get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/64702/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 64702,
    "url": "http://patches.dpdk.org/api/patches/64702/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1579092994-15978-3-git-send-email-anoobj@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1579092994-15978-3-git-send-email-anoobj@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1579092994-15978-3-git-send-email-anoobj@marvell.com",
    "date": "2020-01-15T12:56:32",
    "name": "[v2,2/4] crypto/octeontx: add ECPM support",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "215f341c5afc766a5477467df5323569a4c26ee7",
    "submitter": {
        "id": 1205,
        "url": "http://patches.dpdk.org/api/people/1205/?format=api",
        "name": "Anoob Joseph",
        "email": "anoobj@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1579092994-15978-3-git-send-email-anoobj@marvell.com/mbox/",
    "series": [
        {
            "id": 8136,
            "url": "http://patches.dpdk.org/api/series/8136/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=8136",
            "date": "2020-01-15T12:56:30",
            "name": "add ECPM support",
            "version": 2,
            "mbox": "http://patches.dpdk.org/series/8136/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/64702/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/64702/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 02F55A0514;\n\tWed, 15 Jan 2020 13:57:15 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 4C5B31C113;\n\tWed, 15 Jan 2020 13:57:09 +0100 (CET)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174]) by dpdk.org (Postfix) with ESMTP id 76C1D1C113\n for <dev@dpdk.org>; Wed, 15 Jan 2020 13:57:08 +0100 (CET)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id\n 00FCt1pG001867; Wed, 15 Jan 2020 04:57:07 -0800",
            "from sc-exch04.marvell.com ([199.233.58.184])\n by mx0a-0016f401.pphosted.com with ESMTP id 2xhc6sn0pf-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Wed, 15 Jan 2020 04:57:07 -0800",
            "from SC-EXCH01.marvell.com (10.93.176.81) by SC-EXCH04.marvell.com\n (10.93.176.84) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 15 Jan\n 2020 04:57:05 -0800",
            "from maili.marvell.com (10.93.176.43) by SC-EXCH01.marvell.com\n (10.93.176.81) with Microsoft SMTP Server id 15.0.1497.2 via Frontend\n Transport; Wed, 15 Jan 2020 04:57:05 -0800",
            "from ajoseph83.caveonetworks.com (unknown [10.29.45.60])\n by maili.marvell.com (Postfix) with ESMTP id ED49A3F7043;\n Wed, 15 Jan 2020 04:57:01 -0800 (PST)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0818;\n bh=F849+40fC0xG4SNg9g888Cr2W3j0RChWQG+aBv3t0jo=;\n b=X5kDnCQ/j97Mas/vEHFF2FnAhPalwuiNfRAQHmYdmf/EUeSrvZpPsrOHDqzWB7fpSVmm\n DXVKLq755d0sNUG4uvdlGOgysLkMkZ6XzKitGAA0gYRfRD45KC+1ab4M0Bzf4uyvN/AE\n 6N7zK9JPNOMmVsQfERPgdxwpX149f4JyBjJvMrAefKs5/IpocxNH4sybyKBkOzuKgu17\n C+pQ194+u0JpdUqM6dWCiGxtw5zBMmWgf3iwnO5qRIEDc636dgX0IfCLoCxkOCipVOlF\n rLnBW7qe6MgcDaLvVpaaVHc/bzBndxddYDIsQarHxrsS3HlyBSkCB3HtdSDPCZhDzhPF sg==",
