get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/47150/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 47150,
    "url": "http://patches.dpdk.org/api/patches/47150/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20181022133021.11264-10-g.singh@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20181022133021.11264-10-g.singh@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20181022133021.11264-10-g.singh@nxp.com",
    "date": "2018-10-22T13:31:20",
    "name": "[v3,09/15] crypto/caam_jr: add device cababilities",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "355967cc608e07033a5edb0baf2c9de6cc25b616",
    "submitter": {
        "id": 1068,
        "url": "http://patches.dpdk.org/api/people/1068/?format=api",
        "name": "Gagandeep Singh",
        "email": "g.singh@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20181022133021.11264-10-g.singh@nxp.com/mbox/",
    "series": [
        {
            "id": 2011,
            "url": "http://patches.dpdk.org/api/series/2011/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=2011",
            "date": "2018-10-22T13:31:00",
            "name": "Introducing the NXP CAAM job ring driver",
            "version": 3,
            "mbox": "http://patches.dpdk.org/series/2011/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/47150/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/47150/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id D92AB5F28;\n\tMon, 22 Oct 2018 15:31:30 +0200 (CEST)",
            "from EUR02-HE1-obe.outbound.protection.outlook.com\n\t(mail-eopbgr10052.outbound.protection.outlook.com [40.107.1.52])\n\tby dpdk.org (Postfix) with ESMTP id CD4BC5B34\n\tfor <dev@dpdk.org>; Mon, 22 Oct 2018 15:31:21 +0200 (CEST)",
            "from HE1PR04MB1530.eurprd04.prod.outlook.com (10.164.48.20) by\n\tHE1PR04MB3131.eurprd04.prod.outlook.com (10.171.196.142) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n\t15.20.1250.30; Mon, 22 Oct 2018 13:31:20 +0000",
            "from HE1PR04MB1530.eurprd04.prod.outlook.com\n\t([fe80::95cd:198:d5c5:59a4]) by\n\tHE1PR04MB1530.eurprd04.prod.outlook.com\n\t([fe80::95cd:198:d5c5:59a4%5]) with mapi id 15.20.1250.028;\n\tMon, 22 Oct 2018 13:31:20 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=glrSWITCqE7HfLJcVkFIOnRQvDDW5XTHvnc0gP4fjZA=;\n\tb=b+u3Tu0hkM9LTjubsVQ+4YQeYT5+q69fQsEtNrcBaZqHm9OAe9GFPt3cI03QGhe6eqNKv0RYVSZ3AvKwgt9h7yTghlfpTeMkYbVr/JDF7e0yQjuPiQ90hyKzL69zdWV8D1bcOqB4IErJhRe0JzCfEZlA/wheBK0p5JeFakwzwHU=",
        "From": "Gagandeep Singh <G.Singh@nxp.com>",
        "To": "\"dev@dpdk.org\" <dev@dpdk.org>, Akhil Goyal <akhil.goyal@nxp.com>",
        "CC": "Gagandeep Singh <G.Singh@nxp.com>,\n\tHemant Agrawal <hemant.agrawal@nxp.com>",
        "Thread-Topic": "[PATCH v3 09/15] crypto/caam_jr: add device cababilities",
        "Thread-Index": "AQHUaguEPkIuNLi04EuhdFUxtZDL+Q==",
        "Date": "Mon, 22 Oct 2018 13:31:20 +0000",
        "Message-ID": "<20181022133021.11264-10-g.singh@nxp.com>",
        "References": "<20181012144055.9461-1-g.singh@nxp.com>\n\t<20181022133021.11264-1-g.singh@nxp.com>",
        "In-Reply-To": "<20181022133021.11264-1-g.singh@nxp.com>",
        "Accept-Language": "en-US",
        "Content-Language": "en-US",
        "X-MS-Has-Attach": "",
        "X-MS-TNEF-Correlator": "",
        "x-clientproxiedby": "BM1PR0101CA0016.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:b00:18::26) To HE1PR04MB1530.eurprd04.prod.outlook.com\n\t(2a01:111:e400:59a8::20)",
