get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/44193/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 44193,
    "url": "http://patches.dpdk.org/api/patches/44193/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1536033560-21541-19-git-send-email-ajoseph@caviumnetworks.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1536033560-21541-19-git-send-email-ajoseph@caviumnetworks.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1536033560-21541-19-git-send-email-ajoseph@caviumnetworks.com",
    "date": "2018-09-04T03:59:05",
    "name": "[v2,18/33] common/cpt: add common code for fill session data",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "8c99d64727ce3eabee5d7385e54c5aa81a1b04b8",
    "submitter": {
        "id": 891,
        "url": "http://patches.dpdk.org/api/people/891/?format=api",
        "name": "Anoob Joseph",
        "email": "ajoseph@caviumnetworks.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1536033560-21541-19-git-send-email-ajoseph@caviumnetworks.com/mbox/",
    "series": [
        {
            "id": 1164,
            "url": "http://patches.dpdk.org/api/series/1164/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=1164",
            "date": "2018-09-04T03:58:47",
            "name": "Adding Cavium's OcteonTX crypto PMD",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/1164/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/44193/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/44193/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id F32625F57;\n\tTue,  4 Sep 2018 06:03:32 +0200 (CEST)",
            "from NAM02-CY1-obe.outbound.protection.outlook.com\n\t(mail-cys01nam02on0060.outbound.protection.outlook.com\n\t[104.47.37.60]) by dpdk.org (Postfix) with ESMTP id 16E192C55\n\tfor <dev@dpdk.org>; Tue,  4 Sep 2018 06:03:10 +0200 (CEST)",
            "from ajoseph83.caveonetworks.com.com (115.113.156.2) by\n\tBYAPR07MB4902.namprd07.prod.outlook.com (2603:10b6:a02:ef::25) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n\t15.20.1101.15; Tue, 4 Sep 2018 04:03:02 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=/uYAZ9oatNa/FlMYvaOmZMtTMW0uZdm+rNe5GMkb39A=;\n\tb=Lg2MkoInyH5BlBOWPOj+0u4Qca04NQaKpjKs20B5Xa+Y5QIIBJYnXzsFDmhPE/OKkTPwkaPWLaZX3L+6y1hHrYRuz4h53upOLfNiIB7xu4AT9f6RysRDrm8aiRRpDRse26XXnPABtb/kKrhMzrd8NL2FOXw3E+WSlIfdXTBvmXI=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Anoob.Joseph@cavium.com; ",
        "From": "Anoob Joseph <ajoseph@caviumnetworks.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>,\n\tPablo de Lara <pablo.de.lara.guarch@intel.com>,\n\tThomas Monjalon <thomas@monjalon.net>",
        "Cc": "Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>,\n\tJerin Jacob <jerin.jacob@caviumnetworks.com>,\n\tNarayana Prasad <narayanaprasad.athreya@caviumnetworks.com>,\n\tdev@dpdk.org, Ankur Dwivedi <ankur.dwivedi@caviumnetworks.com>,\n\tAnoob Joseph <anoob.joseph@caviumnetworks.com>,\n\tMurthy NSSR <nidadavolu.murthy@caviumnetworks.com>,\n\tRagothaman Jayaraman <rjayaraman@caviumnetworks.com>,\n\tSrisivasubramanian S <ssrinivasan@caviumnetworks.com>,\n\tTejasree Kondoj <kondoj.tejasree@caviumnetworks.com>",
        "Date": "Tue,  4 Sep 2018 09:29:05 +0530",
        "Message-Id": "<1536033560-21541-19-git-send-email-ajoseph@caviumnetworks.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1536033560-21541-1-git-send-email-ajoseph@caviumnetworks.com>",
