get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/93818/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 93818,
    "url": "http://patches.dpdk.org/api/patches/93818/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1622652221-22732-11-git-send-email-anoobj@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1622652221-22732-11-git-send-email-anoobj@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1622652221-22732-11-git-send-email-anoobj@marvell.com",
    "date": "2021-06-02T16:43:31",
    "name": "[10/20] crypto/cnxk: add auth operation in session",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "4747cdcd815feea740329f27779a4400a570847f",
    "submitter": {
        "id": 1205,
        "url": "http://patches.dpdk.org/api/people/1205/?format=api",
        "name": "Anoob Joseph",
        "email": "anoobj@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1622652221-22732-11-git-send-email-anoobj@marvell.com/mbox/",
    "series": [
        {
            "id": 17213,
            "url": "http://patches.dpdk.org/api/series/17213/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=17213",
            "date": "2021-06-02T16:43:21",
            "name": "Add Marvell CNXK crypto PMDs",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/17213/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/93818/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/93818/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 94113A0524;\n\tWed,  2 Jun 2021 18:45:38 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 22334410E0;\n\tWed,  2 Jun 2021 18:45:07 +0200 (CEST)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174])\n by mails.dpdk.org (Postfix) with ESMTP id 4376E410D7\n for <dev@dpdk.org>; Wed,  2 Jun 2021 18:45:05 +0200 (CEST)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id\n 152Gaseb016164; Wed, 2 Jun 2021 09:45:04 -0700",
            "from dc5-exch01.marvell.com ([199.233.59.181])\n by mx0a-0016f401.pphosted.com with ESMTP id 38wug73v60-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Wed, 02 Jun 2021 09:45:04 -0700",
            "from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server (TLS) id 15.0.1497.2;\n Wed, 2 Jun 2021 09:45:02 -0700",
            "from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.2 via Frontend\n Transport; Wed, 2 Jun 2021 09:45:02 -0700",
            "from HY-LT1002.marvell.com (unknown [10.193.70.1])\n by maili.marvell.com (Postfix) with ESMTP id 733A63F7041;\n Wed,  2 Jun 2021 09:44:56 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=O07zY0OmQv55hEo2VOciZT+EaHdvlzu2gueRux9JHPA=;\n b=Xi4clyPJNb0vOXZ+uBjuYExL16deZ+OpJc3WmXfCOhhAC4yx3a0Il2nHD/dayVxNg5lw\n tHaK+K14OWVcZgt2j9YEvf6vB52jol+Ba8/oQFaPunJInmgteuokDOipbjb7kkpiHcFl\n 2iiNDJbS2pT52T+jwIakg2Ag5VI3ZvuHCB6GwKU5/h//k+VGNdUaF16IiyHjfKYSUa0k\n CbDM82BUfEa5oIpFCae5hh9ArgOJG2G2h5uGx/7+O2ul1+d+9M/tBvT6IMSCCjcHD3Hg\n 4dCCSj8690mnRSWLWrEkS+tbit7Mi8sXC3tR1lwqDeUHP3CByFk66gcxEs62hDnFhqu6 bA==",
        "From": "Anoob Joseph <anoobj@marvell.com>",
        "To": "Akhil Goyal <gakhil@marvell.com>, Thomas Monjalon <thomas@monjalon.net>",
        "CC": "Anoob Joseph <anoobj@marvell.com>, Jerin Jacob <jerinj@marvell.com>,\n \"Ankur Dwivedi\" <adwivedi@marvell.com>, Tejasree Kondoj\n <ktejasree@marvell.com>, <dev@dpdk.org>, Archana Muniganti\n <marchana@marvell.com>",
        "Date": "Wed, 2 Jun 2021 22:13:31 +0530",
        "Message-ID": "<1622652221-22732-11-git-send-email-anoobj@marvell.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1622652221-22732-1-git-send-email-anoobj@marvell.com>",
        "References": "<1622652221-22732-1-git-send-email-anoobj@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-ORIG-GUID": "_wpyUvqyTOuF_tH9aMnMiD5Bntmxgf3N",
        "X-Proofpoint-GUID": "_wpyUvqyTOuF_tH9aMnMiD5Bntmxgf3N",
        "X-Proofpoint-Virus-Version": "vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761\n definitions=2021-06-02_09:2021-06-02,\n 2021-06-02 signatures=0",
        "Subject": "[dpdk-dev] [PATCH 10/20] crypto/cnxk: add auth operation in session",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Add support for auth operations in session.\n\nSigned-off-by: Ankur Dwivedi <adwivedi@marvell.com>\nSigned-off-by: Anoob Joseph <anoobj@marvell.com>\nSigned-off-by: Archana Muniganti <marchana@marvell.com>\nSigned-off-by: Tejasree Kondoj <ktejasree@marvell.com>\n---\n drivers/crypto/cnxk/cnxk_cryptodev_ops.c |  13 ++\n drivers/crypto/cnxk/cnxk_se.h            | 283 +++++++++++++++++++++++++++++++\n 2 files changed, 296 insertions(+)",
