get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/40870/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 40870,
    "url": "http://patches.dpdk.org/api/patches/40870/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com",
    "date": "2018-06-08T16:45:18",
    "name": "[dpdk-dev,09/16] crypto/cpt/base: add prepare request API for HASH and HMAC",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "a711dfdc6b93760a1275fd5e23ef767e947f1298",
    "submitter": {
        "id": 893,
        "url": "http://patches.dpdk.org/api/people/893/?format=api",
        "name": "Anoob Joseph",
        "email": "anoob.joseph@caviumnetworks.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com/mbox/",
    "series": [
        {
            "id": 58,
            "url": "http://patches.dpdk.org/api/series/58/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=58",
            "date": "2018-06-08T16:45:09",
            "name": "Adding Cavium's crypto device(CPT) driver",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/58/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/40870/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/40870/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id BC57B47CD;\n\tFri,  8 Jun 2018 18:49:21 +0200 (CEST)",
            "from NAM04-SN1-obe.outbound.protection.outlook.com\n\t(mail-eopbgr700054.outbound.protection.outlook.com [40.107.70.54])\n\tby dpdk.org (Postfix) with ESMTP id 8DDF11BA9E\n\tfor <dev@dpdk.org>; Fri,  8 Jun 2018 18:49:19 +0200 (CEST)",
            "from ajoseph83.caveonetworks.com.caveonetworks.com (115.113.156.2)\n\tby SN6PR07MB4911.namprd07.prod.outlook.com (2603:10b6:805:3c::29)\n\twith Microsoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.820.15;\n\tFri, 8 Jun 2018 16:49:14 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=BuiPkoHgxWU2bpvUeddVjebGsnJRwQHpOf+qTJHMIO8=;\n\tb=aGMKE0HCVx6tCetLjZt6JxiG7/cEaW8WseU6VsmOZepxKiAlWFISbadSmR3HcG07htknt2Hvc35lbbzSKqDwjX5cbjz28GQA2/NsGNGwjeLBCdvzQTr3W07YgdRKwvlxnujgcveHIDy0mI3jwdZjsasy83HEphJLQQo8KIKkTKM=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Anoob.Joseph@cavium.com; ",
        "From": "Anoob Joseph <anoob.joseph@caviumnetworks.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>,\n\tPablo de Lara <pablo.de.lara.guarch@intel.com>,\n\tThomas Monjalon <thomas@monjalon.net>",
        "Cc": "Murthy NSSR <Nidadavolu.Murthy@cavium.com>,\n\tAnkur Dwivedi <ankur.dwivedi@cavium.com>,\n\tJerin Jacob <jerin.jacob@caviumnetworks.com>,\n\tNarayana Prasad <narayanaprasad.athreya@caviumnetworks.com>,\n\tNithin Dabilpuram <nithin.dabilpuram@cavium.com>,\n\tRagothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>,\n\tSrisivasubramanian Srinivasan\n\t<Srisivasubramanian.Srinivasan@cavium.com>, dev@dpdk.org",