        "References": "<1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>\n\t<1536033560-21541-1-git-send-email-ajoseph@caviumnetworks.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[115.113.156.2]",
        "X-ClientProxiedBy": "BMXPR01CA0023.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:b00:d::33) To BYAPR07MB4902.namprd07.prod.outlook.com\n\t(2603:10b6:a02:ef::25)",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "fa460234-11fc-4143-7547-08d6121b5192",
        "X-Microsoft-Antispam": "BCL:0; PCL:0;\n\tRULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060)(7193020);\n\tSRVR:BYAPR07MB4902; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BYAPR07MB4902;\n\t3:8wbnEVxcfKy1SONnHOdz/tSsdsKxDjvoaFmNpGSqm0iDJOjVaSZLFT/evRvqhcxW7HZxcDa8FWDop6/0sd8Fdi+OLZtAZttsfzwUB4Nawcrv7oGaCDqCMXIHihFgYqR10ulvVOBEZl+vVbkzd2Ds4zTDbT4iwzSXebREJ8BRgKcPxl+mM9I4iJ04xuv1W7M+OPshZiue3p/MGaXd87thqh2792kKvXlTi9z0OlvhaDqsmZ1BtqRkrfsiFODot6wW;\n\t25:JUrWcS+kUOmRyI75y3zlHZOBzV5VQNbrAV4K7K9KBkumS/JD1MQSQOGX1sdPjtGVhtjrEsAFyoIjQZhnWmW6uLXrp1WiGZKLhzvElokYdVmMzey0m05OIbggbHMhLI2NcR1n6Q804OgSFOyTQixcQoQGuJd3vt1eH57y6watZ8y3aKw9U02UqpvCSieEBK2f6rRZJNUhNdxRHO6EcbRC+xWOVdl3H/snv8Xx77RKIcFU3ewx1Sn0VL/8IBhU9T7hskv9EPtSoDeNfwgO93y87OFmZbVN7PtJiX7saBfvgReTRYZ3s91kuTQ2/dBLq5m1+Tg1JaKWthxVRxAehwBpVA==;\n\t31:PVCiKxF4gKASI5Kk0pp4uX3oZT+AanBzlFU2oDUigOSZZffu9wcclOkWt32/fpe4a8MttbsnoLSyUMGAzVzDKiuYimb1f93hr36K+JeWeuvf3cmQiaPb0MjgspNhHN99g96TWrU1LcvnkNqVZ2xqIPsRk1sPJW1IV5gwQwrK/az3XoptIZ5nSBH0JMTs8+BtbMZJcZ+z8kRdazXR0lZ8UA9ukwF3uTDTR5TJ1GjK7Lk=",
            "1; BYAPR07MB4902;\n\t20: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;\n\t4:9z/8U7KKxh6ZQC73gxKZZB1SsdVCO8KVtsPRI8UmkoLhwzZ8GiKBnxTMMZxkB7mxmsczjtqAN/uu7elE5Dk/aLD1hL9ABYWKyyPgQxLV3PwmrfS0jV36bYSVLJ5FzOpC5Edi42NAptUo+JQJOUOA8/9YoAggEX39Dx/BJNy6WWGhIft0wPTna0CD1Mon3Z+wmlnjvx650zTuVm6dMlPfWjH+X9ilNQzsNEN2k/lk5PLLdQhZITB8upbxBrI+t9WMK+Q8dR8ovaacVvXvJ5QVEw9S7IV7CJzwtL39nuHNRTOw96MiMfRr4oRo7CM8T6Zm",
            "=?us-ascii?Q?1; BYAPR07MB4902;\n\t23:6QU1JKAdzkM8SasRWFHj+hvcnbYwzorOCDhYrn9H/?=\n\tVWdKFlDXFXYkrjxpdtvf1OuJSATNSsDbrZftmSOwD09MqtLq3e/VvyXyG58r+YgGvqzhQIg68eEaL4YmzFeU5aHRPNFhpJ6gZvEBQAHqu017FUWQNMOjvLq1GR2b9gWUCEzjkUuLaSpiRKUoOYpZtL6fa03PmNyltXt1HqctWNP1RDHjs2gOFLF0qXa0G9UMSbqVuonhrfCXlzAnfoYrEFkIEmlg3eRMnZwdXUR6boHj50hQu+C/n4+GqzyhWK40Ta5PYFbIqvvLk0yGHIXelkD85vsX4i6MH28W/z+zbMjmxtJevJ8NMvOMxpPpFnTUowTAedM3JYZyBDDSlhqJhklsFo/VsYQIRnKel6NNJBEflFN9zT8k161KiXClYJ0hdzitB5mKSBJy8SEMqePFZjHpWkdGpU9UQWcc7w0DYtJ/xPqGKOLvwmXZ5hJM3fCaM2MGgiWLh0jY5LW8bfb1Lt5uyjUpoAyXyj44CGmyym8oep0TRes5Ezqd5eOr4IIJ/ceORUEXQRFOW9zH0zopARDX/cP0YW1P8b5WaCxaTg3gFePmLUrZdCDNlZM/C6QsY/sSDgb1j/PrkMj2BOlxanZ5g7t5jOVelVBFrGExdc8dtfjb9KQ5zbOAkuXjZV5ElabC/Jl4Jo8Uj/To37TAdKRuiqD+DD9pRUOxeDPu/Qhh8YKN+i6otiwB9BQ/7DBBcxcleUWNL2Xb5KS2ruOexapWgEoKH0/EVMjjfpzbNXgJmRvkMW46V/NU9niD/WMGDg0dIPUs05u+wLuhXJ5YXZs1P1MbnWgCK5mXsHcKXTtQZfoRiGIizC6hI+riaVWNgGmO3mYnvo68LBVU0uqCqojySzhpb7iWDbQeNW84IJ8Wleht4NWOtkayapH1OlFepfCXfU500VZf51tLZ5r9nawaf4vt1X5sRFNmYmDenESl9sJ1G9P8kJF8jN1q4RqLtp/sE0bG5kH0r8+J+Hz8gCBH+RFaOWxEpFPh0124OeXpurbe+fnlVsJ0N0wBhuZrW3ef3OSX3W1mp7h09MLfL1xjauBeQP0ilDPnsGAMVg2n2K4YBx6tCy0SW5Zka+Nj5frtkoaUzZhD0y3IUrmruUot2BWl2nK3Ma74C37g6BxJQzXeFEQjQiwhrcBhf0ULmE9UCvmSn1tLDFTFyhsmMHqqXONbgdUb6TH9OfEk6w2mf6lM9Ar3+bpBn15nl/wGEQ=",