        "From": "Anoob Joseph <anoobj@marvell.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>, Declan Doherty\n <declan.doherty@intel.com>, Pablo de Lara <pablo.de.lara.guarch@intel.com>",
        "CC": "Sunila Sahu <ssahu@marvell.com>, Fiona Trahe <fiona.trahe@intel.com>,\n \"Arek Kusztal\" <arkadiuszx.kusztal@intel.com>, Jerin Jacob\n <jerinj@marvell.com>, Narayana Prasad <pathreya@marvell.com>, Shally Verma\n <shallyv@marvell.com>,\n Ankur Dwivedi <adwivedi@marvell.com>, <dev@dpdk.org>,\n Anoob Joseph <anoobj@marvell.com>, Balakrishna Bhamidipati\n <bbhamidipati@marvell.com>",
        "Date": "Wed, 15 Jan 2020 18:26:32 +0530",
        "Message-ID": "<1579092994-15978-3-git-send-email-anoobj@marvell.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1579092994-15978-1-git-send-email-anoobj@marvell.com>",
        "References": "<1575560280-3261-1-git-send-email-anoobj@marvell.com>\n <1579092994-15978-1-git-send-email-anoobj@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-Virus-Version": "vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572\n definitions=2020-01-15_02:2020-01-15,\n 2020-01-14 signatures=0",
        "Subject": "[dpdk-dev] [PATCH v2 2/4] crypto/octeontx: add ECPM support",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Sunila Sahu <ssahu@marvell.com>\n\nAdd support for asymmetric opertion EC Point Multiplication,\nin crypto_octeontx PMD.\n\nSigned-off-by: Anoob Joseph <anoobj@marvell.com>\nSigned-off-by: Balakrishna Bhamidipati <bbhamidipati@marvell.com>\nSigned-off-by: Sunila Sahu <ssahu@marvell.com>\n---\n doc/guides/cryptodevs/features/octeontx.ini        |  1 +\n drivers/common/cpt/cpt_mcode_defines.h             |  2 +\n drivers/common/cpt/cpt_ucode_asym.h                | 85 ++++++++++++++++++++++\n .../crypto/octeontx/otx_cryptodev_capabilities.c   | 10 +++\n drivers/crypto/octeontx/otx_cryptodev_ops.c        | 23 ++++++\n 5 files changed, 121 insertions(+)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/octeontx.ini b/doc/guides/cryptodevs/features/octeontx.ini\nindex 544bb46..f0ed3ed 100644\n--- a/doc/guides/cryptodevs/features/octeontx.ini\n+++ b/doc/guides/cryptodevs/features/octeontx.ini\n@@ -73,3 +73,4 @@ Modular Exponentiation  = Y\n Modular Inversion       =\n Diffie-hellman          =\n ECDSA                   = Y\n+ECPM                    = Y\ndiff --git a/drivers/common/cpt/cpt_mcode_defines.h b/drivers/common/cpt/cpt_mcode_defines.h\nindex 64d3e8c..d830bef 100644\n--- a/drivers/common/cpt/cpt_mcode_defines.h\n+++ b/drivers/common/cpt/cpt_mcode_defines.h\n@@ -24,6 +24,7 @@\n /* AE opcodes */\n #define CPT_MAJOR_OP_MODEX\t0x03\n #define CPT_MAJOR_OP_ECDSA\t0x04\n+#define CPT_MAJOR_OP_ECC\t0x05\n #define CPT_MINOR_OP_MODEX\t0x01\n #define CPT_MINOR_OP_PKCS_ENC\t0x02\n #define CPT_MINOR_OP_PKCS_ENC_CRT\t0x03\n@@ -32,6 +33,7 @@\n #define CPT_MINOR_OP_MODEX_CRT\t0x06\n #define CPT_MINOR_OP_ECDSA_SIGN\t0x01\n #define CPT_MINOR_OP_ECDSA_VERIFY\t0x02\n+#define CPT_MINOR_OP_ECC_UMP\t0x03\n \n #define CPT_BLOCK_TYPE1 0\n #define CPT_BLOCK_TYPE2 