        "Date": "Fri,  8 Jun 2018 22:15:18 +0530",
        "Message-Id": "<1528476325-15585-10-git-send-email-anoob.joseph@caviumnetworks.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "References": "<1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[115.113.156.2]",
        "X-ClientProxiedBy": "BM1PR01CA0071.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:b00:1::11) To SN6PR07MB4911.namprd07.prod.outlook.com\n\t(2603:10b6:805:3c::29)",
        "X-MS-PublicTrafficType": "Email",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(7020095)(4652020)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);\n\tSRVR:SN6PR07MB4911; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; SN6PR07MB4911;\n\t3:mgUwWDTKYAHeaUiKjre7huSnMQuUpswuXeqhyuT4BZbXq8OLjg28UcoeAfwV0QB8wvfdmay5qpOTqm15NzdOcJdRVg6V/NbO83jhtdpKcJP/+MeoeuEfOPI1UlbnThDqj1RuEMhWYfRsAAxWrZIog2y9k9VvttYU02eNJHLzMTxeKLWH9z/PxDG9mFz5eTOzsKUVzmAb1WiPHtpY6vNpE6JmiROh140S75fMq/8W4cVKNFOrSBicPZCUG74Nsn1h;\n\t25:vRJ76WFU7JI36qL0bCjYmY5ZR9tqwL4ZsRElUD1Ojpi+yUL7oEohyKpUUP/7NSGfgtYFI/YjtFk7GL82gRy30po2cv3Hp0Br5pPlNuvbz/JLitmvHhIv1qWJeYx2QuigrrRI/5lZEJLkTLrxgsrn454wDAs95v1902TB+kxJBCDkSqRgYNBg0RCVfqJ19wgVCogCypI3sCZlduDbcA7l0SEUE+oyTsfYdCZlEaT+Xn6PONuHRK0XhVxm6fjIg12jTtbQ5L+HJGCxXLNMaRVbdqxp8kiGGhappFRQeFZSRtUEoFFJ8MS2wdFwVx+Z2CkV3sMV3Xg7B0FAEqtj5hxBdQ==;\n\t31:Ff2jc83xtiulrb+ZSuJV43IAf5Cr9JMTLbgczArbB3V8c+I1WmJxyCDU92KOFh1sI22XX/Qpbv9NEq4M882gfnSnjFN/wWxrwiIo+PCC095mqWQ0WVoCSRcAJ5oH5cimrQFVFYi7B00J1cmYk+lStt4AyOhyfojxpwh46RkveNV5ZZGGXjJLjCwlp/W9vE/1YsajOHl5ELYSKvBTJOqeAgHek5JmEeKOppfj1XJB9CE=",
            "1; SN6PR07MB4911;\n\t20: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;\n\t4:v3rqwxOESPgSknMnBlAtL19X7AqGtXGUS/8l5Xqd+gFpY1Zx+0DveMULgSEbSFqQOYDd8R4pRNlD1bAVaUC0OnQNMhieSFisupIATwaXA4uJaLjQC9Xi2FgoFmP//EJK1W8YbDhv2na8d7VkV69Og7XHz/Mhcv7JXVhQAy+PGX6+dHFu6RvuGwoQ1kd3Nm7v4unjYmapL3na6xPHGh/sN0PGKaWjoCbHo5DKJ3v0tjZEwU5kJZ9wiZsMkR9adjFa2dWj7ojS/X0Rxiv4v50WHA==",
            "=?us-ascii?Q?1; SN6PR07MB4911;\n\t23:ymO1WAnxc+e3xSl6HM+KeQUZpILN2JYQLt3JYAcV0?=\n\t1d+SYlgmHH5g3WHUadwT2A1hk5k//yxqo1aGAinVpGlbDwhWzr+fD71pu4Fv0WMVJZzcnMU4RUxb09CCi0d7Ew+wB60IQrUimrMUnRn60L8WdB+Uyy6uVSdfPl2dolxzMCl+9Z70RZL8j/3Njk0LNNCujUyRbk3fSw9jyJOubPNEwNmiBbOFmT2CI86IZBvOwvNUF+v+/J0bWzzcfN6Xv9XeUENplvNi8qsDxui5ZJ4Bt86d4eafpkE12uOELWip0tDyRVg6Tglg2jcVvjZHVv17IM0dZ/1P3P/6pA3QNfgVDOJiAHv+HSucSonAp/+/bug0jBBK5KB2X3HeL77rxfOXLWEgoPTvY05/t8uwGE4WifCwLtG6sOjdF46awtkPwIauZZsFTjuXzYo0cCYEUwxEthmJUqh+zuqbu+mvvrzymuViWEXRg0txgv8yZDNzwn6eqTovj6/DtDvqkjC2L7TtyWwFMHfcQj9H5EC1P7VwzMrlFemvipQKj1cpk6yMH+tO/DlFgZqXgnHwfaduvnN/8guJcSZzSs+pR7MpV5eSkGWcpgTA5B/bQhR5Q9MxN6tM/YAkG6eLnsdhW787BqvS+M/k9HwCiTdxtRCBvhxsg7Kw4lcko0dxb7JVzbfbN6Oi3q15cOleNV8FQ12F5Wojb/o3EreJ9cO2b/Cco