            "1; BYAPR07MB4902;\n\t6:Tl9XVCmj7yBdTnDxJmNBWEWRPgmtjUgZvcRqOhUIaQk1Q3U6x+8WhYIxREbyNaEcVHuZvJKfZQHRhE5Lb149zvxeq+jU1oyPZNu6YpM7dMMxFVe03Ksk20EKgpkjHX9ZQLkoIWGVenPpJw1qFEKRrARcA7+r3dYwcXMAiIblO9Ueqx/NlGLRvpMB7c4ICyGUtHcyOFzxH+HNBQdOn32mV3kM+BFVrwsYb69xmV4c5WxkrbGLdzjFWbsi9WmUlPqm9XSGoYHBb8X6+zDT8Uzq/DlaaXM4UQpDpXVS9TZLDa5M0Wl63geaC1NV0yZUDrotKcWXS3kQ8jKLJ9crivzeeTd4rLwn02r391mbMYQ3roI651vAime3TXDGv4OT6yr7IxNBVuQnTuOw2RPaO6+2b24qvOEO/MgpNJaj/UV97clD6iPC9K45KwdF2W77dND3ZWtll9IRJDcCeE7+rftJDQ==;\n\t5:v4PZ7NG2ypJa2C7Iqh75b7eF1vHyG+KiXrjoBzKd9iWihpzx16ln6uHxGBZyU+0pSPXSYYgQ6QuCH73z4Tbio1fCxA8fZTOOKRAf+h1Y5VT9CEuGKMjZM2uRtXxWkbkRd3qcNFsnN7TiotZroEHgNv5S/CC7iVjwI7e8I9ul86I=;\n\t7:G9Hf/kixIKtSq2G0DfzCb1wHAnmx92lnDVqyCap/mHWtGaErvFoTHZNjn3w7AMGtaUNq65iynHDWU6FEGCO90YeJD6mV66sp8cAaUfBzKjKsNsCEqa3Mzem5+xvx1qKoPn6ROIsVPcIgHOipMiLZnH62bUS59Jg6xus0vbESh05QLsqZy4+xodzuQXdI2iXDJj+Ymt59/1mXBKQO2lVqlv6baaJ1XbbhWQa1iQgZMJ/hBWiMqpdAJ8Lc+Y6DQq+W"
        ],
        "X-MS-TrafficTypeDiagnostic": "BYAPR07MB4902:",
        "X-Microsoft-Antispam-PRVS": "<BYAPR07MB490210950D600F7FBDA6949CF8030@BYAPR07MB4902.namprd07.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:(163750095850);",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3231311)(944501410)(52105095)(3002001)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(201708071742011)(7699016);\n\tSRVR:BYAPR07MB4902; BCL:0; PCL:0; RULEID:; SRVR:BYAPR07MB4902; ",
        "X-Forefront-PRVS": "0785459C39",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(366004)(396003)(136003)(346002)(376002)(39860400002)(199004)(189003)(26005)(51416003)(52116002)(76176011)(81166006)(305945005)(81156014)(7736002)(105586002)(316002)(6506007)(106356001)(6512007)(8936002)(446003)(54906003)(25786009)(68736007)(50226002)(110136005)(53936002)(16586007)(42882007)(386003)(5660300001)(2906002)(72206003)(50466002)(6486002)(36756003)(6116002)(107886003)(2616005)(14444005)(186003)(3846002)(478600001)(66066001)(476003)(8676002)(47776003)(486006)(575784001)(956004)(48376002)(11346002)(4326008)(97736004)(16526019);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR07MB4902;\n\tH:ajoseph83.caveonetworks.com.com; FPR:; SPF:None; LANG:en;\n\tPTR:InfoNoRecords; A:1; MX:1; ",
        "Received-SPF": "None (protection.outlook.com: cavium.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "f5R9F/V2ER7MEjMfVP0jhyQhuugJFr+QvyMHMrOcTSy+Yf8RyObnwoHxu0N/QB9q7PIsTyqLFxk2MzNjJfpv1YG5O60UwnlU/GRZ2nqBxikei4JT6039CNC7DvpN6taPH0OBAS8myNtuQoZS277IN8FoFIkFxqqAYU4e79ZPgyASU+mCvvpyMuP5J1NbrV4DIAoivpr5fQFoQbWgCgv6UjynMznLMhx8v1Fr8N+sXZxnabk3zrzMbfnwQLdwehCsEQSNZA6elRGXwXxORMq/UKKH7Fwkn2zENTzeEpsnllY9i9niecj4LuAYaJvJutbnI140dca5AuxgLwUno+2to4ldESTDyABC/3cye91yLCE=",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-OriginatorOrg": "caviumnetworks.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "04 Sep 2018 04:03:02.2724\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "fa460234-11fc-4143-7547-08d6121b5192",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "711e4ccf-2e9b-4bcf-a551-4094005b6194",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "BYAPR07MB4902",
        "Subject": "[dpdk-dev] [PATCH v2 18/33] common/cpt: add common code for fill\n\tsession data",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>\n\nAdding common code required for filling session data for AEAD, cipher &\nauth sessions.\n\nSigned-off-by: Ankur Dwivedi <ankur.dwivedi@caviumnetworks.com>\nSigned-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com>\nSigned-off-by: Murthy NSSR <nidadavolu.murthy@caviumnetworks.com>\nSigned-off-by: Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>\nSigned-off-by: Ragothaman Jayaraman <rjayaraman@caviumnetworks.com>\nSigned-off-by: Srisivasubramanian S <ssrinivasan@caviumnetworks.com>\nSigned-off-by: Tejasree Kondoj <kondoj.tejasree@caviumnetworks.com>\n---\n drivers/common/cpt/cpt_mcode_defines.h |  88 +++++\n drivers/common/cpt/cpt_ucode.h         | 574 +++++++++++++++++++++++++++++++++\n 2 files changed, 662 insertions(+)",