    "diff": "diff --git a/drivers/crypto/cnxk/cnxk_cryptodev_ops.c b/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\nindex 4e29396..f060763 100644\n--- a/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\n+++ b/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\n@@ -444,6 +444,12 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,\n \tcase CNXK_CPT_CIPHER:\n \t\tret = fill_sess_cipher(xform, sess_priv);\n \t\tbreak;\n+\tcase CNXK_CPT_AUTH:\n+\t\tif (xform->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC)\n+\t\t\tret = fill_sess_gmac(xform, sess_priv);\n+\t\telse\n+\t\t\tret = fill_sess_auth(xform, sess_priv);\n+\t\tbreak;\n \tdefault:\n \t\tret = -1;\n \t}\n@@ -451,6 +457,13 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,\n \tif (ret)\n \t\tgoto priv_put;\n \n+\tif ((sess_priv->roc_se_ctx.fc_type == ROC_SE_HASH_HMAC) &&\n+\t    cpt_mac_len_verify(&xform->auth)) {\n+\t\tCPT_LOG_DP_ERR(\"MAC length is not supported\");\n+\t\tret = -ENOTSUP;\n+\t\tgoto priv_put;\n+\t}\n+\n \tsess_priv->cpt_inst_w7 = cnxk_cpt_inst_w7_get(sess_priv, roc_cpt);\n \n \tset_sym_session_private_data(sess, driver_id, sess_priv);\ndiff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk_se.h\nindex f14016c..2f406f6 100644\n--- a/drivers/crypto/cnxk/cnxk_se.h\n+++ b/drivers/crypto/cnxk/cnxk_se.h\n@@ -46,6 +46,47 @@ gen_key_snow3g(const uint8_t *ck, uint32_t *keyx)\n \t}\n }\n \n+static __rte_always_inline int\n+cpt_mac_len_verify(struct rte_crypto_auth_xform *auth)\n+{\n+\tuint16_t mac_len = auth->digest_length;\n+\tint ret;\n+\n+\tswitch (auth->algo) {\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\t\tret = (mac_len == 16) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\tret = (mac_len == 20) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\t\tret = (mac_len == 28) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\t\tret = (mac_len == 32) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\t\tret = (mac_len == 48) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\t\tret = (mac_len == 64) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tret = 0;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -1;\n+\t}\n+\n+\treturn ret;\n+}\n+\n static __rte_always_inline void\n cpt_fc_salt_update(struct roc_se_ctx *se_ctx, uint8_t *salt)\n {\n@@ -308,6 +349,95 @@ cpt_fc_ciph_set_key(struct roc_se_ctx *se_ctx, roc_se_cipher_type type,\n }\n \n static __rte_always_inline int\n+cpt_fc_auth_set_key(struct roc_se_ctx *se_ctx, roc_se_auth_type type,\n+\t\t    const uint8_t *key, uint16_t key_len, uint16_t mac_len)\n+{\n+\tstruct roc_se_zuc_snow3g_ctx *zs_ctx;\n+\tstruct roc_se_kasumi_ctx *k_ctx;\n+\tstruct roc_se_context *fctx;\n+\n+\tif (se_ctx == NULL)\n+\t\treturn -1;\n+\n+\tzs_ctx = &se_ctx->se_ctx.zs_ctx;\n+\tk_ctx = &se_ctx->se_ctx.k_ctx;\n+\tfctx = &se_ctx->se_ctx.fctx;\n+\n+\tif ((type >= ROC_SE_ZUC_EIA3) && (type <= ROC_SE_KASUMI_F9_ECB)) {\n+\t\tuint32_t keyx[4];\n+\n+\t\tif (key_len != 16)\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (se_ctx->enc_cipher)\n+\t\t\treturn -1;\n+\t\t/* For ZUC/SNOW3G/Kasumi */\n+\t\tswitch (type) {\n+\t\tcase ROC_SE_SNOW3G_UIA2:\n+\t\t\tse_ctx->pdcp_alg_type = ROC_SE_PDCP_ALG_TYPE_SNOW3G;\n+\t\t\tgen_key_snow3g(key, keyx);\n+\t\t\tmemcpy(zs_ctx->ci_key, keyx, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_PDCP;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_ZUC_EIA3:\n+\t\t\tse_ctx->pdcp_alg_type = ROC_SE_PDCP_ALG_TYPE_ZUC;\n+\t\t\tmemcpy(zs_ctx->ci_key, key, key_len);\n+\t\t\tmemcpy(zs_ctx->zuc_const, zuc_d, 32);\n+\t\t\tse_ctx->fc_type = ROC_SE_PDCP;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_KASUMI_F9_ECB:\n+\t\t\t/* Kasumi ECB mode */\n+\t\t\tse_ctx->k_ecb = 1;\n+\t\t\tmemcpy(k_ctx->ci_key, key, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_KASUMI;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_KASUMI_F9_CBC:\n+\t\t\tmemcpy(k_ctx->ci_key, key, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_KASUMI;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\treturn -1;\n+\t\t}\n+\t\tse_ctx->mac_len = 4;\n+\t\tse_ctx->hash_type = type;\n+\t\treturn 0;\n+\t}\n+\n+\tif (!