get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/46332/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 46332,
    "url": "http://patches.dpdk.org/api/patches/46332/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1539076076-19786-12-git-send-email-anoob.joseph@caviumnetworks.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1539076076-19786-12-git-send-email-anoob.joseph@caviumnetworks.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1539076076-19786-12-git-send-email-anoob.joseph@caviumnetworks.com",
    "date": "2018-10-09T09:07:44",
    "name": "[v4,11/23] crypto/octeontx: add supported sessions",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "503ff57fba6ec38f186afd01e9c1d9ff5b522c47",
    "submitter": {
        "id": 893,
        "url": "http://patches.dpdk.org/api/people/893/?format=api",
        "name": "Anoob Joseph",
        "email": "anoob.joseph@caviumnetworks.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1539076076-19786-12-git-send-email-anoob.joseph@caviumnetworks.com/mbox/",
    "series": [
        {
            "id": 1770,
            "url": "http://patches.dpdk.org/api/series/1770/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=1770",
            "date": "2018-10-09T09:07:33",
            "name": "Adding Cavium's OCTEON TX crypto PMD",
            "version": 4,
            "mbox": "http://patches.dpdk.org/series/1770/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/46332/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/46332/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 1782D1B1C4;\n\tTue,  9 Oct 2018 11:09:27 +0200 (CEST)",
            "from NAM03-DM3-obe.outbound.protection.outlook.com\n\t(mail-dm3nam03on0081.outbound.protection.outlook.com [104.47.41.81])\n\tby dpdk.org (Postfix) with ESMTP id 0E2B01B141\n\tfor <dev@dpdk.org>; Tue,  9 Oct 2018 11:09:26 +0200 (CEST)",
            "from ajoseph83.caveonetworks.com.com (115.113.156.2) by\n\tBN7PR07MB4897.namprd07.prod.outlook.com (2603:10b6:406:ef::26) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n\t15.20.1207.28; Tue, 9 Oct 2018 09:09:20 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=UYpsnGJdQeRf3tiu0ntsfYh9g30L4qsOnEf8qjDfkG8=;\n\tb=MQ61226Sk0sqKzRDWFBZpG7m0s7srGllMqF+1ifRLFt6XLXxBrVP1KeY/EkJ7PojQnYa07mZplBuCe64F0Zfs6qYj7EmOFkwe0Sa/vLMEYUSV1amPBn0sdL9poGPq64cfb7lbtR9AYpyucmbP8/ghgZWDAFtx0MMSYYM1LyqH/k=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Anoob.Joseph@cavium.com; ",
        "From": "Anoob Joseph <anoob.joseph@caviumnetworks.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>,\n\tPablo de Lara <pablo.de.lara.guarch@intel.com>,\n\tThomas Monjalon <thomas@monjalon.net>",
        "Cc": "Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>,\n\tJerin Jacob <jerin.jacob@caviumnetworks.com>,\n\tNarayana Prasad <narayanaprasad.athreya@caviumnetworks.com>,\n\tAnkur Dwivedi <ankur.dwivedi@caviumnetworks.com>,\n\tAnoob Joseph <anoob.joseph@caviumnetworks.com>,\n\tMurthy NSSR <nidadavolu.murthy@caviumnetworks.com>,\n\tRagothaman Jayaraman <rjayaraman@caviumnetworks.com>,\n\tSrisivasubramanian S <ssrinivasan@caviumnetworks.com>,\n\tTejasree Kondoj <kondoj.tejasree@caviumnetworks.com>, dev@dpdk.org",
        "Date": "Tue,  9 Oct 2018 14:37:44 +0530",
        "Message-Id": "<1539076076-19786-12-git-send-email-anoob.joseph@caviumnetworks.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1539076076-19786-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "References": "<1538744363-30340-1-git-send-email-anoob.joseph@caviumnetworks.com>\n\t<1539076076-19786-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[115.113.156.2]",
        "X-ClientProxiedBy": "PN1PR0101CA0004.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:c00:e::14) To BN7PR07MB4897.namprd07.prod.outlook.com\n\t(2603:10b6:406:ef::26)",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "8be3d219-ecbc-45bc-6842-08d62dc6e80e",