    "diff": "diff --git a/drivers/common/cpt/cpt_mcode_defines.h b/drivers/common/cpt/cpt_mcode_defines.h\nindex 5b1566e..0d2d0db 100644\n--- a/drivers/common/cpt/cpt_mcode_defines.h\n+++ b/drivers/common/cpt/cpt_mcode_defines.h\n@@ -25,9 +25,86 @@\n #define SG_LIST_HDR_SIZE\t(8u)\n #define SG_ENTRY_SIZE\t\tsizeof(sg_comp_t)\n \n+#define CPT_DMA_MODE\t\t(1 << 7)  /* Default support is with SG */\n+\n+#define CPT_FROM_CTX\t\t0\n+#define CPT_FROM_DPTR\t\t1\n+\n+#define FC_GEN\t\t\t0x1\n+#define ZUC_SNOW3G\t\t0x2\n+#define KASUMI\t\t\t0x3\n+#define HASH_HMAC\t\t0x4\n+\n+#define ZS_EA\t\t\t0x1\n+#define ZS_IA\t\t\t0x2\n+#define K_F8\t\t\t0x4\n+#define K_F9\t\t\t0x8\n+\n+#define CPT_OP_CIPHER_ENCRYPT\t0x1\n+#define CPT_OP_CIPHER_DECRYPT\t0x2\n+#define CPT_OP_CIPHER_MASK\t0x3\n+\n+#define CPT_OP_AUTH_VERIFY\t0x4\n+#define CPT_OP_AUTH_GENERATE\t0x8\n+#define CPT_OP_AUTH_MASK\t0xC\n+\n+#define CPT_OP_ENCODE\t(CPT_OP_CIPHER_ENCRYPT | CPT_OP_AUTH_GENERATE)\n+#define CPT_OP_DECODE\t(CPT_OP_CIPHER_DECRYPT | CPT_OP_AUTH_VERIFY)\n+\n /* #define CPT_ALWAYS_USE_SG_MODE */\n #define CPT_ALWAYS_USE_SEPARATE_BUF\n \n+typedef enum {\n+\tMD5_TYPE        = 1,\n+\tSHA1_TYPE       = 2,\n+\tSHA2_SHA224     = 3,\n+\tSHA2_SHA256     = 4,\n+\tSHA2_SHA384     = 5,\n+\tSHA2_SHA512     = 6,\n+\tGMAC_TYPE       = 7,\n+\tXCBC_TYPE       = 8,\n+\tSHA3_SHA224     = 10,\n+\tSHA3_SHA256     = 11,\n+\tSHA3_SHA384     = 12,\n+\tSHA3_SHA512     = 13,\n+\tSHA3_SHAKE256   = 14,\n+\tSHA3_SHAKE512   = 15,\n+\n+\t/* These are only for software use */\n+\tZUC_EIA3        = 0x90,\n+\tSNOW3G_UIA2     = 0x91,\n+\tKASUMI_F9_CBC   = 0x92,\n+\tKASUMI_F9_ECB   = 0x93,\n+} mc_hash_type_t;\n+\n+typedef enum {\n+\t/*\n+\t * These are defined by MC for Flexi crypto\n+\t * for field of 4 bits\n+\t */\n+\tDES3_CBC    = 0x1,\n+\tDES3_ECB    = 0x2,\n+\tAES_CBC     = 0x3,\n+\tAES_ECB     = 0x4,\n+\tAES_CFB     = 0x5,\n+\tAES_CTR     = 0x6,\n+\tAES_GCM     = 0x7,\n+\tAES_XTS     = 0x8,\n+\n+\t/* These are only for software use */\n+\tZUC_EEA3        = 0x90,\n+\tSNOW3G_UEA2     = 0x91,\n+\tKASUMI_F8_CBC   = 0x92,\n+\tKASUMI_F8_ECB   = 0x93,\n+} mc_cipher_type_t;\n+\n+typedef enum {\n+\tAES_128_BIT = 0x1,\n+\tAES_192_BIT = 0x2,\n+\tAES_256_BIT = 0x3\n+} mc_aes_type_t;\n+\n+\n typedef struct sglist_comp {\n \tunion {\n \t\tuint64_t len;\n@@ -143,6 +220,17 @@ struct cpt_ctx {\n \tuint8_t  auth_key[64];\n };\n \n+typedef struct fc_params digest_params_t;\n+\n+/* Cipher Algorithms */\n+typedef mc_cipher_type_t cipher_type_t;\n+\n+/* Auth Algorithms */\n+typedef mc_hash_type_t auth_type_t;\n+\n #define CPT_P_ENC_CTRL(fctx)  fctx->enc.enc_ctrl.e\n \n+#define SESS_PRIV(__sess) \\\n+\t(void *)((uint8_t *)__sess + sizeof(struct cpt_sess_misc))\n+\n #endif /* _CPT_MCODE_DEFINES_H_ */\ndiff --git a/drivers/common/cpt/cpt_ucode.h b/drivers/common/cpt/cpt_ucode.h\nindex e4f16fe..a9aef68 100644\n--- a/drivers/common/cpt/cpt_ucode.h\n+++ b/drivers/common/cpt/cpt_ucode.h\n@@ -12,6 +12,13 @@\n  *\n  */\n \n+static uint8_t zuc_d[32] = {\n+\t0x44, 0xD7, 0x26, 0xBC, 0x62, 0x6B, 0x13, 0x5E,\n+\t0x57, 0x89, 0x35, 0xE2, 0x71, 