1\ndiff --git a/drivers/common/cpt/cpt_ucode_asym.h b/drivers/common/cpt/cpt_ucode_asym.h\nindex 0caa313..881959e 100644\n--- a/drivers/common/cpt/cpt_ucode_asym.h\n+++ b/drivers/common/cpt/cpt_ucode_asym.h\n@@ -172,6 +172,8 @@ cpt_fill_asym_session_parameters(struct cpt_asym_sess_misc *sess,\n \t\tret = cpt_fill_modex_params(sess, xform);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_XFORM_ECDSA:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_ASYM_XFORM_ECPM:\n \t\tret = cpt_fill_ec_params(sess, xform);\n \t\tbreak;\n \tdefault:\n@@ -199,6 +201,8 @@ cpt_free_asym_session_parameters(struct cpt_asym_sess_misc *sess)\n \t\t\trte_free(mod->modulus.data);\n \t\tbreak;\n \tcase RTE_CRYPTO_ASYM_XFORM_ECDSA:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_ASYM_XFORM_ECPM:\n \t\tbreak;\n \tdefault:\n \t\tCPT_LOG_DP_ERR(\"Invalid transform type\");\n@@ -828,4 +832,85 @@ cpt_enqueue_ecdsa_op(struct rte_crypto_op *op,\n \treturn 0;\n }\n \n+static __rte_always_inline int\n+cpt_ecpm_prep(struct rte_crypto_ecpm_op_param *ecpm,\n+\t      struct asym_op_params *asym_params,\n+\t      uint8_t curveid)\n+{\n+\tstruct cpt_request_info *req = asym_params->req;\n+\tphys_addr_t mphys = asym_params->meta_buf;\n+\tuint16_t x1_len = ecpm->p.x.length;\n+\tuint16_t y1_len = ecpm->p.y.length;\n+\tuint16_t scalar_align, p_align;\n+\tuint16_t dlen, rlen, prime_len;\n+\tuint16_t x1_offset, y1_offset;\n+\tvq_cmd_word0_t vq_cmd_w0;\n+\topcode_info_t opcode;\n+\tbuf_ptr_t caddr;\n+\tuint8_t *dptr;\n+\n+\tprime_len = ec_grp[curveid].prime.length;\n+\n+\t/* Input buffer */\n+\tdptr = RTE_PTR_ADD(req, sizeof(struct cpt_request_info));\n+\n+\tp_align = ROUNDUP8(prime_len);\n+\tscalar_align = ROUNDUP8(ecpm->scalar.length);\n+\n+\t/*\n+\t * Set dlen = sum(ROUNDUP8(input point(x and y coordinates), prime,\n+\t * scalar length),\n+\t * Please note point length is equivalent to prime of the curve\n+\t */\n+\tdlen = 3 * p_align + scalar_align;\n+\n+\tx1_offset = prime_len - x1_len;\n+\ty1_offset = prime_len - y1_len;\n+\n+\tmemset(dptr, 0, dlen);\n+\n+\t/* Copy input point, scalar, prime */\n+\tmemcpy(dptr + x1_offset, ecpm->p.x.data, x1_len);\n+\tdptr += p_align;\n+\tmemcpy(dptr + y1_offset, ecpm->p.y.data, y1_len);\n+\tdptr += p_align;\n+\tmemcpy(dptr, ecpm->scalar.data, ecpm->scalar.length);\n+\tdptr += scalar_align;\n+\tmemcpy(dptr, ec_grp[curveid].prime.data, ec_grp[curveid].prime.length);\n+\tdptr += p_align;\n+\n+\t/* Setup opcodes */\n+\topcode.s.major = CPT_MAJOR_OP_ECC;\n+\topcode.s.minor = CPT_MINOR_OP_ECC_UMP;\n+\n+\t/* GP op header */\n+\tvq_cmd_w0.s.opcode = opcode.flags;\n+\tvq_cmd_w0.s.param1 = curveid;\n+\tvq_cmd_w0.s.param2 = ecpm->scalar.length;\n+\tvq_cmd_w0.s.dlen = dlen;\n+\tvq_cmd_w0.u64 = vq_cmd_w0.u64;\n+\n+\t/* Filling cpt_request_info structure */\n+\treq->ist.ei0 = vq_cmd_w0.u64;\n+\treq->ist.ei1 = mphys;\n+\treq->ist.ei2 = mphys + dlen;\n+\n+\t/* Result buffer will store output point where length of\n+\t * each coordinate will be of prime length, thus set\n+\t * rlen to twice of prime length.