        "X-Microsoft-Antispam": "BCL:0; PCL:0;\n\tRULEID:(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060)(7193020);\n\tSRVR:BN7PR07MB4897; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BN7PR07MB4897;\n\t3:Bl762Bx6WtVhKkYMRYnOUH/QKtpakHj5y4NupRydlGnXNFLOAHQI7PEJU8wC0duJu2nbBk9B3zvlRq2z/wzztia9fpGA3mnVa0eJkTDL5HdHTQOafjqYLrZ7faStuyeG6hncVsCOWsbQaGJlJQ0npnXIbkTqJVCgAqS2IKb7WYQUKTAn0JUAxtxVs6WlFY0WzP9hkA8WbJQSp6zHo56HzXUefLZLAxtmIlaf34o8cZ9zozi02ZoL8Y1ZtVRzB7fF;\n\t25:9fma3BkcWmu2zz0GeecwEQA0ItxDjZpqGtL2f3dgklMO2Lp5ySkLnUXAG4IrLzU/hgRNSsV+31cNQz6Tw/0pvSaoJr+Z3B6mEDaeUDYvZpLe1oy1umPk4kfQLLOygdSM12CGbYKO9Vt6f0T0f1YT1SUTYUzQ4SbvHM7cLyDfLSzFWBkJOYirAtJrVxjaJltOroCnqhuA9INDPegtdVgI0bPhM3mtaDrAij0eBF/lxsCLLi3Gw6drXOxEr4PeVZz+AeYM4F1C+ktgAcuVO0x9pbStE4oxoj75S1mjhWWswWXKr76yAIsGIxc2ytH0iiwCjpzEP8jRHh9anibqGvXExA==;\n\t31:ZpEyFVL2X2v/pRqliODnA6Jia9BV4Bcx7S8tHj7fwCrilUjhRDBQAdS/HBho+2VandbXF129+0tukVrld3RLCfpOUzQVoWbeWBSX9oOTZubO9fZ/jlIh/9EINGtsBdFKSnXbWyh+VWrPZOgHgeQVcXirKh5Co0G+CYAMozLxMRj3Ggg01A4fNhlrTng1xp6rFQNVDOWeMhHykNDtLtpeavPtjDeiDj7Apzm+YuqZFfU=",
            "1; BN7PR07MB4897;\n\t20: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;\n\t4:GHQkWO+CY5/7i02jA8qTE+/Ch3dZki1jn4en+eYqodm1un8lPmx5iSAlkiCoSyDGnMr7QzQcR9dZcplKnKezxT1aiPESGrnlg8hoJRNbofWElsqiXjzg9i8vzmmxy9MFsZFpUOfcAXhJLiRp128qxlr5fswCYoI0D3WrdXLH7OYmceiKesPvd3q8srnVS1wYCoel4X0l2uSoCU0LO0PnugZ7WdY9LFZ67AYgI4ALsNXo/h0wJ7WGKhxIUWwPyVGEFkB/JfFylaP9BKboKyU/4lhBUojPOIIs4ShTvGLBdHvl3tOjNvS8ugFvS5SYrzyD",
            "=?us-ascii?Q?1; BN7PR07MB4897;\n\t23:5dUUjeasUYd8ZePfpiwL59pD+4U47kvjJx7SJNSYU?=\n\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",
            "1; BN7PR07MB4897;\n\t6:FkLdQiVWAaRsfsMRpc1BDizDkiIKsAAt0ZSoFzwfDWIfigyl0NRZEBnGIXvcy7y20eDGzJGM5tv1ZY0tWiyRYbLVllFembQ1PmYqQXgANCeRR1+LSDMFTgWi0vYsMRlCsqpLl9w1EiVE8280lH6ihk08nWzHr/e95on4Jmp7Od8YdPR5yLXnb4lIRLWr2H2kMcVekZqiW47sJIYk6jZErLJN+45Qb24ST+AAtOdzkijZ06ZbvRMDbVxyHY+J9F0fOJO+mACo01k1RlthEX40vb/IT7JThJSr3tvJWcXuCCkACSVsU9d8jpP58y3biaI1EmgzUOkq/nfvo7NfowdZaCddRm4J3zgOl1ZZBsxI5V2hSm/EthItRW/SdbnBZAaqfn7TfckdBZgqo5eHgqpsXXEt42R0SNSeOWMKPXQb3sslZddqEeJrMEYu4RUVTmKkx/2K+Pv7LPckvgF+ZDJpAw==;\n\t5:6xhNb0/eS6tqpBpRgQQmEGcRhppn70zdL4bDeRXAm2vVTO06BGstWixxXkqfkO+VcUsH5UTNe1XnmyCRZmDPLXoTtSJrqyNTnbcpRAKTJvjQ2UsiYA4h4TR+Z8tKsFREFhJCbdZZ27aYZozQQCBnVpFLs1TcEgl77AFnBV3bfJg=;\n\t7:lnbHo0dNtpPK0bopEHfP4jxvTFMkqaPt7dJZZw8LqUj1+A01ToGoccO33kKIju9y5ooER6Qq9HAamBG9tLCiA4KeikwVttywAwJXUln+geZtNMTbBaKWVvvhW4/1tx47lb4IYGV27vowvPinW96wLqyz9CVhhTC/tkj8efdst0qIfq2FeffP/XqV13Elv5jQ1KeEGQbSIdUR7KFBmC1+fz0xprK7qubcVmyXGf1WRZTFs6GTdfO53rvvyjSbTRLZ"
        ],
        "X-MS-TrafficTypeDiagnostic": "BN7PR07MB4897:",
        "X-Microsoft-Antispam-PRVS": "<BN7PR07MB4897F184574CA41AB47604EEF8E70@BN7PR07MB4897.namprd07.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:(163750095850);",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(93006095)(10201501046)(3231355)(944501410)(52105095)(149066)(150057)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123558120)(201708071742011)(7699051);\n\tSRVR:BN7PR07MB4897; BCL:0; PCL:0; RULEID:; SRVR:BN7PR07MB4897; ",
        "X-Forefront-PRVS": "08200063E9",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(396003)(366004)(376002)(136003)(346002)(39860400002)(199004)(189003)(42882007)(47776003)(106356001)(6666003)(186003)(5660300001)(26005)(68736007)(16526019)(8936002)(25786009)(6116002)(2906002)(81156014)(50226002)(305945005)(81166006)(7736002)(3846002)(105586002)(478600001)(8676002)(54906003)(110136005)(48376002)(16586007)(14444005)(575784001)(6486002)(6506007)(50466002)(316002)(53936002)(386003)(51416003)(52116002)(76176011)(11346002)(6512007)(44832011)(446003)(36756003)(55236004)(956004)(2616005)(4744004)(486006)(4326008)(66066001)(97736004)(72206003)(476003);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:BN7PR07MB4897;\n\tH:ajoseph83.caveonetworks.com.com; FPR:; SPF:None; LANG:en;\n\tPTR:InfoNoRecords; A:1; MX:1; ",