5ng/lutg1lPA1nLGvU12pNfvEsRjmwkHcPcqVAtQCURKp/GX31CNc0amtjBhOoypPQ21NuZectXCFxniQf87ROAgXNCBUHzxb4cqzNhhAAhEdWoh538HDpHT8xdzDdUELrj2aXfOsE8I6uaAmvHEh6XpYFhn6kFR8Xb5h8uNYclEHmLycWSv3kfjWgLZpjO36JaH0K34NIUjzZQrwi3xsAh+DrrzxDySR3n4ZFplP2tLYTTtd2wQEx3rJT6bwE4qLzXnc8iMrW2U3V7LmO0x/JJEHzgIdbWfnasrGmANc1kwFb3zVv74N3yYLsenc+ztHxA0rx+e9dvmCqURGL25Xpsbq7WxlXmWVLiPb0uwh5aJGG8t/kHpflpYNBmxw8i7IdI5wmtxe3HvHUHnkTRZ30cPQhnZV3PVDlESPLaLTMxlpquz76Ut3Zomge0r1WMfgvCk4/6fotpaBX7yJ2fA6zFaQoUgwdCDWb/ZLJY5BHNpYnwOf/BLa04qTEVD9AB429FS9UfkZJMTBggXKQsXbKajZBtTN5qETRaohuX3ToFFf8jwt68SiRzcFj9B6noMk9Jg==",
            "1; SN6PR07MB4911;\n\t6:ewyCqiJa610ZoBmJQ9osY/2kXml8Ec6NNffhsbKX8r4F0zb9EbCli0ZeBB00FIob85/t6/XKOY7RDvJtG8DJByjnZKWCyYYooveDkOjTwlF1kKk67ecjh3CIlaIBTZ00I5hxodewQZnLZ3FqMENZN5bc9ksG8hhka8DKvSfzmtNlvtrAfPNZA4H4MhvZMKbdkbavFmE/neZbpUPlnXWGf2KYUFRr0xDwciByDJ9Ognuel8lu7H+6cXNRrtj0mroHCo1gvQJltLFcGZf+LRFzov5H00xijPs4ckwGZIKfftFccNlvXV3yQmsvkR97G7X3gYpK+MDizh5SbIKFrsmRIW3CNXOapYt99vNtU1IHuK/2H8FXb4Yw09XombTHXHJrVRYDRzmer/d3Za6x/c+lpHeyYUc+WjdjSNqzDr6hkKXsFiU9hBGi4xbi4+MkFv25LkUxpC35K7VCYwVr42Efsg==;\n\t5:fSrG4idRikPs+jx8qqklD1jPImAkB2/OlE45D9QHvYbwOd8pZPj7A2tEC3+LssawFM5Si0eL9wE4GJpU0yH7yqGxdAbKIbPFetMZcdgXJpaG9CfsBc53xxuahyJ5N3r+jMYnVhLYOHRud+tsFU6MHKi/SvNPlrQPO1Cxm1keCBk=;\n\t24:Lt+2iP2/HxC4b1QqHOdLo8IzjwPAsHV09I545wj/QhK56DYeKSZydLMfemvKIB7Q6qoB9ot6qQHyHiWUV0MeUvnLaeg+YkeEyAJdhf+E4R4=",
            "1; SN6PR07MB4911;\n\t7:m64Z3DykKwgKMxheVR/ZvCisxExfczBqAcs1TH31CvDsU9dGnfSAWEBthLdXSGB8pFALJKJOhL/RBm7bA03LQVPkGt5PpjTu7i4c72HpdNBErSFTV/xMjU4i8aC64CqBD6uJNsWy7YMtl6gM7PgkZnxImfJAcxBjCpIoeYW18xiAjJNcax9axiKUmZUwb2N14r9+Qw37lnmMhm4MCU6LOHVmgyCqPZr0DUruw+wNj7HnOKttM/vReoWPvAh5G0hn"
        ],
        "X-MS-TrafficTypeDiagnostic": "SN6PR07MB4911:",
        "X-Microsoft-Antispam-PRVS": "<SN6PR07MB491180154A41F3CD9F65469BF87B0@SN6PR07MB4911.namprd07.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3002001)(3231254)(944501410)(52105095)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016);\n\tSRVR:SN6PR07MB4911; BCL:0; PCL:0; RULEID:; SRVR:SN6PR07MB4911; ",
        "X-Forefront-PRVS": "06973FFAD3",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(376002)(396003)(346002)(39380400002)(366004)(39860400002)(189003)(199004)(26005)(52116002)(956004)(305945005)(8676002)(81156014)(50226002)(8936002)(81166006)(7736002)(68736007)(105586002)(106356001)(3846002)(6116002)(72206003)(478600001)(6486002)(97736004)(6506007)(16586007)(6512007)(53936002)(47776003)(486006)(25786009)(5660300001)(50466002)(48376002)(4326008)(54906003)(76176011)(36756003)(110136005)(66066001)(8656006)(2906002)(316002)(55236004)(11346002)(16526019)(386003)(186003)(59450400001)(446003)(476003)(42882007)(44832011)(2616005)(51416003);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR07MB4911;\n\tH:ajoseph83.caveonetworks.com.caveonetworks.com; FPR:; SPF:None;\n\tLANG:en; PTR:InfoNoRecords; MX:1; A:1; ",