0x35, 0x09, 0xAF,\n+\t0x4D, 0x78, 0x2F, 0x13, 0x6B, 0xC4, 0x1A, 0xF1,\n+\t0x5E, 0x26, 0x3C, 0x4D, 0x78, 0x9A, 0x47, 0xAC\n+};\n+\n static __rte_always_inline int\n cpt_is_algo_supported(struct rte_crypto_sym_xform *xform)\n {\n@@ -44,4 +51,571 @@ cpt_is_algo_supported(struct rte_crypto_sym_xform *xform)\n \treturn 0;\n }\n \n+static __rte_always_inline void\n+gen_key_snow3g(uint8_t *ck, uint32_t *keyx)\n+{\n+\tint i, base;\n+\n+\tfor (i = 0; i < 4; i++) {\n+\t\tbase = 4 * i;\n+\t\tkeyx[3 - i] = (ck[base] << 24) | (ck[base + 1] << 16) |\n+\t\t\t(ck[base + 2] << 8) | (ck[base + 3]);\n+\t\tkeyx[3 - i] = rte_cpu_to_be_32(keyx[3 - i]);\n+\t}\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_ciph_set_key(void *ctx, cipher_type_t type, uint8_t *key,\n+\t\t    uint16_t key_len, uint8_t *salt)\n+{\n+\tstruct cpt_ctx *cpt_ctx = ctx;\n+\tmc_fc_context_t *fctx = &cpt_ctx->fctx;\n+\tmc_aes_type_t aes_key_type = 0;\n+\tuint64_t *ctrl_flags;\n+\n+\tif (!type) {\n+\t\t/* to support passthrough case */\n+\n+\t\tcpt_ctx->fc_type = FC_GEN;\n+\t\tctrl_flags = (uint64_t *)&(fctx->enc.enc_ctrl.flags);\n+\t\tcpt_ctx->enc_cipher = 0;\n+\n+\t\t*ctrl_flags = rte_be_to_cpu_64(*ctrl_flags);\n+\t\tCPT_P_ENC_CTRL(fctx).enc_cipher = 0;\n+\t\t*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);\n+\n+\t\treturn 0;\n+\t}\n+\n+\tif ((type >= ZUC_EEA3) && (type <= KASUMI_F8_ECB)) {\n+\t\tuint32_t keyx[4];\n+\n+\t\tif (key_len != 16)\n+\t\t\treturn -1;\n+\n+\t\t/* No support for AEAD yet */\n+\t\tif (cpt_ctx->hash_type)\n+\t\t\treturn -1;\n+\n+\t\t/* For ZUC/SNOW3G/Kasumi */\n+\t\tswitch (type) {\n+\t\tcase SNOW3G_UEA2:\n+\t\t\tcpt_ctx->snow3g = 1;\n+\t\t\tgen_key_snow3g(key, keyx);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0;\n+\t\t\tbreak;\n+\t\tcase ZUC_EEA3:\n+\t\t\tcpt_ctx->snow3g = 0;\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F8_ECB:\n+\t\t\t/* Kasumi ECB mode */\n+\t\t\tcpt_ctx->k_ecb = 1;\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->zsk_flags = 0;\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F8_CBC:\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->zsk_flags = 0;\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\treturn -1;\n+\t\t}\n+\t\tcpt_ctx->enc_cipher = type;\n+\t\treturn 0;\n+\t}\n+\n+\tfctx = &cpt_ctx->fctx;\n+\t/* Even though iv source is from dptr,\n+\t * aes_gcm salt is taken from ctx\n+\t */\n+\tif (salt && (type == AES_GCM)) {\n+\t\tmemcpy(fctx->enc.encr_iv, salt, 4);\n+\t\t/* Assuming it was just salt update\n+\t\t * and nothing else\n+\t\t */\n+\t\tif (!key)\n+\t\t\treturn 0;\n+\t}\n+\n+\tcpt_ctx->fc_type = FC_GEN;\n+\tctrl_flags = (uint64_t *)&(fctx->enc.enc_ctrl.flags);\n+\t*ctrl_flags = rte_be_to_cpu_64(*ctrl_flags);\n+\n+\tcpt_ctx->enc_cipher = type;\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (cpt_ctx->hash_type != GMAC_TYPE)\n+\t\tCPT_P_ENC_CTRL(fctx).enc_cipher = type;\n+\n+\tif (type == AES_XTS)\n+\t\tkey_len = key_len / 2;\n+\n+\t/* key len only for AES */\n+\tif ((type != DES3_CBC) &&\n+\t    (type != DES3_ECB)) {\n+\t\tswitch (key_len) {\n+\t\tcase CPT_BYTE_16:\n+\t\t\taes_key_type = AES_128_BIT;\n+\t\t\tbreak;\n+\t\tcase CPT_BYTE_24:\n+\t\t\taes_key_type = AES_192_BIT;\n+\t\t\tif (type == AES_XTS) {\n+\t\t\t\tCPT_LOG_DP_ERR(\"Invalid AES key len for\"\n+\t\t\t\t\t    \" XTS\\n\");\n+\t\t\t\treturn -1;\n+\t\t\t}\n+\t\t\tbreak;\n+\t\tcase CPT_BYTE_32:\n+\t\t\taes_key_type = AES_256_BIT;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\tCPT_LOG_DP_ERR(\"Invalid AES key len\\n\");\n+\t\t\treturn -1;\n+\t\t}\n+\n+\t\tCPT_P_ENC_CTRL(fctx).aes_key = aes_key_type;\n+\t}\n+\n+\t/*\n+\t * We need to always say iv is from DPTR as user can\n+\t * sometimes override IV per operation.