get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/117094/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 117094,
    "url": "https://patches.dpdk.org/api/patches/117094/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20220929032746.10659-6-zhangfei.gao@linaro.org/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220929032746.10659-6-zhangfei.gao@linaro.org>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220929032746.10659-6-zhangfei.gao@linaro.org",
    "date": "2022-09-29T03:27:45",
    "name": "[v3,5/6] crypto/uadk: support auth algorithms",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "465aa77dfceab3eec9c9bc06652387c474407e61",
    "submitter": {
        "id": 2701,
        "url": "https://patches.dpdk.org/api/people/2701/?format=api",
        "name": "Zhangfei Gao",
        "email": "zhangfei.gao@linaro.org"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20220929032746.10659-6-zhangfei.gao@linaro.org/mbox/",
    "series": [
        {
            "id": 24894,
            "url": "https://patches.dpdk.org/api/series/24894/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=24894",
            "date": "2022-09-29T03:27:40",
            "name": "crypto/uadk: introduce uadk crypto driver",
            "version": 3,
            "mbox": "https://patches.dpdk.org/series/24894/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/117094/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/117094/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id DD755A00C4;\n\tThu, 29 Sep 2022 05:28:31 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 5E2474113D;\n\tThu, 29 Sep 2022 05:28:27 +0200 (CEST)",
            "from mail-pj1-f48.google.com (mail-pj1-f48.google.com\n [209.85.216.48]) by mails.dpdk.org (Postfix) with ESMTP id 376B8427EE\n for <dev@dpdk.org>; Thu, 29 Sep 2022 05:28:26 +0200 (CEST)",
            "by mail-pj1-f48.google.com with SMTP id\n h8-20020a17090a054800b00205ccbae31eso4679636pjf.5\n for <dev@dpdk.org>; Wed, 28 Sep 2022 20:28:26 -0700 (PDT)",
            "from localhost.localdomain ([45.128.198.71])\n by smtp.gmail.com with ESMTPSA id\n gn4-20020a17090ac78400b001fd66d5c42csm2304271pjb.49.2022.09.28.20.28.20\n (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);\n Wed, 28 Sep 2022 20:28:25 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date;\n bh=of8QdAbjwt9BayPnhY7WQ4Sa04BAIoWu5ynepg1zpBM=;\n b=hcwXxbuE263/EqXSJZMsbbnBPhNDEyoBrmG7ctx+eGoRJSu2EnQdLALUi6lHUSbT94\n IUYL2xMuIPzAWlrCH0u5894hfmnw1JH5UkYRQxiUIvtRio6ZFdeHJzImzIRcy3ZHO6f2\n YLOzRsZUveGbD5pQrf8sfz9IRPpsvjIvCz91/DX+4aGU4WMhlV0j7BqIcUs4X0+ahjwd\n 5UGM6CLZWzGMzzy4t6XIWQa3Exq5jl9zRoZ9xv/S2O19w2Phvme1JV0KYJLQBiwG4qQO\n 3QtBnubPT39KMxl9PSYf9GwPYpsC3qLcPaxjp5yqOess09e8kRQfAKhcVkfA/Xvwh5v+\n Vi9w==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20210112;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc\n :subject:date;\n bh=of8QdAbjwt9BayPnhY7WQ4Sa04BAIoWu5ynepg1zpBM=;\n b=HEWYcwxIW3D7pMLMvTdMDFOKO93zzV/mmz36EU7bCchGOnECjHkPob+DU0O/itVs1T\n YWw8AKkWZcM9ZsCnCHTvsmk9lkJWUps9oWyCowQlq2fxljBymLSREbo8taR86eL16/0D\n L56p3KxPMT6tSxv9vK9uEP8io6WgBbe+JIjSVAfGRyYnBl+23zJPpKWGcoWzQLU2c58A\n Zn3NcLobNE1ioWkC23LilW4Tsnmrs4KJjnjujB/BaCYOVdkHybUNmnz1+9QEyUl6qaAg\n 9/Hz0QlZJJSZ+stQscI4ePTOt9Nx3k0z/ChYP/jU7inP0lO/5eavYoWBgfBMObjSzydw\n KOlQ==",
        "X-Gm-Message-State": "ACrzQf3g1ZNdHj5ehSlDll4BlhJzL/0X0V14wEnUyyY9o/fq6ffmPgUy\n VeVMWYQMCIMIBCd8VQvNIFE3hg==",