        "Received-SPF": "None (protection.outlook.com: cavium.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "OBihZspdEnF73PweL63b5K7nG66NYOltztZgi20B9SeHpo19uxy6VHcmLasnlB4y35HUVagdaU66RYPa1U2tAPiceMz8/XI+zx4zxWvd4ZIcba2DIX5jXprUr+gfv4m62I/U5ALzRWZEAIZKTAaXNRN5owg99SGCWEJFVgsNkvcxqXRKQfxaxOtSVRUUyX3f",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Office365-Filtering-Correlation-Id": "b6238039-9629-4ac9-14a6-08d5cd5fc672",
        "X-OriginatorOrg": "caviumnetworks.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "08 Jun 2018 16:49:14.2437\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "b6238039-9629-4ac9-14a6-08d5cd5fc672",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "711e4ccf-2e9b-4bcf-a551-4094005b6194",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "SN6PR07MB4911",
        "Subject": "[dpdk-dev] [PATCH 09/16] crypto/cpt/base: add prepare request API\n\tfor HASH and HMAC",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Murthy NSSR <Nidadavolu.Murthy@cavium.com>\n\nThese functions help in preparing symmetric crypto requests\nfor HMAC only or HMAC only cases.\n\nSigned-off-by: Ankur Dwivedi <ankur.dwivedi@cavium.com>\nSigned-off-by: Murthy NSSR <Nidadavolu.Murthy@cavium.com>\nSigned-off-by: Nithin Dabilpuram <nithin.dabilpuram@cavium.com>\nSigned-off-by: Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>\nSigned-off-by: Srisivasubramanian Srinivasan <Srisivasubramanian.Srinivasan@cavium.com>\n---\n drivers/crypto/cpt/base/cpt_ops.c | 215 ++++++++++++++++++++++++++++++++++++++\n 1 file changed, 215 insertions(+)",
    "diff": "diff --git a/drivers/crypto/cpt/base/cpt_ops.c b/drivers/crypto/cpt/base/cpt_ops.c\nindex 15c3413..eb25607 100644\n--- a/drivers/crypto/cpt/base/cpt_ops.c\n+++ b/drivers/crypto/cpt/base/cpt_ops.c\n@@ -450,6 +450,218 @@ int32_t cpt_fc_get_ctx_len(void)\n \treturn (uint32_t)i;\n }\n \n+static int\n+cpt_digest_gen_prep(uint32_t flags,\n+\t\t    uint64_t d_offs,\n+\t\t    uint64_t d_lens,\n+\t\t    digest_params_t *params,\n+\t\t    void *op,\n+\t\t    void **prep_req)\n+{\n+\tcpt_request_info_t *req;\n+\tuint32_t size, i;\n+\tint32_t m_size;\n+\tuint16_t data_len, mac_len, key_len;\n+\tauth_type_t hash_type;\n+\tbuf_ptr_t *meta_p;\n+\tstruct cpt_ctx *ctx;\n+\tsg_comp_t *gather_comp;\n+\tsg_comp_t *scatter_comp;\n+\tuint8_t *in_buffer;\n+\tuint32_t g_size_bytes, s_size_bytes;\n+\tuint64_t dptr_dma, rptr_dma;\n+\tvq_cmd_word0_t vq_cmd_w0;\n+\tvq_cmd_word3_t vq_cmd_w3;\n+\tvoid *c_vaddr, *m_vaddr;\n+\tuint64_t c_dma, m_dma;\n+\topcode_info_t opcode;\n+\n+\tif (!params || !params->ctx_buf.vaddr)\n+\t\treturn