        "Received-SPF": "None (protection.outlook.com: cavium.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "lT5PBt3tyYP1d4KVm4WyzKVtjfXwi8SvWKTQeyfUweCcMQah0auh8IyBUImIzwuqbD8E26xd8EJMG8M0rDMSX2/d6RXiKkZY9e0pghPGU9E7MuueUaR3v3AlIrqAEpjFMR2cmnKwIGVSbfSb4A3ayh0b/X0I93awVcJF41hmNZ6PGc/cp4Ijt+4NW1zHIhiiffy2B7EhdxxhBBelCoaTa4DxuXE/YCshJhC0GmSxNk0iyuXLyinpET5Os+SMMhByytY4IbjBARnYTo96rip4XNFIvvCx04EwEbh2JXx8/WXmRmJUpHIYIJXssIHMnYgEnwDogoKdqy3vUqBhB7ndKY4Lr859T1AEqs+HrdbA68Y=",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-OriginatorOrg": "caviumnetworks.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "09 Oct 2018 09:09:20.5743\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "8be3d219-ecbc-45bc-6842-08d62dc6e80e",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "711e4ccf-2e9b-4bcf-a551-4094005b6194",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "BN7PR07MB4897",
        "Subject": "[dpdk-dev] [PATCH v4 11/23] crypto/octeontx: add supported sessions",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>\n\nAdding AEAD, cipher & auth sessions support.\n\nSigned-off-by: Ankur Dwivedi <ankur.dwivedi@caviumnetworks.com>\nSigned-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com>\nSigned-off-by: Murthy NSSR <nidadavolu.murthy@caviumnetworks.com>\nSigned-off-by: Nithin Dabilpuram <nithin.dabilpuram@caviumnetworks.com>\nSigned-off-by: Ragothaman Jayaraman <rjayaraman@caviumnetworks.com>\nSigned-off-by: Srisivasubramanian S <ssrinivasan@caviumnetworks.com>\nSigned-off-by: Tejasree Kondoj <kondoj.tejasree@caviumnetworks.com>\n---\n drivers/common/cpt/cpt_mcode_defines.h      |  90 ++++\n drivers/common/cpt/cpt_ucode.h              | 669 ++++++++++++++++++++++++++++\n drivers/crypto/octeontx/otx_cryptodev_ops.c |  17 +\n 3 files changed, 776 insertions(+)",
    "diff": "diff --git a/drivers/common/cpt/cpt_mcode_defines.h b/drivers/common/cpt/cpt_mcode_defines.h\nindex 235320c..50657a2 100644\n--- a/drivers/common/cpt/cpt_mcode_defines.h\n+++ b/drivers/common/cpt/cpt_mcode_defines.h\n@@ -25,9 +25,88 @@\n #define SG_LIST_HDR_SIZE\t(8u)\n #define SG_ENTRY_SIZE\t\tsizeof(sg_comp_t)\n \n+#define CPT_DMA_MODE\t\t(1 << 7)\n+\n+#define CPT_FROM_CTX\t\t0\n+#define CPT_FROM_DPTR\t\t1\n+\n+#define FC_GEN\t\t\t0x1\n+#define ZUC_SNOW3G\t\t0x2\n+#define KASUMI\t\t\t0x3\n+#define HASH_HMAC\t\t0x4\n+\n+#define ZS_EA\t\t\t0x1\n+#define ZS_IA\t\t\t0x2\n+#define K_F8\t\t\t0x4\n+#define K_F9\t\t\t0x8\n+\n+#define CPT_OP_CIPHER_ENCRYPT\t0x1\n+#define CPT_OP_CIPHER_DECRYPT\t0x2\n+#define CPT_OP_CIPHER_MASK\t0x3\n+\n+#define CPT_OP_AUTH_VERIFY\t0x4\n+#define CPT_OP_AUTH_GENERATE\t0x8\n+#define CPT_OP_AUTH_MASK\t0xC\n+\n+#define CPT_OP_ENCODE\t(CPT_OP_CIPHER_ENCRYPT | CPT_OP_AUTH_GENERATE)\n+#define CPT_OP_DECODE\t(CPT_OP_CIPHER_DECRYPT | CPT_OP_AUTH_VERIFY)\n+\n /* #define CPT_ALWAYS_USE_SG_MODE */\n #define CPT_ALWAYS_USE_SEPARATE_BUF\n \n+typedef enum {\n+\tMD5_TYPE        = 1,\n+\tSHA1_TYPE       = 2,\n+\tSHA2_SHA224     = 3,\n+\tSHA2_SHA256     = 4,\n+\tSHA2_SHA384     = 5,\n+\tSHA2_SHA512     = 6,\n+\tGMAC_TYPE       = 7,\n+\tXCBC_TYPE       = 8,\n+\tSHA3_SHA224     = 10,\n+\tSHA3_SHA256     = 11,\n+\tSHA3_SHA384     = 12,\n+\tSHA3_SHA512     = 13,\n+\tSHA3_SHAKE256   = 14,\n+\tSHA3_SHAKE512   = 15,\n+\n+\t/* These are only for software use */\n+\tZUC_EIA3        = 0x90,\n+\tSNOW3G_UIA2     = 0x91,\n+\tKASUMI_F9_CBC   = 0x92,\n+\tKASUMI_F9_ECB   = 0x93,\n+} mc_hash_type_t;\n+\n+typedef enum {\n+\t/* To support passthrough */\n+\tPASSTHROUGH  = 0x0,\n+\t/*\n+\t * These are defined by MC for Flexi crypto\n+\t * for field of 4 bits\n+\t */\n+\tDES3_CBC    = 0x1,\n+\tDES3_ECB    = 0x2,\n+\tAES_CBC     = 0x3,\n+\tAES_ECB     = 0x4,\n+\tAES_CFB     = 0x5,\n+\tAES_CTR     = 0x6,\n+\tAES_GCM     = 0x7,\n+\tAES_XTS     = 0x8,\n+\n+\t/* These are only for software use */\n+\tZUC_EEA3        = 0x90,\n+\tSNOW3G_UEA2     = 0x91,\n+\tKASUMI_F8_CBC   = 0x92,\n+\tKASUMI_F8_ECB   = 0x93,\n+} mc_cipher_type_t;\n+\n+typedef enum {\n+\tAES_128_BIT = 0x1,\n+\tAES_192_BIT = 0x2,\n+\tAES_256_BIT = 0x3\n+} mc_aes_type_t;\n+\n+\n typedef struct sglist_comp {\n \tunion {\n \t\tuint64_t len;\n@@ -152,6 +231,17 @@ struct cpt_ctx {\n \tuint8_t  auth_key[64];\n };\n \n+typedef struct fc_params digest_params_t;\n+\n+/* Cipher Algorithms */\n+typedef mc_cipher_type_t cipher_type_t;\n+\n+/* Auth Algorithms */\n+typedef mc_hash_type_t auth_type_t;\n+\n #define CPT_P_ENC_CTRL(fctx)  fctx->enc.enc_ctrl.e\n \n+#define SESS_PRIV(__sess) \\\n+\t(void *)((uint8_t *)__sess + sizeof(struct cpt_sess_misc))\n+\n #endif /* _CPT_MCODE_DEFINES_H_ */\ndiff --git a/drivers/common/cpt/cpt_ucode.h b/drivers/common/cpt/cpt_ucode.h\nindex e4f16fe..4bbb27a 100644\n--- a/drivers/common/cpt/cpt_ucode.h\n+++ b/drivers/common/cpt/cpt_ucode.h\n@@ -12,6 +12,13 @@\n  *\n  */\n \n+static uint8_t zuc_d[32] = {\n+\t0x44, 0xD7, 0x26, 0xBC, 0x62, 0x6B, 0x13, 0x5E,\n+\t0x57, 0x89, 0x35, 0xE2, 0x71, 0x35, 0x09, 0xAF,\n+\t0x4D, 0x78, 0x2F, 0x13, 0x6B, 0xC4, 0x1A, 0xF1,\n+\t0x5E, 0x26, 0x3C, 0x4D, 0x78, 0x9A, 0x47, 0xAC\n+};\n+\n static __rte_always_inline int\n cpt_is_algo_supported(struct rte_crypto_sym_xform *xform)\n {\n@@ -44,4 +51,666 @@ cpt_is_algo_supported(struct rte_crypto_sym_xform *xform)\n \treturn 0;\n }\n \n+static __rte_always_inline void\n+gen_key_snow3g(uint8_t *ck, uint32_t *keyx)\n+{\n+\tint i, base;\n+\n+\tfor (i = 0; i < 4; i++) {\n+\t\tbase = 4 * i;\n+\t\tkeyx[3 - i] = (ck[base] << 24) | (ck[base + 1] << 16) |\n+\t\t\t(ck[base + 2] << 8) | (ck[base + 3]);\n+\t\tkeyx[3 - i] = rte_cpu_to_be_32(keyx[3 - i]);\n+\t}\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_ciph_validate_key_aes(uint16_t key_len)\n+{\n+\tswitch (key_len) {\n+\tcase CPT_BYTE_16:\n+\tcase CPT_BYTE_24:\n+\tcase CPT_BYTE_32:\n+\t\treturn 0;\n+\tdefault:\n+\t\treturn -1;\n+\t}\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_ciph_validate_key(cipher_type_t type, struct cpt_ctx *cpt_ctx,\n+\t\tuint16_t key_len)\n+{\n+\tint fc_type = 0;\n+\tswitch (type) {\n+\tcase PASSTHROUGH:\n+\t\tfc_type = FC_GEN;\n+\t\tbreak;\n+\tcase DES3_CBC:\n+\tcase DES3_ECB:\n+\t\tfc_type = FC_GEN;\n+\t\tbreak;\n+\tcase AES_CBC:\n+\tcase AES_ECB:\n+\tcase AES_CFB:\n+\tcase AES_CTR:\n+\tcase AES_GCM:\n+\t\tif (unlikely(cpt_fc_ciph_validate_key_aes(key_len) != 0))\n+\t\t\treturn -1;\n+\t\tfc_type = FC_GEN;\n+\t\tbreak;\n+\tcase AES_XTS:\n+\t\tkey_len = key_len / 2;\n+\t\tif (unlikely(key_len == CPT_BYTE_24)) {\n+\t\t\tCPT_LOG_DP_ERR(\"Invalid AES key len for XTS\");\n+\t\t\treturn -1;\n+\t\t}\n+\t\tif (unlikely(cpt_fc_ciph_validate_key_aes(key_len) != 0))\n+\t\t\treturn -1;\n+\t\tfc_type = FC_GEN;\n+\t\tbreak;\n+\tcase ZUC_EEA3:\n+\tcase SNOW3G_UEA2:\n+\t\tif (unlikely(key_len != 16))\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (unlikely(cpt_ctx->hash_type))\n+\t\t\treturn -1;\n+\t\tfc_type = ZUC_SNOW3G;\n+\t\tbreak;\n+\tcase KASUMI_F8_CBC:\n+\tcase KASUMI_F8_ECB:\n+\t\tif (unlikely(key_len != 16))\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (unlikely(cpt_ctx->hash_type))\n+\t\t\treturn -1;\n+\t\tfc_type = KASUMI;\n+\t\tbreak;\n+\tdefault:\n+\t\treturn -1;\n+\t}\n+\treturn fc_type;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_passthrough(struct cpt_ctx *cpt_ctx, mc_fc_context_t *fctx)\n+{\n+\tcpt_ctx->enc_cipher = 0;\n+\tCPT_P_ENC_CTRL(fctx).enc_cipher = 0;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_set_aes_key_type(mc_fc_context_t *fctx, uint16_t key_len)\n+{\n+\tmc_aes_type_t aes_key_type = 0;\n+\tswitch (key_len) {\n+\tcase CPT_BYTE_16:\n+\t\taes_key_type = AES_128_BIT;\n+\t\tbreak;\n+\tcase CPT_BYTE_24:\n+\t\taes_key_type = AES_192_BIT;\n+\t\tbreak;\n+\tcase CPT_BYTE_32:\n+\t\taes_key_type = AES_256_BIT;\n+\t\tbreak;\n+\tdefault:\n+\t\t/* This should not happen */\n+\t\tCPT_LOG_DP_ERR(\"Invalid AES key len\");\n+\t\treturn;\n+\t}\n+\tCPT_P_ENC_CTRL(fctx).aes_key = aes_key_type;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_snow3g_uea2(struct cpt_ctx *cpt_ctx, uint8_t *key,\n+\t\tuint16_t key_len)\n+{\n+\tuint32_t keyx[4];\n+\tcpt_ctx->snow3g = 1;\n+\tgen_key_snow3g(key, keyx);\n+\tmemcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);\n+\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\tcpt_ctx->zsk_flags = 0;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_zuc_eea3(struct cpt_ctx *cpt_ctx, uint8_t *key,\n+\t\tuint16_t key_len)\n+{\n+\tcpt_ctx->snow3g = 0;\n+\tmemcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);\n+\tmemcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);\n+\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\tcpt_ctx->zsk_flags = 0;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_kasumi_f8_ecb(struct cpt_ctx *cpt_ctx, uint8_t *key,\n+\t\tuint16_t key_len)\n+{\n+\tcpt_ctx->k_ecb = 1;\n+\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\tcpt_ctx->zsk_flags = 0;\n+\tcpt_ctx->fc_type = KASUMI;\n+}\n+\n+static __rte_always_inline void\n+cpt_fc_ciph_set_key_kasumi_f8_cbc(struct cpt_ctx *cpt_ctx, uint8_t *key,\n+\t\tuint16_t key_len)\n+{\n+\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\tcpt_ctx->zsk_flags = 0;\n+\tcpt_ctx->fc_type = KASUMI;\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_ciph_set_key(void *ctx, cipher_type_t type, uint8_t *key,\n+\t\t    uint16_t key_len, uint8_t *salt)\n+{\n+\tstruct cpt_ctx *cpt_ctx = ctx;\n+\tmc_fc_context_t *fctx = &cpt_ctx->fctx;\n+\tuint64_t *ctrl_flags = NULL;\n+\tint fc_type;\n+\n+\t/* Validate key before proceeding */\n+\tfc_type = cpt_fc_ciph_validate_key(type, cpt_ctx, key_len);\n+\tif (unlikely(fc_type == -1))\n+\t\treturn -1;\n+\n+\tif (fc_type == FC_GEN) {\n+\t\tcpt_ctx->fc_type = FC_GEN;\n+\t\tctrl_flags = (uint64_t *)&(fctx->enc.enc_ctrl.flags);\n+\t\t*ctrl_flags = rte_be_to_cpu_64(*ctrl_flags);\n+\t\t/*\n+\t\t * We need to always say IV is from DPTR as user can\n+\t\t * sometimes iverride IV per operation.\n+\t\t */\n+\t\tCPT_P_ENC_CTRL(fctx).iv_source = CPT_FROM_DPTR;\n+\t}\n+\n+\tswitch (type) {\n+\tcase PASSTHROUGH:\n+\t\tcpt_fc_ciph_set_key_passthrough(cpt_ctx, fctx);\n+\t\tgoto fc_success;\n+\tcase DES3_CBC:\n+\t\t/* CPT performs DES using 3DES with the 8B DES-key\n+\t\t * replicated 2 more times to match the 24B 3DES-key.\n+\t\t * Eg. If org. key is \"0x0a 0x0b\", then new key is\n+\t\t * \"0x0a 0x0b 0x0a 0x0b 0x0a 0x0b\"\n+\t\t */\n+\t\tif (key_len == 8) {\n+\t\t\t/* Skipping the first 8B as it will be copied\n+\t\t\t * in the regular code flow\n+\t\t\t */\n+\t\t\tmemcpy(fctx->enc.encr_key+key_len, key, key_len);\n+\t\t\tmemcpy(fctx->enc.encr_key+2*key_len, key, key_len);\n+\t\t}\n+\t\tbreak;\n+\tcase DES3_ECB:\n+\t\t/* For DES3_ECB IV need to be from CTX. */\n+\t\tCPT_P_ENC_CTRL(fctx).iv_source = CPT_FROM_CTX;\n+\t\tbreak;\n+\tcase AES_CBC:\n+\tcase AES_ECB:\n+\tcase AES_CFB:\n+\tcase AES_CTR:\n+\t\tcpt_fc_ciph_set_key_set_aes_key_type(fctx, key_len);\n+\t\tbreak;\n+\tcase AES_GCM:\n+\t\t/* Even though iv source is from dptr,\n+\t\t * aes_gcm salt is taken from ctx\n+\t\t */\n+\t\tif (salt) {\n+\t\t\tmemcpy(fctx->enc.encr_iv, salt, 4);\n+\t\t\t/* Assuming it was just salt update\n+\t\t\t * and nothing else\n+\t\t\t */\n+\t\t\tif (!key)\n+\t\t\t\tgoto fc_success;\n+\t\t}\n+\t\tcpt_fc_ciph_set_key_set_aes_key_type(fctx, key_len);\n+\t\tbreak;\n+\tcase AES_XTS:\n+\t\tkey_len = key_len / 2;\n+\t\tcpt_fc_ciph_set_key_set_aes_key_type(fctx, key_len);\n+\n+\t\t/* Copy key2 for XTS into ipad */\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemcpy(fctx->hmac.ipad, &key[key_len], key_len);\n+\t\tbreak;\n+\tcase SNOW3G_UEA2:\n+\t\tcpt_fc_ciph_set_key_snow3g_uea2(cpt_ctx, key, key_len);\n+\t\tgoto success;\n+\tcase ZUC_EEA3:\n+\t\tcpt_fc_ciph_set_key_zuc_eea3(cpt_ctx, key, key_len);\n+\t\tgoto success;\n+\tcase KASUMI_F8_ECB:\n+\t\tcpt_fc_ciph_set_key_kasumi_f8_ecb(cpt_ctx, key, key_len);\n+\t\tgoto success;\n+\tcase KASUMI_F8_CBC:\n+\t\tcpt_fc_ciph_set_key_kasumi_f8_cbc(cpt_ctx, key, key_len);\n+\t\tgoto success;\n+\tdefault:\n+\t\tbreak;\n+\t}\n+\n+\t/* Only for FC_GEN case */\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (cpt_ctx->hash_type != GMAC_TYPE)\n+\t\tCPT_P_ENC_CTRL(fctx).enc_cipher = type;\n+\n+\tmemcpy(fctx->enc.encr_key, key, key_len);\n+\n+fc_success:\n+\t*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);\n+\n+success:\n+\tcpt_ctx->enc_cipher = type;\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+cpt_fc_auth_set_key(void *ctx, auth_type_t type, uint8_t *key,\n+\t\t    uint16_t key_len, uint16_t mac_len)\n+{\n+\tstruct cpt_ctx *cpt_ctx = ctx;\n+\tmc_fc_context_t *fctx = &cpt_ctx->fctx;\n+\tuint64_t *ctrl_flags = NULL;\n+\n+\tif ((type >= ZUC_EIA3) && (type <= KASUMI_F9_ECB)) {\n+\t\tuint32_t keyx[4];\n+\n+\t\tif (key_len != 16)\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (cpt_ctx->enc_cipher)\n+\t\t\treturn -1;\n+\t\t/* For ZUC/SNOW3G/Kasumi */\n+\t\tswitch (type) {\n+\t\tcase SNOW3G_UIA2:\n+\t\t\tcpt_ctx->snow3g = 1;\n+\t\t\tgen_key_snow3g(key, keyx);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, keyx, key_len);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ZUC_EIA3:\n+\t\t\tcpt_ctx->snow3g = 0;\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.ci_key, key, key_len);\n+\t\t\tmemcpy(cpt_ctx->zs_ctx.zuc_const, zuc_d, 32);\n+\t\t\tcpt_ctx->fc_type = ZUC_SNOW3G;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F9_ECB:\n+\t\t\t/* Kasumi ECB mode */\n+\t\t\tcpt_ctx->k_ecb = 1;\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase KASUMI_F9_CBC:\n+\t\t\tmemcpy(cpt_ctx->k_ctx.ci_key, key, key_len);\n+\t\t\tcpt_ctx->fc_type = KASUMI;\n+\t\t\tcpt_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\treturn -1;\n+\t\t}\n+\t\tcpt_ctx->mac_len = 4;\n+\t\tcpt_ctx->hash_type = type;\n+\t\treturn 0;\n+\t}\n+\n+\tif (!(cpt_ctx->fc_type == FC_GEN && !type)) {\n+\t\tif (!cpt_ctx->fc_type || !cpt_ctx->enc_cipher)\n+\t\t\tcpt_ctx->fc_type = HASH_HMAC;\n+\t}\n+\n+\tctrl_flags = (uint64_t *)&fctx->enc.enc_ctrl.flags;\n+\t*ctrl_flags = rte_be_to_cpu_64(*ctrl_flags);\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (type == GMAC_TYPE)\n+\t\tCPT_P_ENC_CTRL(fctx).enc_cipher = 0;\n+\n+\tCPT_P_ENC_CTRL(fctx).hash_type = cpt_ctx->hash_type = type;\n+\tCPT_P_ENC_CTRL(fctx).mac_len = cpt_ctx->mac_len = mac_len;\n+\n+\tif (key_len) {\n+\t\tcpt_ctx->hmac = 1;\n+\t\tmemset(cpt_ctx->auth_key, 0, sizeof(cpt_ctx->auth_key));\n+\t\tmemcpy(cpt_ctx->auth_key, key, key_len);\n+\t\tcpt_ctx->auth_key_len = key_len;\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemset(fctx->hmac.opad, 0, sizeof(fctx->hmac.opad));\n+\t\tmemcpy(fctx->hmac.opad, key, key_len);\n+\t\tCPT_P_ENC_CTRL(fctx).auth_input_type = 1;\n+\t}\n+\t*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_aead(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_aead_xform *aead_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\taead_form = &xform->aead;\n+\tvoid *ctx;\n+\n+\tif (aead_form->op == RTE_CRYPTO_AEAD_OP_ENCRYPT &&\n+\t   aead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_ENCRYPT;\n+\t\tsess->cpt_op |= CPT_OP_AUTH_GENERATE;\n+\t} else if (aead_form->op == RTE_CRYPTO_AEAD_OP_DECRYPT &&\n+\t\taead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_DECRYPT;\n+\t\tsess->cpt_op |= CPT_OP_AUTH_VERIFY;\n+\t} else {\n+\t\tCPT_LOG_DP_ERR(\"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\tswitch (aead_form->algo) {\n+\tcase RTE_CRYPTO_AEAD_AES_GCM:\n+\t\tenc_type = AES_GCM;\n+\t\tcipher_key_len = 16;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AEAD_AES_CCM:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported cipher algo %u\",\n+\t\t\t       aead_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       aead_form->algo);\n+\t\treturn -1;\n+\t}\n+\tif (aead_form->key.length < cipher_key_len) {\n+\t\tCPT_LOG_DP_ERR(\"Invalid cipher params keylen %lu\",\n+\t\t\t       (unsigned int long)aead_form->key.length);\n+\t\treturn -1;\n+\t}\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = aead_form->digest_length;\n+\tsess->iv_offset = aead_form->iv.offset;\n+\tsess->iv_length = aead_form->iv.length;\n+\tsess->aad_length = aead_form->aad_length;\n+\tctx = (void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\n+\tcpt_fc_ciph_set_key(ctx, enc_type, aead_form->key.data,\n+\t\t\taead_form->key.length, NULL);\n+\n+\tcpt_fc_auth_set_key(ctx, auth_type, NULL, 0, aead_form->digest_length);\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_cipher(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_cipher_xform *c_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, aes_ctr = 0, is_null = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_CIPHER)\n+\t\treturn -1;\n+\n+\tc_form = &xform->cipher;\n+\n+\tif (c_form->op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_ENCRYPT;\n+\telse if (c_form->op == RTE_CRYPTO_CIPHER_OP_DECRYPT)\n+\t\tsess->cpt_op |= CPT_OP_CIPHER_DECRYPT;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (c_form->algo) {\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tenc_type = AES_CBC;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CBC:\n+\t\tenc_type = DES3_CBC;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_DES_CBC:\n+\t\t/* DES is implemented using 3DES in hardware */\n+\t\tenc_type = DES3_CBC;\n+\t\tcipher_key_len = 8;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tenc_type = AES_CTR;\n+\t\tcipher_key_len = 16;\n+\t\taes_ctr = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_NULL:\n+\t\tenc_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_KASUMI_F8:\n+\t\tenc_type = KASUMI_F8_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = K_F8;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_SNOW3G_UEA2:\n+\t\tenc_type = SNOW3G_UEA2;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_ZUC_EEA3:\n+\t\tenc_type = ZUC_EEA3;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tenc_type = AES_XTS;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_ECB:\n+\t\tenc_type = DES3_ECB;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tenc_type = AES_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CTR:\n+\tcase RTE_CRYPTO_CIPHER_AES_F8:\n+\tcase RTE_CRYPTO_CIPHER_ARC4:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported cipher algo %u\",\n+\t\t\t       c_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       c_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tif (c_form->key.length < cipher_key_len) {\n+\t\tCPT_LOG_DP_ERR(\"Invalid cipher params keylen %lu\",\n+\t\t\t       (unsigned long) c_form->key.length);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->aes_ctr = aes_ctr;\n+\tsess->iv_offset = c_form->iv.offset;\n+\tsess->iv_length = c_form->iv.length;\n+\tsess->is_null = is_null;\n+\n+\tcpt_fc_ciph_set_key(SESS_PRIV(sess), enc_type, c_form->key.data,\n+\t\t\t    c_form->key.length, NULL);\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_auth(struct rte_crypto_sym_xform *xform,\n+\t       struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, is_null = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\tgoto error_out;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CPT_OP_AUTH_VERIFY;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CPT_OP_AUTH_GENERATE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (a_form->key.length > 64) {\n+\t\tCPT_LOG_DP_ERR(\"Auth key length is big\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tauth_type = SHA1_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tauth_type = SHA2_SHA256;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tauth_type = SHA2_SHA512;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tauth_type = GMAC_TYPE;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tauth_type = SHA2_SHA224;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tauth_type = SHA2_SHA384;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tauth_type = MD5_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_KASUMI_F9:\n+\t\tauth_type = KASUMI_F9_ECB;\n+\t\t/*\n+\t\t * Indicate that direction needs to be taken out\n+\t\t * from end of src\n+\t\t */\n+\t\tzsk_flag = K_F9;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n+\t\tauth_type = SNOW3G_UIA2;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_ZUC_EIA3:\n+\t\tauth_type = ZUC_EIA3;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tauth_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CBC_MAC:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported hash algo %u\",\n+\t\t\t       a_form->algo);\n+\t\tgoto error_out;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined Hash algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\tgoto error_out;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = a_form->digest_length;\n+\tsess->is_null = is_null;\n+\tif (zsk_flag) {\n+\t\tsess->auth_iv_offset = a_form->iv.offset;\n+\t\tsess->auth_iv_length = a_form->iv.length;\n+\t}\n+\tcpt_fc_auth_set_key(SESS_PRIV(sess), auth_type, a_form->key.data,\n+\t\t\t    a_form->key.length, a_form->digest_length);\n+\n+\treturn 0;\n+\n+error_out:\n+\treturn -1;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_gmac(struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\tvoid *ctx;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\treturn -1;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CPT_OP_ENCODE;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CPT_OP_DECODE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tenc_type = AES_GCM;\n+\t\tauth_type = GMAC_TYPE;\n+\t\tbreak;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->is_gmac = 1;\n+\tsess->iv_offset = a_form->iv.offset;\n+\tsess->iv_length = a_form->iv.length;\n+\tsess->mac_len = a_form->digest_length;\n+\tctx = (void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\n+\tcpt_fc_ciph_set_key(ctx, enc_type, a_form->key.data,\n+\t\t\ta_form->key.length, NULL);\n+\tcpt_fc_auth_set_key(ctx, auth_type, NULL, 0, a_form->digest_length);\n+\n+\treturn 0;\n+}\n+\n #endif /*_CPT_UCODE_H_ */\ndiff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.c b/drivers/crypto/octeontx/otx_cryptodev_ops.c\nindex 653f372..16fad49 100644\n--- a/drivers/crypto/octeontx/otx_cryptodev_ops.c\n+++ b/drivers/crypto/octeontx/otx_cryptodev_ops.c\n@@ -293,6 +293,23 @@ otx_cpt_session_cfg(struct rte_cryptodev *dev,\n \tchain = xform;\n \twhile (chain) {\n \t\tswitch (chain->type) {\n+\t\tcase RTE_CRYPTO_SYM_XFORM_AEAD:\n+\t\t\tif (fill_sess_aead(chain, sess_private_data))\n+\t\t\t\tgoto err;\n+\t\t\tbreak;\n+\t\tcase RTE_CRYPTO_SYM_XFORM_CIPHER:\n+\t\t\tif (fill_sess_cipher(chain, sess_private_data))\n+\t\t\t\tgoto err;\n+\t\t\tbreak;\n+\t\tcase RTE_CRYPTO_SYM_XFORM_AUTH:\n+\t\t\tif (chain->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC) {\n+\t\t\t\tif (fill_sess_gmac(chain, sess_private_data))\n+\t\t\t\t\tgoto err;\n+\t\t\t} else {\n+\t\t\t\tif (fill_sess_auth(chain, sess_private_data))\n+\t\t\t\t\tgoto err;\n+\t\t\t}\n+\t\t\tbreak;\n \t\tdefault:\n \t\t\tCPT_LOG_ERR(\"Invalid crypto xform type\");\n \t\t\tbreak;\n",
    "prefixes": [
        "v4",
        "11/23"
    ]
}