\n+\t */\n+\trlen = p_align << 1;\n+\treq->rptr = dptr;\n+\n+\t/* alternate_caddr to write completion status by the microcode */\n+\treq->alternate_caddr = (uint64_t *)(dptr + rlen);\n+\t*req->alternate_caddr = ~((uint64_t)COMPLETION_CODE_INIT);\n+\n+\t/* Preparing completion addr, +1 for completion code */\n+\tcaddr.vaddr = dptr + rlen + 1;\n+\tcaddr.dma_addr = mphys + dlen + rlen + 1;\n+\n+\tcpt_fill_req_comp_addr(req, caddr);\n+\treturn 0;\n+}\n #endif /* _CPT_UCODE_ASYM_H_ */\ndiff --git a/drivers/crypto/octeontx/otx_cryptodev_capabilities.c b/drivers/crypto/octeontx/otx_cryptodev_capabilities.c\nindex 6418ad2..1174ee4 100644\n--- a/drivers/crypto/octeontx/otx_cryptodev_capabilities.c\n+++ b/drivers/crypto/octeontx/otx_cryptodev_capabilities.c\n@@ -641,6 +641,16 @@ static const struct rte_cryptodev_capabilities otx_asym_capabilities[] = {\n \t\t\t},\n \t\t}\n \t},\n+\t{\t/* ECPM */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_ASYMMETRIC,\n+\t\t{.asym = {\n+\t\t\t.xform_capa = {\n+\t\t\t\t.xform_type = RTE_CRYPTO_ASYM_XFORM_ECPM,\n+\t\t\t\t.op_types = 0\n+\t\t\t\t}\n+\t\t\t},\n+\t\t}\n+\t},\n \t/* End of asymmetric capabilities */\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\ndiff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.c b/drivers/crypto/octeontx/otx_cryptodev_ops.c\nindex f97ce3a..d7f3d08 100644\n--- a/drivers/crypto/octeontx/otx_cryptodev_ops.c\n+++ b/drivers/crypto/octeontx/otx_cryptodev_ops.c\n@@ -443,6 +443,13 @@ otx_cpt_enq_single_asym(struct cpt_instance *instance,\n \t\tif (unlikely(ret))\n \t\t\tgoto req_fail;\n \t\tbreak;\n+\tcase RTE_CRYPTO_ASYM_XFORM_ECPM:\n+\t\tret = cpt_ecpm_prep(&asym_op->ecpm, &params,\n+\t\t\t\t    sess->ec_ctx.curveid);\n+\t\tif (unlikely(ret))\n+\t\t\tgoto req_fail;\n+\t\tbreak;\n+\n \tdefault:\n \t\top->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS;\n \t\tret = -EINVAL;\n@@ -704,6 +711,19 @@ otx_cpt_asym_dequeue_ecdsa_op(struct rte_crypto_ecdsa_op_param *ecdsa,\n \tecdsa->s.length = prime_len;\n }\n \n+static __rte_always_inline void\n+otx_cpt_asym_dequeue_ecpm_op(struct rte_crypto_ecpm_op_param *ecpm,\n+\t\t\t     struct cpt_request_info *req,\n+\t\t\t     struct cpt_asym_ec_ctx *ec)\n+{\n+\tint prime_len = ec_grp[ec->curveid].prime.length;\n+\n+\tmemcpy(ecpm->r.x.data, req->rptr, prime_len);\n+\tmemcpy(ecpm->r.y.data, req->rptr + ROUNDUP8(prime_len), prime_len);\n+\tecpm->r.x.length = prime_len;\n+\tecpm->r.y.length = prime_len;\n+}\n+\n static __rte_always_inline void __hot\n otx_cpt_asym_post_process(struct rte_crypto_op *cop,\n \t\t\t  struct cpt_request_info *req)\n@@ -726,6 +746,9 @@ otx_cpt_asym_post_process(struct rte_crypto_op *cop,\n \tcase RTE_CRYPTO_ASYM_XFORM_ECDSA:\n \t\totx_cpt_asym_dequeue_ecdsa_op(&op->ecdsa, req, &sess->ec_ctx);\n \t\tbreak;\n+\tcase RTE_CRYPTO_ASYM_XFORM_ECPM:\n+\t\totx_cpt_asym_dequeue_ecpm_op(&op->ecpm, req, &sess->ec_ctx);\n+\t\tbreak;\n \tdefault:\n \t\tCPT_LOG_DP_DEBUG(\"Invalid crypto xform type\");\n \t\tcop->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS;\n",
    "prefixes": [
        "v2",
        "2/4"
    ]
}