\n+\t * For DES3_ECB IV need to be from CTX.\n+\t */\n+\tif (type == DES3_ECB)\n+\t\tCPT_P_ENC_CTRL(fctx).iv_source = CPT_FROM_CTX;\n+\telse\n+\t\tCPT_P_ENC_CTRL(fctx).iv_source = CPT_FROM_DPTR;\n+\n+\tmemcpy(fctx->enc.encr_key, key, key_len);\n+\n+\tif ((type == DES3_CBC) && (key_len == 8)) {\n+\t\t/* CPT performs DES using 3DES with the 8B DES-key\n+\t\t * replicated 2 more times to match the 24B 3DES-key.\n+\t\t * Eg. If org. key is \"0x0a 0x0b\", then new key is\n+\t\t * \"0x0a 0x0b 0x0a 0x0b 0x0a 0x0b\"\n+\t\t */\n+\t\tmemcpy(fctx->enc.encr_key+key_len, key, key_len);\n+\t\tmemcpy(fctx->enc.encr_key+2*key_len, key, key_len);\n+\t}\n+\n+\tif (type == AES_XTS) {\n+\t\t/* Copy key2 for XTS into ipad */\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemcpy(fctx->hmac.ipad, &key[key_len], key_len);\n+\t}\n+\n+\t*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_auth_set_key(void *ctx, auth_type_t type, uint8_t *key,\n+\t\t    uint16_t key_len, uint16_t mac_len)\n+{\n+\tstruct cpt_ctx *cpt_ctx = ctx;\n+\tmc_fc_context_t *fctx = &cpt_ctx->fctx;\n+\tuint64_t *ctrl_flags = NULL;\n+\n+\tif ((type >= ZUC_EIA3) && (type <= KASUMI_F9_ECB)) {\n+\t\tuint32_t keyx[4];\n+\n+\t\tif (key_len != 16)\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (cpt_ctx->enc_cipher)\n+\t\t\treturn -1;\n+\t\t/* For ZUC/SNOW3G/Kasumi */\n+\t\tswitch (type) {\n+\t\tcase SNOW3G_UIA2:\n+\t\t\tcpt_ctx->snow3g = 1;\n+\t\t\tgen_key_snow3g(key, keyx);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ZUC_EIA3:\n+\t\t\tcpt_ctx->snow3g = 0;\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F9_ECB:\n+\t\t\t/* Kasumi ECB mode */\n+\t\t\tcpt_ctx->k_ecb = 1;\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F9_CBC:\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\treturn -1;\n+\t\t}\n+\t\tcpt_ctx->mac_len = 4;\n+\t\tcpt_ctx->hash_type = type;\n+\t\treturn 0;\n+\t}\n+\n+\tif (!(cpt_ctx->fc_type == FC_GEN && !type)) {\n+\t\tif (!cpt_ctx->fc_type || !cpt_ctx->enc_cipher)\n+\t\t\tcpt_ctx->fc_type = HASH_HMAC;\n+\t}\n+\n+\tctrl_flags = (uint64_t *)&fctx->enc.enc_ctrl.flags;\n+\t*ctrl_flags = rte_be_to_cpu_64(*ctrl_flags);\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (type == GMAC_TYPE)\n+\t\tCPT_P_ENC_CTRL(fctx).enc_cipher = 0;\n+\n+\tCPT_P_ENC_CTRL(fctx).hash_type = cpt_ctx->hash_type = type;\n+\tCPT_P_ENC_CTRL(fctx).mac_len = cpt_ctx->mac_len = mac_len;\n+\n+\tif (key_len) {\n+\t\tcpt_ctx->hmac = 1;\n+\t\tmemset(cpt_ctx->auth_key, 0, sizeof(cpt_ctx->auth_key));\n+\t\tmemcpy(cpt_ctx->auth_key, key, key_len);\n+\t\tcpt_ctx->auth_key_len = key_len;\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemset(fctx->hmac.opad, 0, sizeof(fctx->hmac.opad));\n+\t\tmemcpy(fctx->hmac.opad, key, key_len);\n+\t\tCPT_P_ENC_CTRL(fctx).auth_input_type = 1;\n+\t}\n+\t*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_aead(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_aead_xform *aead_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\taead_form = &xform->aead;\n+\tvoid *ctx;\n+\n+\tif (aead_form->op == RTE_CRYPTO_AEAD_OP_ENCRYPT &&\n+\t   aead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_ENCRYPT;\n+\t\tsess->cpt_op |= CPT_OP_AUTH_GENERATE;\n+\t} else if (aead_form->op == RTE_CRYPTO_AEAD_OP_DECRYPT &&\n+\t\taead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_DECRYPT;\n+\t\tsess->cpt_op |= CPT_OP_AUTH_VERIFY;\n+\t} else {\n+\t\tCPT_LOG_DP_ERR(\"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\tswitch (aead_form->algo) {\n+\tcase RTE_CRYPTO_AEAD_AES_GCM:\n+\t\tenc_type = AES_GCM;\n+\t\tcipher_key_len = 16;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AEAD_AES_CCM:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported cipher algo %u\",\n+\t\t\t       aead_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       aead_form->algo);\n+\t\treturn -1;\n+\t}\n+\tif (aead_form->key.length < cipher_key_len) {\n+\t\tCPT_LOG_DP_ERR(\"Invalid cipher params keylen %lu\",\n+\t\t\t       (unsigned int long)aead_form->key.length);\n+\t\treturn -1;\n+\t}\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = aead_form->digest_length;\n+\tsess->iv_offset = aead_form->iv.offset;\n+\tsess->iv_length = aead_form->iv.length;\n+\tsess->aad_length = aead_form->aad_length;\n+\tctx = (void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\n+\tcpt_fc_ciph_set_key(ctx, enc_type, aead_form->key.data,\n+\t\t\taead_form->key.length, NULL);\n+\n+\tcpt_fc_auth_set_key(ctx, auth_type, NULL, 0, aead_form->digest_length);\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_cipher(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_cipher_xform *c_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, aes_ctr = 0, is_null = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_CIPHER)\n+\t\treturn -1;\n+\n+\tc_form = &xform->cipher;\n+\n+\tif (c_form->op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_ENCRYPT;\n+\telse if (c_form->op == RTE_CRYPTO_CIPHER_OP_DECRYPT)\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_DECRYPT;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (c_form->algo) {\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tenc_type = AES_CBC;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CBC:\n+\t\tenc_type = DES3_CBC;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_DES_CBC:\n+\t\t/* DES is implemented using 3DES in hardware */\n+\t\tenc_type = DES3_CBC;\n+\t\tcipher_key_len = 8;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tenc_type = AES_CTR;\n+\t\tcipher_key_len = 16;\n+\t\taes_ctr = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_NULL:\n+\t\tenc_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_KASUMI_F8:\n+\t\tenc_type = KASUMI_F8_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = K_F8;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_SNOW3G_UEA2:\n+\t\tenc_type = SNOW3G_UEA2;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_ZUC_EEA3:\n+\t\tenc_type = ZUC_EEA3;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tenc_type = AES_XTS;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_ECB:\n+\t\tenc_type = DES3_ECB;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tenc_type = AES_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CTR:\n+\tcase RTE_CRYPTO_CIPHER_AES_F8:\n+\tcase RTE_CRYPTO_CIPHER_ARC4:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported cipher algo %u\",\n+\t\t\t       c_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       c_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tif (c_form->key.length < cipher_key_len) {\n+\t\tCPT_LOG_DP_ERR(\"Invalid cipher params keylen %lu\",\n+\t\t\t       (unsigned long) c_form->key.length);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->aes_ctr = aes_ctr;\n+\tsess->iv_offset = c_form->iv.offset;\n+\tsess->iv_length = c_form->iv.length;\n+\tsess->is_null = is_null;\n+\n+\tcpt_fc_ciph_set_key(SESS_PRIV(sess), enc_type, c_form->key.data,\n+\t\t\t    c_form->key.length, NULL);\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_auth(struct rte_crypto_sym_xform *xform,\n+\t       struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, is_null = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\tgoto error_out;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CPT_OP_AUTH_VERIFY;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CPT_OP_AUTH_GENERATE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (a_form->key.length > 64) {\n+\t\tCPT_LOG_DP_ERR(\"Auth key length is big\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tauth_type = SHA1_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tauth_type = SHA2_SHA256;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tauth_type = SHA2_SHA512;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tauth_type = GMAC_TYPE;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tauth_type = SHA2_SHA224;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tauth_type = SHA2_SHA384;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tauth_type = MD5_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_KASUMI_F9:\n+\t\tauth_type = KASUMI_F9_ECB;\n+\t\t/*\n+\t\t * Indicate that direction needs to be taken out\n+\t\t * from end of src\n+\t\t */\n+\t\tzsk_flag = K_F9;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n+\t\tauth_type = SNOW3G_UIA2;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_ZUC_EIA3:\n+\t\tauth_type = ZUC_EIA3;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tauth_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CBC_MAC:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported hash algo %u\",\n+\t\t\t       a_form->algo);\n+\t\tgoto error_out;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined Hash algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\tgoto error_out;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = a_form->digest_length;\n+\tsess->is_null = is_null;\n+\tif (zsk_flag) {\n+\t\tsess->auth_iv_offset = a_form->iv.offset;\n+\t\tsess->auth_iv_length = a_form->iv.length;\n+\t}\n+\tcpt_fc_auth_set_key(SESS_PRIV(sess), auth_type, a_form->key.data,\n+\t\t\t    a_form->key.length, a_form->digest_length);\n+\n+\treturn 0;\n+\n+error_out:\n+\treturn -1;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_gmac(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\tvoid *ctx;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\treturn -1;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CPT_OP_ENCODE;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CPT_OP_DECODE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tenc_type = AES_GCM;\n+\t\tauth_type = GMAC_TYPE;\n+\t\tbreak;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->is_gmac = 1;\n+\tsess->iv_offset = a_form->iv.offset;\n+\tsess->iv_length = a_form->iv.length;\n+\tsess->mac_len = a_form->digest_length;\n+\tctx = (void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\n+\tcpt_fc_ciph_set_key(ctx, enc_type, a_form->key.data,\n+\t\t\ta_form->key.length, NULL);\n+\tcpt_fc_auth_set_key(ctx, auth_type, NULL, 0, a_form->digest_length);\n+\n+\treturn 0;\n+}\n+\n #endif /*_CPT_UCODE_H_ */\n",
    "prefixes": [
        "v2",
        "18/33"
    ]
}