        "authentication-results": "spf=none (sender IP is )\n\tsmtp.mailfrom=G.Singh@nxp.com; ",
        "x-ms-exchange-messagesentrepresentingtype": "1",
        "x-originating-ip": "[14.142.187.166]",
        "x-ms-publictraffictype": "Email",
        "x-microsoft-exchange-diagnostics": "1; HE1PR04MB3131;\n\t6:JtQRJznWDSlG8GaStq6GCF9laVvI0nf9YCoBdPhZXfBlCKJ48pxTLXo8LESvG9X5XNBQUq887kLIo9oA4yEH+327+jpXibc/ZSDcy9W4lG6xafI+1EhG2EQekhGsuPm+jfFfNW1NnX3n+P13SxpDW6iq8KzMlBRHseB+zksYwRpWeN0yiBGo6aNGAD+HyRqXest2j0Q5G3DpZthsTLja2z5PRmgqZtHJRLinGgGUlSBpUvbGjjXcH3BWLf5EreSElLpH6tV6Kr72ozSVU+dUypeNl+K58NIYt8CrkWPChQXj/D56iK97Ffc2zmZfZC6bG2OtQGUA1GD9BqFzqoHvrdxYE0eToNX9ww2cb0IYrJdXvoDSkbwQDP+VVAyaqX31RhSyWEGRyv5GAhWLQgn62r0WUwH/77X5wuzHFjwAIj++mfk6/oc3Y7IIoqhCQlDxaX0ETvt+VntexOyfQoGPUA==;\n\t5:1MeYQ89g8k+D1LfKsO1DJF1FHUfSF/iELcOap5P2yk6SOUpVhNFyiiCfuxXad+uuIkmSmdxOBhMQvFmnN8E+mmBzUFR/jsZ7Dymh0mafIfciav179qEsDSaicDkWURTgKab+BMzAt5raFhP74AsO0/zXzUZcUjaRBG8FExXk+uw=;\n\t7:68nKB2QNDZjSo1Bwt3ogoxRcalZ/lfHDgji0ZQeRHj8z+Ue08ApkrBH9XH0am4fkpkNcd5r0kJOpkOqiwce1eqg+6Pz8y7sy+da2AtuOpaHWk6f7WtSDuzFYI30XWc5qS0oSzaobZtY+4KnG8V1gTLe4T3wnEwr6eniL+AOc8MvvUzh1SlWc7tKMk9N7cutvvBBWz+R7TySBXUtwifh9tFHThiT1S69FmuPpDPqT+OFCnhmT1sEFuzedLdbtsYG2",
        "x-ms-office365-filtering-correlation-id": "a3de7510-f483-4711-5192-08d63822a6bb",
        "x-ms-office365-filtering-ht": "Tenant",
        "x-microsoft-antispam": "BCL:0; PCL:0;\n\tRULEID:(7020095)(4652040)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020);\n\tSRVR:HE1PR04MB3131; ",
        "x-ms-traffictypediagnostic": "HE1PR04MB3131:",
        "x-microsoft-antispam-prvs": "<HE1PR04MB313171056A086268F21B6A8DE1F40@HE1PR04MB3131.eurprd04.prod.outlook.com>",
        "x-exchange-antispam-report-test": "UriScan:(192374486261705)(185117386973197); ",
        "x-ms-exchange-senderadcheck": "1",
        "x-exchange-antispam-report-cfa-test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231355)(944501410)(52105095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(201708071742011)(7699051)(76991095);\n\tSRVR:HE1PR04MB3131; BCL:0; PCL:0; RULEID:; SRVR:HE1PR04MB3131; ",
        "x-forefront-prvs": "08331F819E",
        "x-forefront-antispam-report": "SFV:NSPM;\n\tSFS:(10009020)(366004)(376002)(39860400002)(136003)(346002)(396003)(189003)(199004)(110136005)(99286004)(316002)(54906003)(81156014)(14454004)(25786009)(72206003)(81166006)(2900100001)(8936002)(106356001)(8676002)(6116002)(3846002)(86362001)(2616005)(476003)(6506007)(386003)(102836004)(1076002)(11346002)(446003)(26005)(186003)(305945005)(478600001)(4326008)(2906002)(76176011)(68736007)(7736002)(6636002)(97736004)(486006)(52116002)(36756003)(55236004)(105586002)(71190400001)(5660300001)(6436002)(6486002)(78486010)(53936002)(14444005)(2501003)(256004)(66066001)(71200400001)(5250100002)(6512007);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR04MB3131;\n\tH:HE1PR04MB1530.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en;\n\tPTR:InfoNoRecords; MX:1; A:1; ",
        "received-spf": "None (protection.outlook.com: nxp.com does not designate\n\tpermitted sender hosts)",
        "x-microsoft-antispam-message-info": "CcNX8Hvbuh7pO7lKe9tCs1PDT9TkRuO7Nx7yvZEBnORWs+brR7WOTYVVVC4p873ZDQ94ssUbW4cXfE0e6jQquIXlAnECufxeehaDKOZYvHRTDOq6hz16L86JxEIRFSsoCkOCq0eaXgRApJ0mElZjw+A7J00KCmBFMjX1cDMkPvcPC7di5/Esz14SdYh8wcf6j2aZaALErK02fL0+V2zFBZWpX40VmhRCxiHiJXlydEqmIJe713PU3MumiWs2XM/lflRRLVMZrGQr6GiiT9Cp4TCCCrygHn2be1vnNjT5BwlySHyNTZ7GUZhPpe/iaJheBYEJ/JWSkIP2rC+jhJt7zm1+OksWCD37cPAWxaLxdM4=",