        "X-Google-Smtp-Source": "\n AMsMyM5ewHPRNv7Cp//PYelSUMQSeWoxZCrEuBKuOG967gBEQTGQScuzZuPCs4VtW7QUOxW2C4eu9Q==",
        "X-Received": "by 2002:a17:902:8bc3:b0:178:8563:8e42 with SMTP id\n r3-20020a1709028bc300b0017885638e42mr1270899plo.0.1664422105382;\n Wed, 28 Sep 2022 20:28:25 -0700 (PDT)",
        "From": "Zhangfei Gao <zhangfei.gao@linaro.org>",
        "To": "Akhil Goyal <gakhil@marvell.com>,\n Declan Doherty <declan.doherty@intel.com>,\n Fan Zhang <roy.fan.zhang@intel.com>,\n Ashish Gupta <ashish.gupta@marvell.com>, Ray Kinsella <mdr@ashroe.eu>",
        "Cc": "dev@dpdk.org,\n\tacc@openeuler.org,\n\tZhangfei Gao <zhangfei.gao@linaro.org>",
        "Subject": "[PATCH v3 5/6] crypto/uadk: support auth algorithms",
        "Date": "Thu, 29 Sep 2022 11:27:45 +0800",
        "Message-Id": "<20220929032746.10659-6-zhangfei.gao@linaro.org>",
        "X-Mailer": "git-send-email 2.36.1",
        "In-Reply-To": "<20220929032746.10659-1-zhangfei.gao@linaro.org>",
        "References": "<20220929032746.10659-1-zhangfei.gao@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Hash algorithms:\n\n* ``RTE_CRYPTO_AUTH_MD5``\n* ``RTE_CRYPTO_AUTH_MD5_HMAC``\n* ``RTE_CRYPTO_AUTH_SHA1``\n* ``RTE_CRYPTO_AUTH_SHA1_HMAC``\n* ``RTE_CRYPTO_AUTH_SHA224``\n* ``RTE_CRYPTO_AUTH_SHA224_HMAC``\n* ``RTE_CRYPTO_AUTH_SHA256``\n* ``RTE_CRYPTO_AUTH_SHA256_HMAC``\n* ``RTE_CRYPTO_AUTH_SHA384``\n* ``RTE_CRYPTO_AUTH_SHA384_HMAC``\n* ``RTE_CRYPTO_AUTH_SHA512``\n* ``RTE_CRYPTO_AUTH_SHA512_HMAC``\n\nSigned-off-by: Zhangfei Gao <zhangfei.gao@linaro.org>\n---\n doc/guides/cryptodevs/features/uadk.ini |  12 +\n doc/guides/cryptodevs/uadk.rst          |  15 +\n drivers/crypto/uadk/uadk_crypto_pmd.c   | 459 ++++++++++++++++++++++++\n 3 files changed, 486 insertions(+)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/uadk.ini b/doc/guides/cryptodevs/features/uadk.ini\nindex 005e08ac8d..2e8a37a2b3 100644\n--- a/doc/guides/cryptodevs/features/uadk.ini\n+++ b/doc/guides/cryptodevs/features/uadk.ini\n@@ -25,6 +25,18 @@ DES CBC        = Y\n ; Supported authentication algorithms of the 'uadk' crypto driver.\n ;\n [Auth]\n+MD5          = Y\n+MD5 HMAC     = Y\n+SHA1         = Y\n+SHA1 HMAC    = Y\n+SHA224       = Y\n+SHA224 HMAC  = Y\n+SHA256       = Y\n+SHA256 HMAC  = Y\n+SHA384       = Y\n+SHA384 HMAC  = Y\n+SHA512       = Y\n+SHA512 HMAC  = Y\n \n ;\n ; Supported AEAD algorithms of the 'uadk' crypto driver.\ndiff --git a/doc/guides/cryptodevs/uadk.rst b/doc/guides/cryptodevs/uadk.rst\nindex 054f5103cc..23ed70e82b 100644\n--- a/doc/guides/cryptodevs/uadk.rst\n+++ b/doc/guides/cryptodevs/uadk.rst\n@@ -22,6 +22,21 @@ Cipher algorithms:\n * ``RTE_CRYPTO_CIPHER_AES_XTS``\n * ``RTE_CRYPTO_CIPHER_DES_CBC``\n \n+Hash algorithms:\n+\n+* ``RTE_CRYPTO_AUTH_MD5``\n+* ``RTE_CRYPTO_AUTH_MD5_HMAC``\n+* ``RTE_CRYPTO_AUTH_SHA1``\n+* ``RTE_CRYPTO_AUTH_SHA1_HMAC``\n+* ``RTE_CRYPTO_AUTH_SHA224``\n+* ``RTE_CRYPTO_AUTH_SHA224_HMAC``\n+* ``RTE_CRYPTO_AUTH_SHA256``\n+* ``RTE_CRYPTO_AUTH_SHA256_HMAC``\n+* ``RTE_CRYPTO_AUTH_SHA384``\n+* ``RTE_CRYPTO_AUTH_SHA384_HMAC``\n+* ``RTE_CRYPTO_AUTH_SHA512``\n+* ``RTE_CRYPTO_AUTH_SHA512_HMAC``\n+\n Test steps\n -----------\n \ndiff --git a/drivers/crypto/uadk/uadk_crypto_pmd.c b/drivers/crypto/uadk/uadk_crypto_pmd.c\nindex bf9fb1f6ce..2dc5af10ff 100644\n--- a/drivers/crypto/uadk/uadk_crypto_pmd.c\n+++ b/drivers/crypto/uadk/uadk_crypto_pmd.c\n@@ -31,11 +31,15 @@ struct uadk_qp {\n \n enum uadk_chain_order {\n \tUADK_CHAIN_ONLY_CIPHER,\n+\tUADK_CHAIN_ONLY_AUTH,\n+\tUADK_CHAIN_CIPHER_AUTH,\n+\tUADK_CHAIN_AUTH_CIPHER,\n \tUADK_CHAIN_NOT_SUPPORTED\n };\n \n struct uadk_crypto_session {\n \thandle_t handle_cipher;\n+\thandle_t handle_digest;\n \tenum uadk_chain_order chain_order;\n \n \t/* IV parameters */\n@@ -49,6 +53,13 @@ struct uadk_crypto_session {\n \t\tenum rte_crypto_cipher_operation direction;\n \t\tstruct wd_cipher_req req;\n \t} cipher;\n+\n+\t/* Authentication Parameters */\n+\tstruct {\n+\t\tstruct wd_digest_req req;\n+\t\tenum rte_crypto_auth_operation operation;\n+\t\tuint16_t digest_length;\n+\t} auth;\n } __rte_cache_aligned;\n \n enum uadk_crypto_version {\n@@ -58,6 +69,7 @@ enum uadk_crypto_version {\n \n struct uadk_crypto_priv {\n \tbool env_cipher_init;\n+\tbool env_auth_init;\n \tenum uadk_crypto_version version;\n } __rte_cache_aligned;\n \n@@ -71,6 +83,252 @@ RTE_LOG_REGISTER_DEFAULT(uadk_crypto_logtype, INFO);\n \t\t## __VA_ARGS__)\n \n static const struct rte_cryptodev_capabilities uadk_crypto_v2_capabilities[] = {\n+\t{\t/* MD5 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_MD5_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* MD5 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_MD5,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA1 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 20,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA1 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 20,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA224 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 28,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA224 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 28,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA256 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256_HMAC,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA256 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA384 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384_HMAC,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 48,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA384 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 48,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA512 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512_HMAC,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 64,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{\t/* SHA512 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 64,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* AES ECB */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -187,6 +445,11 @@ uadk_crypto_pmd_close(struct rte_cryptodev *dev)\n \t\tpriv->env_cipher_init = false;\n \t}\n \n+\tif (priv->env_auth_init) {\n+\t\twd_digest_env_uninit();\n+\t\tpriv->env_auth_init = false;\n+\t}\n+\n \treturn 0;\n }\n \n@@ -345,9 +608,19 @@ uadk_get_chain_order(const struct rte_crypto_sym_xform *xform)\n \tenum uadk_chain_order res = UADK_CHAIN_NOT_SUPPORTED;\n \n \tif (xform != NULL) {\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH) {\n+\t\t\tif (xform->next == NULL)\n+\t\t\t\tres = UADK_CHAIN_ONLY_AUTH;\n+\t\t\telse if (xform->next->type ==\n+\t\t\t\t\tRTE_CRYPTO_SYM_XFORM_CIPHER)\n+\t\t\t\tres = UADK_CHAIN_AUTH_CIPHER;\n+\t\t}\n+\n \t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n \t\t\tif (xform->next == NULL)\n \t\t\t\tres = UADK_CHAIN_ONLY_CIPHER;\n+\t\t\telse if (xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\t\t\tres = UADK_CHAIN_CIPHER_AUTH;\n \t\t}\n \t}\n \n@@ -434,6 +707,112 @@ uadk_set_session_cipher_parameters(struct rte_cryptodev *dev,\n \treturn ret;\n }\n \n+/* Set session auth parameters */\n+static int\n+uadk_set_session_auth_parameters(struct rte_cryptodev *dev,\n+\t\t\t\t struct uadk_crypto_session *sess,\n+\t\t\t\t struct rte_crypto_sym_xform *xform)\n+{\n+\tstruct uadk_crypto_priv *priv = dev->data->dev_private;\n+\tstruct wd_digest_sess_setup setup = {0};\n+\tstruct sched_params params = {0};\n+\tint ret;\n+\n+\tif (!priv->env_auth_init) {\n+\t\tret = wd_digest_env_init(NULL);\n+\t\tif (ret < 0)\n+\t\t\treturn -EINVAL;\n+\t\tpriv->env_auth_init = true;\n+\t}\n+\n+\tsess->auth.operation = xform->auth.op;\n+\tsess->auth.digest_length = xform->auth.digest_length;\n+\n+\tswitch (xform->auth.algo) {\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_MD5) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_MD5;\n+\t\tsess->auth.req.out_buf_bytes = 16;\n+\t\tsess->auth.req.out_bytes = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_SHA1) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_SHA1;\n+\t\tsess->auth.req.out_buf_bytes = 20;\n+\t\tsess->auth.req.out_bytes = 20;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_SHA224) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_SHA224;\n+\t\tsess->auth.req.out_buf_bytes = 28;\n+\t\tsess->auth.req.out_bytes = 28;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_SHA256) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_SHA256;\n+\t\tsess->auth.req.out_buf_bytes = 32;\n+\t\tsess->auth.req.out_bytes = 32;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_SHA384) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_SHA384;\n+\t\tsess->auth.req.out_buf_bytes = 48;\n+\t\tsess->auth.req.out_bytes = 48;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\t\tsetup.mode = (xform->auth.algo == RTE_CRYPTO_AUTH_SHA512) ?\n+\t\t\t     WD_DIGEST_NORMAL : WD_DIGEST_HMAC;\n+\t\tsetup.alg = WD_DIGEST_SHA512;\n+\t\tsess->auth.req.out_buf_bytes = 64;\n+\t\tsess->auth.req.out_bytes = 64;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -ENOTSUP;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\tparams.numa_id = -1;\t/* choose nearby numa node */\n+\tsetup.sched_param = &params;\n+\tsess->handle_digest = wd_digest_alloc_sess(&setup);\n+\tif (!sess->handle_digest) {\n+\t\tUADK_LOG(ERR, \"uadk failed to alloc session!\\n\");\n+\t\tret = -EINVAL;\n+\t\tgoto env_uninit;\n+\t}\n+\n+\t/* if mode is HMAC, should set key */\n+\tif (setup.mode == WD_DIGEST_HMAC) {\n+\t\tret = wd_digest_set_key(sess->handle_digest,\n+\t\t\t\t\txform->auth.key.data,\n+\t\t\t\t\txform->auth.key.length);\n+\t\tif (ret) {\n+\t\t\tUADK_LOG(ERR, \"uadk failed to alloc session!\\n\");\n+\t\t\twd_digest_free_sess(sess->handle_digest);\n+\t\t\tsess->handle_digest = 0;\n+\t\t\tret = -EINVAL;\n+\t\t\tgoto env_uninit;\n+\t\t}\n+\t}\n+\n+\treturn 0;\n+\n+env_uninit:\n+\twd_digest_env_uninit();\n+\tpriv->env_auth_init = false;\n+\treturn ret;\n+}\n+\n static int\n uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \t\t\t\t  struct rte_crypto_sym_xform *xform,\n@@ -441,6 +820,7 @@ uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \t\t\t\t  struct rte_mempool *mp)\n {\n \tstruct rte_crypto_sym_xform *cipher_xform = NULL;\n+\tstruct rte_crypto_sym_xform *auth_xform = NULL;\n \tstruct uadk_crypto_session *sess;\n \tint ret;\n \n@@ -456,6 +836,17 @@ uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \tcase