(se_ctx->fc_type == ROC_SE_FC_GEN && !type)) {\n+\t\tif (!se_ctx->fc_type || !se_ctx->enc_cipher)\n+\t\t\tse_ctx->fc_type = ROC_SE_HASH_HMAC;\n+\t}\n+\n+\tif (se_ctx->fc_type == ROC_SE_FC_GEN && key_len > 64)\n+\t\treturn -1;\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (type == ROC_SE_GMAC_TYPE)\n+\t\tfctx->enc.enc_cipher = 0;\n+\n+\tfctx->enc.hash_type = se_ctx->hash_type = type;\n+\tfctx->enc.mac_len = se_ctx->mac_len = mac_len;\n+\n+\tif (key_len) {\n+\t\tse_ctx->hmac = 1;\n+\t\tmemset(se_ctx->auth_key, 0, sizeof(se_ctx->auth_key));\n+\t\tmemcpy(se_ctx->auth_key, key, key_len);\n+\t\tse_ctx->auth_key_len = key_len;\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemset(fctx->hmac.opad, 0, sizeof(fctx->hmac.opad));\n+\n+\t\tif (key_len <= 64)\n+\t\t\tmemcpy(fctx->hmac.opad, key, key_len);\n+\t\tfctx->enc.auth_input_type = 1;\n+\t}\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n fill_sess_cipher(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n {\n \tstruct rte_crypto_cipher_xform *c_form;\n@@ -414,4 +544,157 @@ fill_sess_cipher(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n \n \treturn 0;\n }\n+\n+static __rte_always_inline int\n+fill_sess_auth(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\troc_se_auth_type auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, is_null = 0;\n+\n+\tif (xform->next != NULL &&\n+\t    xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&\n+\t    xform->next->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\t/* Perform auth followed by encryption */\n+\t\tsess->roc_se_ctx.template_w4.s.opcode_minor =\n+\t\t\tROC_SE_FC_MINOR_OP_HMAC_FIRST;\n+\t}\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= ROC_SE_OP_AUTH_VERIFY;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= ROC_SE_OP_AUTH_GENERATE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tauth_type = ROC_SE_SHA1_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tauth_type = ROC_SE_SHA2_SHA256;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tauth_type = ROC_SE_SHA2_SHA512;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tauth_type = ROC_SE_GMAC_TYPE;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tauth_type = ROC_SE_SHA2_SHA224;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tauth_type = ROC_SE_SHA2_SHA384;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tauth_type = ROC_SE_MD5_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_KASUMI_F9:\n+\t\tauth_type = ROC_SE_KASUMI_F9_ECB;\n+\t\t/*\n+\t\t * Indicate that direction needs to be taken out\n+\t\t * from end of src\n+\t\t */\n+\t\tzsk_flag = ROC_SE_K_F9;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n+\t\tauth_type = ROC_SE_SNOW3G_UIA2;\n+\t\tzsk_flag = ROC_SE_ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_ZUC_EIA3:\n+\t\tauth_type = ROC_SE_ZUC_EIA3;\n+\t\tzsk_flag = ROC_SE_ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tauth_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CBC_MAC:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported hash algo %u\",\n+\t\t\t       a_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined Hash algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = a_form->digest_length;\n+\tsess->is_null = is_null;\n+\tif (zsk_flag) {\n+\t\tsess->auth_iv_offset = a_form->iv.offset;\n+\t\tsess->auth_iv_length = a_form->iv.length;\n+\t}\n+\tif (unlikely(cpt_fc_auth_set_key(&sess->roc_se_ctx, auth_type,\n+\t\t\t\t\t a_form->key.data, a_form->key.length,\n+\t\t\t\t\t a_form->digest_length)))\n+\t\treturn -1;\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_gmac(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\troc_se_cipher_type enc_type = 0; /* NULL Cipher type */\n+\troc_se_auth_type auth_type = 0;\t /* NULL Auth type */\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= ROC_SE_OP_ENCODE;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= ROC_SE_OP_DECODE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tenc_type = ROC_SE_AES_GCM;\n+\t\tauth_type = ROC_SE_GMAC_TYPE;\n+\t\tbreak;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t       a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = 0;\n+\tsess->aes_gcm = 0;\n+\tsess->is_gmac = 1;\n+\tsess->iv_offset = a_form->iv.offset;\n+\tsess->iv_length = a_form->iv.length;\n+\tsess->mac_len = a_form->digest_length;\n+\n+\tif (unlikely(cpt_fc_ciph_set_key(&sess->roc_se_ctx, enc_type,\n+\t\t\t\t\t a_form->key.data, a_form->key.length,\n+\t\t\t\t\t NULL)))\n+\t\treturn -1;\n+\n+\tif (unlikely(cpt_fc_auth_set_key(&sess->roc_se_ctx, auth_type, NULL, 0,\n+\t\t\t\t\t a_form->digest_length)))\n+\t\treturn -1;\n+\n+\treturn 0;\n+}\n+\n #endif /*_CNXK_SE_H_ */\n",
    "prefixes": [
        "10/20"
    ]
}