        "spamdiagnosticoutput": "1:99",
        "spamdiagnosticmetadata": "NSPM",
        "Content-Type": "text/plain; charset=\"iso-8859-1\"",
        "Content-Transfer-Encoding": "quoted-printable",
        "MIME-Version": "1.0",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "a3de7510-f483-4711-5192-08d63822a6bb",
        "X-MS-Exchange-CrossTenant-originalarrivaltime": "22 Oct 2018 13:31:20.2886\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-fromentityheader": "Hosted",
        "X-MS-Exchange-CrossTenant-id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "HE1PR04MB3131",
        "Subject": "[dpdk-dev] [PATCH v3 09/15] crypto/caam_jr: add device cababilities",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "add device capabilities for supported algorithms,\nkey length etc.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\nAcked-by: Akhil Goyal <akhil.goyal@nxp.com>\n---\n drivers/crypto/caam_jr/Makefile               |   1 +\n drivers/crypto/caam_jr/caam_jr.c              |   2 +\n drivers/crypto/caam_jr/caam_jr_capabilities.c | 266 ++++++++++++++++++\n drivers/crypto/caam_jr/caam_jr_capabilities.h |  18 ++\n drivers/crypto/caam_jr/meson.build            |   5 +-\n 5 files changed, 291 insertions(+), 1 deletion(-)\n create mode 100644 drivers/crypto/caam_jr/caam_jr_capabilities.c\n create mode 100644 drivers/crypto/caam_jr/caam_jr_capabilities.h",
    "diff": "diff --git a/drivers/crypto/caam_jr/Makefile b/drivers/crypto/caam_jr/Makefile\nindex cfd093a5f..88cdf7410 100644\n--- a/drivers/crypto/caam_jr/Makefile\n+++ b/drivers/crypto/caam_jr/Makefile\n@@ -31,6 +31,7 @@ LIBABIVER := 1\n \n # library source files\n SRCS-$(CONFIG_RTE_LIBRTE_PMD_CAAM_JR) += caam_jr.c\n+SRCS-$(CONFIG_RTE_LIBRTE_PMD_CAAM_JR) += caam_jr_capabilities.c\n SRCS-$(CONFIG_RTE_LIBRTE_PMD_CAAM_JR) += caam_jr_hw.c\n SRCS-$(CONFIG_RTE_LIBRTE_PMD_CAAM_JR) += caam_jr_uio.c\n # library dependencies\ndiff --git a/drivers/crypto/caam_jr/caam_jr.c b/drivers/crypto/caam_jr/caam_jr.c\nindex eedbeb731..311da1686 100644\n--- a/drivers/crypto/caam_jr/caam_jr.c\n+++ b/drivers/crypto/caam_jr/caam_jr.c\n@@ -17,6 +17,7 @@\n #include <rte_security_driver.h>\n #include <rte_hexdump.h>\n \n+#include <caam_jr_capabilities.h>\n #include <caam_jr_config.h>\n #include <caam_jr_hw_specific.h>\n #include <caam_jr_pvt.h>\n@@ -439,6 +440,7 @@ caam_jr_dev_infos_get(struct rte_cryptodev *dev,\n \tif (info != NULL) {\n \t\tinfo->max_nb_queue_pairs = internals->max_nb_queue_pairs;\n \t\tinfo->feature_flags = dev->feature_flags;\n+\t\tinfo->capabilities = caam_jr_get_cryptodev_capabilities();\n \t\tinfo->sym.max_nb_sessions = internals->max_nb_sessions;\n \t\tinfo->driver_id = cryptodev_driver_id;\n \t}\ndiff --git a/drivers/crypto/caam_jr/caam_jr_capabilities.c b/drivers/crypto/caam_jr/caam_jr_capabilities.c\nnew file mode 100644\nindex 000000000..c51593c4b\n--- /dev/null\n+++ b/drivers/crypto/caam_jr/caam_jr_capabilities.c\n@@ -0,0 +1,266 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright 2017-2018 NXP\n+ */\n+\n+#include <caam_jr_capabilities.h>\n+\n+static const struct rte_cryptodev_capabilities caam_jr_capabilities[] = {\n+\t{\t/* MD5 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_MD5_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA1 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA224 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA256 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA384 