(16);\n+\t\t\t\t/**< decode key */\n+\t\t\t} expanded_aes_keys;\n+\t\t\tstruct {\n+\t\t\t\tconst void *ks_ptr[3];\n+\t\t\t\tuint64_t key[3][16];\n+\t\t\t} exp_3des_keys;\n+\t\t};\n \t\t/**< Expanded AES keys - Allocating space to\n \t\t * contain the maximum expanded key size which\n \t\t * is 240 bytes for 256 bit AES, calculate by:\ndiff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c\nindex 389f796..feb3c13 100644\n--- a/test/test/test_cryptodev.c\n+++ b/test/test/test_cryptodev.c\n@@ -4998,6 +4998,24 @@ test_DES_cipheronly_mb_all(void)\n \n \treturn TEST_SUCCESS;\n }\n+static int\n+test_3DES_cipheronly_mb_all(void)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tint status;\n+\n+\tstatus = test_blockcipher_all_tests(ts_params->mbuf_pool,\n+\t\tts_params->op_mpool,\n+\t\tts_params->session_mpool,\n+\t\tts_params->valid_devs[0],\n+\t\trte_cryptodev_driver_id_get(\n+\t\tRTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD)),\n+\t\tBLKCIPHER_3DES_CIPHERONLY_TYPE);\n+\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\treturn TEST_SUCCESS;\n+}\n \n static int\n test_DES_docsis_mb_all(void)\n@@ -9003,6 +9021,8 @@ static struct unit_test_suite cryptodev_aesni_mb_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\t\t\t\ttest_DES_docsis_mb_all),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n+\t\t\t\t\t\ttest_3DES_cipheronly_mb_all),\n+\t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_AES_CCM_authenticated_encryption_test_case_128_1),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown,\n \t\t\ttest_AES_CCM_authenticated_decryption_test_case_128_1),\ndiff --git a/test/test/test_cryptodev_des_test_vectors.h b/test/test/test_cryptodev_des_test_vectors.h\nindex 43be83d..4217b72 100644\n--- a/test/test/test_cryptodev_des_test_vectors.h\n+++ b/test/test/test_cryptodev_des_test_vectors.h\n@@ -792,6 +792,30 @@ triple_des192cbc_hmac_sha1_test_vector = {\n \t\t.len = 20\n \t}\n };\n+static const struct blockcipher_test_data\n+triple_des64cbc_test_vector = {\n+\t.crypto_algo = RTE_CRYPTO_CIPHER_3DES_CBC,\n+\t.cipher_key = {\n+\t\t.data = {\n+\t\t\t0xE4, 0x23, 0x33, 0x8A, 0x35, 0x64, 0x61, 0xE2\n+\t\t},\n+\t\t.len = 8\n+\t},\n+\t.iv = {\n+\t\t.data = {\n+\t\t\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,\n+\t\t},\n+\t\t.len = 8\n+\t},\n+\t.plaintext = {\n+\t\t.data = plaintext_des,\n+\t\t.len = 512\n+\t},\n+\t.ciphertext = {\n+\t\t.data = ciphertext512_des,\n+\t\t.len = 512\n+\t},\n+};\n \n static const struct blockcipher_test_data\n des_cbc_test_vector = {\n@@ -1205,6 +1229,18 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = {\n \n static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = {\n \t{\n+\t\t.test_descr = \"3DES-64-CBC Encryption\",\n+\t\t.test_data = &triple_des64cbc_test_vector,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n+\t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB\n+\t},\n+\t{\n+\t\t.test_descr = \"3DES-64-CBC Decryption\",\n+\t\t.test_data = &triple_des64cbc_test_vector,\n+\t\t.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,\n+\t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB\n+\t},\n+\t{\n \t\t.test_descr = \"3DES-128-CBC Encryption\",\n \t\t.test_data = &triple_des128cbc_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,\n@@ -1212,7 +1248,8 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = {\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_QAT |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA_SEC |\n-\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP |\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MB\n \t},\n \t{\n \t\t.test_descr = \"3DES-128-CBC Decryption\",\n@@ -1222,7 +1259,8 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = {\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_QAT |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA_SEC |\n-\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP |\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MB\n \t},\n \t{\n \t\t.test_descr = \"3DES-192-CBC Encryption\",\n@@ -1233,7 +1271,8 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = {\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n-\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP |\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MB\n \t},\n \t{\n \t\t.test_descr = \"3DES-192-CBC Decryption\",\n@@ -1244,7 +1283,8 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = {\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_DPAA_SEC |\n \t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n-\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_CCP |\n+\t\t\tBLOCKCIPHER_TEST_TARGET_PMD_MB\n \t},\n \t{\n \t\t.test_descr = \"3DES-128-CTR Encryption\",\n",
    "prefixes": [
        "dpdk-dev",
        "v1"
    ]
}