UADK_CHAIN_ONLY_CIPHER:\n \t\tcipher_xform = xform;\n \t\tbreak;\n+\tcase UADK_CHAIN_ONLY_AUTH:\n+\t\tauth_xform = xform;\n+\t\tbreak;\n+\tcase UADK_CHAIN_CIPHER_AUTH:\n+\t\tcipher_xform = xform;\n+\t\tauth_xform = xform->next;\n+\t\tbreak;\n+\tcase UADK_CHAIN_AUTH_CIPHER:\n+\t\tauth_xform = xform;\n+\t\tcipher_xform = xform->next;\n+\t\tbreak;\n \tdefault:\n \t\tret = -ENOTSUP;\n \t\tgoto err;\n@@ -470,6 +861,15 @@ uadk_crypto_sym_session_configure(struct rte_cryptodev *dev,\n \t\t}\n \t}\n \n+\tif (auth_xform) {\n+\t\tret = uadk_set_session_auth_parameters(dev, sess, auth_xform);\n+\t\tif (ret != 0) {\n+\t\t\tUADK_LOG(ERR,\n+\t\t\t\t\"Invalid/unsupported auth parameters\");\n+\t\t\tgoto err;\n+\t\t}\n+\t}\n+\n \tset_sym_session_private_data(session, dev->driver_id, sess);\n \n \treturn 0;\n@@ -495,6 +895,11 @@ uadk_crypto_sym_session_clear(struct rte_cryptodev *dev,\n \t\tpriv_sess->handle_cipher = 0;\n \t}\n \n+\tif (priv_sess->handle_digest) {\n+\t\twd_digest_free_sess(priv_sess->handle_digest);\n+\t\tpriv_sess->handle_digest = 0;\n+\t}\n+\n \tset_sym_session_private_data(sess, dev->driver_id, NULL);\n \trte_mempool_put(rte_mempool_from_obj(priv_sess), priv_sess);\n }\n@@ -550,6 +955,49 @@ uadk_process_cipher_op(struct rte_crypto_op *op,\n \t\top->status = RTE_COMP_OP_STATUS_ERROR;\n }\n \n+static void\n+uadk_process_auth_op(struct uadk_qp *qp, struct rte_crypto_op *op,\n+\t\t     struct uadk_crypto_session *sess,\n+\t\t     struct rte_mbuf *msrc, struct rte_mbuf *mdst)\n+{\n+\tuint32_t srclen = op->sym->auth.data.length;\n+\tuint32_t off = op->sym->auth.data.offset;\n+\tuint8_t *dst = qp->temp_digest;\n+\tint ret;\n+\n+\tif (!sess) {\n+\t\top->status = RTE_COMP_OP_STATUS_INVALID_ARGS;\n+\t\treturn;\n+\t}\n+\n+\tsess->auth.req.in = rte_pktmbuf_mtod_offset(msrc, uint8_t *, off);\n+\tsess->auth.req.in_bytes = srclen;\n+\tsess->auth.req.out = dst;\n+\n+\tdo {\n+\t\tret = wd_do_digest_sync(sess->handle_digest, &sess->auth.req);\n+\t} while (ret == -WD_EBUSY);\n+\n+\tif (sess->auth.operation == RTE_CRYPTO_AUTH_OP_VERIFY) {\n+\t\tif (memcmp(dst, op->sym->auth.digest.data,\n+\t\t\t\tsess->auth.digest_length) != 0) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_AUTH_FAILED;\n+\t\t}\n+\t} else {\n+\t\tuint8_t *auth_dst;\n+\n+\t\tauth_dst = op->sym->auth.digest.data;\n+\t\tif (auth_dst == NULL)\n+\t\t\tauth_dst = rte_pktmbuf_mtod_offset(mdst, uint8_t *,\n+\t\t\t\t\top->sym->auth.data.offset +\n+\t\t\t\t\top->sym->auth.data.length);\n+\t\tmemcpy(auth_dst, dst, sess->auth.digest_length);\n+\t}\n+\n+\tif (ret)\n+\t\top->status = RTE_COMP_OP_STATUS_ERROR;\n+}\n+\n static uint16_t\n uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\t\t  uint16_t nb_ops)\n@@ -579,6 +1027,17 @@ uadk_crypto_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops,\n \t\tcase UADK_CHAIN_ONLY_CIPHER:\n \t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n \t\t\tbreak;\n+\t\tcase UADK_CHAIN_ONLY_AUTH:\n+\t\t\tuadk_process_auth_op(qp, op, sess, msrc, mdst);\n+\t\t\tbreak;\n+\t\tcase UADK_CHAIN_CIPHER_AUTH:\n+\t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n+\t\t\tuadk_process_auth_op(qp, op, sess, mdst, mdst);\n+\t\t\tbreak;\n+\t\tcase UADK_CHAIN_AUTH_CIPHER:\n+\t\t\tuadk_process_auth_op(qp, op, sess, msrc, mdst);\n+\t\t\tuadk_process_cipher_op(op, sess, msrc, mdst);\n+\t\t\tbreak;\n \t\tdefault:\n \t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n \t\t\tbreak;\n",
    "prefixes": [
        "v3",
        "5/6"
    ]
}