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384_HMAC,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 128,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA512 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512_HMAC,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 128,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES GCM */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AEAD,\n+\t\t\t{.aead = {\n+\t\t\t\t.algo = RTE_CRYPTO_AEAD_AES_GCM,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 4\n+\t\t\t\t},\n+\t\t\t\t.aad_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 240,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 12,\n+\t\t\t\t\t.max = 12,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CBC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* AES CTR */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CTR,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* 3DES CBC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t\t{.cipher = {\n+\t\t\t\t.algo = RTE_CRYPTO_CIPHER_3DES_CBC,\n+\t\t\t\t.block_size = 8,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 24,\n+\t\t\t\t\t.increment = 8\n+\t\t\t\t},\n+\t\t\t\t.iv_size = {\n+\t\t\t\t\t.min = 8,\n+\t\t\t\t\t.max = 8,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t}\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\n+\tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n+};\n+\n+static const struct rte_security_capability caam_jr_security_cap[] = {\n+\t{ /* IPsec Lookaside Protocol offload ESP Transport Egress */\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,\n+\t\t\t.options = { 0 }\n+\t\t},\n+\t\t.crypto_capabilities = caam_jr_capabilities\n+\t},\n+\t{ /* IPsec Lookaside Protocol offload ESP Tunnel Ingress */\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t\t.options = { 0 }\n+\t\t},\n+\t\t.crypto_capabilities = caam_jr_capabilities\n+\t},\n+\t{\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE\n+\t}\n+};\n+\n+const struct rte_cryptodev_capabilities *\n+caam_jr_get_cryptodev_capabilities(void)\n+{\n+\treturn caam_jr_capabilities;\n+}\n+\n+const struct rte_security_capability *\n+caam_jr_get_security_capabilities(void *device __rte_unused)\n+{\n+\treturn caam_jr_security_cap;\n+}\ndiff --git a/drivers/crypto/caam_jr/caam_jr_capabilities.h b/drivers/crypto/caam_jr/caam_jr_capabilities.h\nnew file mode 100644\nindex 000000000..c1e3f305a\n--- /dev/null\n+++ b/drivers/crypto/caam_jr/caam_jr_capabilities.h\n@@ -0,0 +1,18 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright 2017-2018 NXP\n+ */\n+\n+#ifndef CAAM_JR_CAPABILITIES_H\n+#define CAAM_JR_CAPABILITIES_H\n+\n+#include <rte_cryptodev.h>\n+#include <rte_security.h>\n+\n+/* Get cryptodev capabilities */\n+const struct rte_cryptodev_capabilities *\n+caam_jr_get_cryptodev_capabilities(void);\n+/* Get security capabilities */\n+const struct rte_security_capability *\n+caam_jr_get_security_capabilities(void *device);\n+\n+#endif\ndiff --git a/drivers/crypto/caam_jr/meson.build b/drivers/crypto/caam_jr/meson.build\nindex 7b024e886..99b71aef1 100644\n--- a/drivers/crypto/caam_jr/meson.build\n+++ b/drivers/crypto/caam_jr/meson.build\n@@ -6,7 +6,10 @@ if host_machine.system() != 'linux'\n endif\n \n deps += ['bus_vdev', 'bus_dpaa', 'security']\n-sources = files('caam_jr_hw.c', 'caam_jr_uio.c', 'caam_jr.c')\n+sources = files('caam_jr_capabilities.c',\n+\t\t'caam_jr_hw.c',\n+\t\t'caam_jr_uio.c',\n+\t\t'caam_jr.c')\n \n allow_experimental_apis = true\n \n",
    "prefixes": [
        "v3",
        "09/15"
    ]
}