ERR_BAD_INPUT_ARG;\n+\n+\t(void)d_offs;\n+\tctx = params->ctx_buf.vaddr;\n+\tmeta_p = &params->meta_buf;\n+\n+\tif (!meta_p->vaddr || !meta_p->dma_addr)\n+\t\treturn ERR_BAD_INPUT_ARG;\n+\n+\tif (meta_p->size < sizeof(cpt_request_info_t))\n+\t\treturn ERR_BAD_INPUT_ARG;\n+\n+\tm_vaddr = meta_p->vaddr;\n+\tm_dma = meta_p->dma_addr;\n+\tm_size = meta_p->size;\n+\n+\t/*\n+\t * Save initial space that followed app data for completion code &\n+\t * alternate completion code to fall in same cache line as app data\n+\t */\n+\tm_vaddr = (uint8_t *)m_vaddr + COMPLETION_CODE_SIZE;\n+\tm_dma += COMPLETION_CODE_SIZE;\n+\tsize = (uint8_t *)RTE_PTR_ALIGN((uint8_t *)m_vaddr, 16) -\n+\t\t(uint8_t *)m_vaddr;\n+\tc_vaddr = (uint8_t *)m_vaddr + size;\n+\tc_dma = m_dma + size;\n+\tsize += sizeof(cpt_res_s_t);\n+\n+\tm_vaddr = (uint8_t *)m_vaddr + size;\n+\tm_dma += size;\n+\tm_size -= size;\n+\n+\treq = m_vaddr;\n+\n+\tsize = sizeof(cpt_request_info_t);\n+\tm_vaddr = (uint8_t *)m_vaddr + size;\n+\tm_dma += size;\n+\tm_size -= size;\n+\n+\t/* Initialising ctrl and opcode fields */\n+\n+\treq->dma_mode = CTRL_DMA_MODE_SGIO;\n+\treq->se_req = SE_CORE_REQ;\n+\n+\thash_type = ctx->hash_type;\n+\tmac_len = ctx->mac_len;\n+\tkey_len = ctx->auth_key_len;\n+\tdata_len = AUTH_DLEN(d_lens);\n+\n+\t/*GP op header */\n+\tvq_cmd_w0.u64 = 0;\n+\tvq_cmd_w0.s.param2 = htobe16(((uint16_t)hash_type << 8));\n+\tif (ctx->hmac) {\n+\t\topcode.s.major = MAJOR_OP_HMAC | DMA_MODE;\n+\t\tvq_cmd_w0.s.param1 = htobe16(key_len);\n+\t\tvq_cmd_w0.s.dlen = htobe16((data_len + ROUNDUP8(key_len)));\n+\t} else {\n+\t\topcode.s.major = MAJOR_OP_HASH | DMA_MODE;\n+\t\tvq_cmd_w0.s.param1 = 0;\n+\t\tvq_cmd_w0.s.dlen = htobe16(data_len);\n+\t}\n+\n+\topcode.s.minor = 0;\n+\n+\tvq_cmd_w0.s.opcode = htobe16(opcode.flags);\n+\n+\t/* DPTR has SG list */\n+\tin_buffer = m_vaddr;\n+\tdptr_dma = m_dma;\n+\n+\t((uint16_t *)in_buffer)[0] = 0;\n+\t((uint16_t *)in_buffer)[1] = 0;\n+\n+\t/* TODO Add error check if space will be sufficient */\n+\tgather_comp = (sg_comp_t *)((uint8_t *)m_vaddr + 8);\n+\n+\t/*\n+\t * Input gather list\n+\t */\n+\n+\ti = 0;\n+\n+\tif (ctx->hmac) {\n+\t\tuint64_t k_dma = params->ctx_buf.dma_addr +\n+\t\t\toffsetof(struct cpt_ctx, auth_key);\n+\t\t/* Key */\n+\t\ti = fill_sg_comp(gather_comp, i, k_dma,\n+\t\t\t\t ctx->auth_key, ROUNDUP8(key_len));\n+\t}\n+\n+\t/* input data */\n+\tsize = data_len;\n+\tif (size) {\n+\t\ti = fill_sg_comp_from_iov(gather_comp, i, params->src_iov,\n+\t\t\t\t\t  0, &size, NULL, 0);\n+\t\tif (size) {\n+\t\t\tPMD_TX_LOG(DEBUG, \"Insufficient dst IOV size, short by\"\n+\t\t\t\t   \" %dB\\n\", size);\n+\t\t\treturn ERR_BAD_INPUT_ARG;\n+\t\t}\n+\t} else {\n+\t\t/*\n+\t\t * Looks like we need to support zero data\n+\t\t * gather ptr in case of hash & hmac\n+\t\t */\n+\t\ti++;\n+\t}\n+\t((uint16_t *)in_buffer)[2] = htobe16(i);\n+\tg_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t);\n+\n+\n+\t/*\n+\t * Output Gather list\n+\t */\n+\n+\ti = 0;\n+\tscatter_comp =\n+\t\t(sg_comp_t *)((uint8_t *)gather_comp + g_size_bytes);\n+\n+\tif (flags & VALID_MAC_BUF) {\n+\t\tif (params->mac_buf.size < mac_len)\n+\t\t\treturn ERR_BAD_INPUT_ARG;\n+\n+\t\tsize = mac_len;\n+\t\ti = fill_sg_comp_from_buf_min(scatter_comp, i,\n+\t\t\t\t\t      &params->mac_buf, &size);\n+\t} else {\n+\t\tsize = mac_len;\n+\t\ti = fill_sg_comp_from_iov(scatter_comp, i,\n+\t\t\t\t\t  params->src_iov, data_len,\n+\t\t\t\t\t  &size, NULL, 0);\n+\t\tif (size) {\n+\t\t\tPMD_TX_LOG(DEBUG, \"Insufficient dst IOV size, short by\"\n+\t\t\t\t   \" %dB\\n\", size);\n+\t\t\treturn ERR_BAD_INPUT_ARG;\n+\t\t}\n+\t}\n+\n+\t((uint16_t *)in_buffer)[3] = htobe16(i);\n+\ts_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t);\n+\n+\tsize = g_size_bytes + s_size_bytes + SG_LIST_HDR_SIZE;\n+\n+\t/* This is DPTR len incase of SG mode */\n+\tvq_cmd_w0.s.dlen = htobe16(size);\n+\n+\tm_vaddr = (uint8_t *)m_vaddr + size;\n+\tm_dma += size;\n+\tm_size -= size;\n+\n+\t/* cpt alternate completion address saved earlier */\n+\treq->alternate_caddr = (uint64_t *)((uint8_t *)c_vaddr - 8);\n+\t*req->alternate_caddr = ~((uint64_t)COMPLETION_CODE_INIT);\n+\trptr_dma = c_dma - 8;\n+\n+\treq->ist.ei1 = dptr_dma;\n+\treq->ist.ei2 = rptr_dma;\n+\t/* First 16-bit swap then 64-bit swap */\n+\t/* TODO: HACK: Reverse the vq_cmd and cpt_req bit field definitions\n+\t * to eliminate all the swapping\n+\t */\n+\tvq_cmd_w0.u64 = htobe64(vq_cmd_w0.u64);\n+\n+\t/* vq command w3 */\n+\tvq_cmd_w3.u64 = 0;\n+\n+\t/* 16 byte aligned cpt res address */\n+\treq->completion_addr = (uint64_t *)((uint8_t *)c_vaddr);\n+\t*req->completion_addr = COMPLETION_CODE_INIT;\n+\treq->comp_baddr  = c_dma;\n+\n+\t/* Fill microcode part of instruction */\n+\treq->ist.ei0 = vq_cmd_w0.u64;\n+\treq->ist.ei3 = vq_cmd_w3.u64;\n+\n+\treq->op = op;\n+\n+#ifdef CPTVF_STRICT_PARAM_CHECK\n+\tif (!(m_size >= 0))\n+\t\tabort();\n+#endif\n+\t*prep_req = req;\n+\treturn 0;\n+}\n+\n static inline int  __attribute__((always_inline))\n cpt_enc_hmac_prep(uint32_t flags,\n \t\t  uint64_t d_offs,\n@@ -2531,6 +2743,9 @@ static inline int  __attribute__((always_inline))\n \t} else if (fc_type == KASUMI) {\n \t\tret = cpt_kasumi_enc_prep(flags, d_offs, d_lens,\n \t\t\t\t\t  fc_params, op, &prep_req);\n+\t} else if (fc_type == HASH_HMAC) {\n+\t\tret = cpt_digest_gen_prep(flags, d_offs, d_lens,\n+\t\t\t\t\t  fc_params, op, &prep_req);\n \t} else {\n \t\tret = ERR_EIO;\n \t}\n",
    "prefixes": [
        "dpdk-dev",
        "09/16"
    ]
}