get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/36262/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 36262,
    "url": "https://patches.dpdk.org/api/patches/36262/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/1521462233-13590-17-git-send-email-Ravi1.kumar@amd.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1521462233-13590-17-git-send-email-Ravi1.kumar@amd.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1521462233-13590-17-git-send-email-Ravi1.kumar@amd.com",
    "date": "2018-03-19T12:23:51",
    "name": "[dpdk-dev,v5,17/19] crypto/ccp: support cpu based md5 and sha2 family authentication algo",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "26d3a17a3c640ce5318b015b9065bd169e117ed4",
    "submitter": {
        "id": 819,
        "url": "https://patches.dpdk.org/api/people/819/?format=api",
        "name": "Kumar, Ravi1",
        "email": "ravi1.kumar@amd.com"
    },
    "delegate": {
        "id": 22,
        "url": "https://patches.dpdk.org/api/users/22/?format=api",
        "username": "pdelarag",
        "first_name": "Pablo",
        "last_name": "de Lara Guarch",
        "email": "pablo.de.lara.guarch@intel.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/1521462233-13590-17-git-send-email-Ravi1.kumar@amd.com/mbox/",
    "series": [],
    "comments": "https://patches.dpdk.org/api/patches/36262/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/36262/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id F38A81B28D;\n\tMon, 19 Mar 2018 13:24:58 +0100 (CET)",
            "from NAM03-DM3-obe.outbound.protection.outlook.com\n\t(mail-dm3nam03on0064.outbound.protection.outlook.com [104.47.41.64])\n\tby dpdk.org (Postfix) with ESMTP id 3A4241B017\n\tfor <dev@dpdk.org>; Mon, 19 Mar 2018 13:24:51 +0100 (CET)",
            "from wallaby-smavila.amd.com (202.56.249.162) by\n\tBN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n\t15.20.588.14; Mon, 19 Mar 2018 12:24:47 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=amdcloud.onmicrosoft.com; s=selector1-amd-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n\tbh=sEeC7L4XHw5yx361OdIfPncH4P4iiFezw8OlwFizNUc=;\n\tb=iFvAH9sjzl86J+0RysR/yzWpCy4ar9ByQ6pKx9K8Qc5MWjJZ0vq2d+CAU9S/tdn8jKzD5xLJ5KnN/vt7o8gW55Xtf7cetaodzKfiF1afK7V4/TMMEs2z3wVGaLSJIYksfo+GdkbNLG+4qtsPCxTnT4iTLx91TNxQ6HVgdknssKo=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Ravi1.Kumar@amd.com; ",
        "From": "Ravi Kumar <Ravi1.kumar@amd.com>",
        "To": "dev@dpdk.org",
        "Cc": "pablo.de.lara.guarch@intel.com,\n\themant.agrawal@nxp.com",
        "Date": "Mon, 19 Mar 2018 08:23:51 -0400",
        "Message-Id": "<1521462233-13590-17-git-send-email-Ravi1.kumar@amd.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com>",
        "References": "<1520584520-130522-1-git-send-email-Ravi1.kumar@amd.com>\n\t<1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[202.56.249.162]",
        "X-ClientProxiedBy": "MAXPR0101CA0025.INDPRD01.PROD.OUTLOOK.COM (10.174.62.139)\n\tTo BN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146)",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-HT": "Tenant",
        "X-MS-Office365-Filtering-Correlation-Id": "518fd44a-6621-4b22-2836-08d58d946866",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);\n\tSRVR:BN6PR12MB1505; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BN6PR12MB1505;\n\t3:cbXmoiUfcqZ51h1+Szf4FarUyevtrQPOk1g7W3moe/JjjVsoWlDrf00ZUvKR9WQU+hfcuVUFTqs1xWg4ZRIIo4TdbtC58xVlZGVKKEz9ar3chE/BX1YIj1Hlj2BLtP1X7rqzo1p0CUrGmqqKXBlwvj6B4KmtnMFGs+pHHi9u+ug1PYuM+skVyGgoU5gYFx4xp0YxPFvBliZ5UOvt7jTQ7GwTFxeoB1EFLwZ7JawukFH6srysZnUp8GUReFfbb2Mv;\n\t25:m8b2JbXrxM3nGo6UDsb9KoHReuceTFGPmqGcMc3mNrjFGXHEmiEO+4xXRm5cDh/h3rDOaX9MntnLL8cM1nkN4lWx0XT0LeSxSbTf4rHAlDq5HJFMuBh7/Y5Eyzn9A0IiwYEs/Xn4zTrzrTLJAF1eZWGfesbdbeK9ZDHnR+oWoAfm8ui6Y73dKsjSxg6V3nSMzyLbms+QCVYSlftdQ6JXQBsTiiv0lBpZGnQPpxRlFaOJI6IAcUNvoXUr7FzPro3SLc06sfaCk++QZPw3JcF2+vtYIgCawWHWdTOVo2y4F7/l/q3XoY+jtAYSb3rZJ4/M7ZJNNjvW1rUl9PmvZfJUgA==;\n\t31:LUed6aJGRMvPKoviWctVC9/zEhAlFyPY55K/ifre3qDHTdlyO1l2Uv1n2QN3Ms0VGLxS5Oi68V2kmSm7saFce+hVZ0cV74vZN94SMsnQSC0P6MvqYt/fbjbLIxmOstQMfM+IfDCkFe6m8wELBpOAkxZmkqzvFKOfpD8pKgbMfbUjx3IjIv9SaFka4tEVtChYlmjpVUQo7azOygkRmTOA31axBjOuCqOg6k3vfYWCRVk=",
            "1; BN6PR12MB1505;\n\t20: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;\n\t4:0ZzqqSGIV+TGTnxlfxbCdsFyxdAYTlFWVZaYE2ZDSicnD3KgGtxEny6FMFDfFIbRRNM8NSg18zuKoQcPvOPqcUgZWwoshKqNwkCm+dBiJGeMkDR6M3zmlTBGV+JLh+RnwgBCOkWAiyjV9AauZ1o53Zc3E7xezpq6eFSYlE6YzLAWyHd+dmBKgUPVcRrhsIlzReSVYWOWTAdLmy9M1sF6xRry+LVR9APG6ZitgE1dQ4t/NbxpNZH0/HQSvNZYNey5ar6VI0RHLi83Y3bKb/EvzsN57bRTJ0D+Vi3KBzVhq19u0QACcrj2qI6j5JjTMrWl",
            "=?us-ascii?Q?1; BN6PR12MB1505;\n\t23:UI05fLaPz2DyBoxU2YFv1+LkiZgAdDkJ5SakdH+Vs?=\n\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",
            "1; BN6PR12MB1505;\n\t6:uua5kUwN6EYP+PxrekZvFZEXpwMrhTgvZYqFpGBdBaD2sYJ2R7R3IuVe7LIdzYiUKtFNSPHWQaubQ4FFDX8K7CCIX4TIMxvE0ILaMHz57bf2h78wToPS7y2X81KcI2gKWy3IIwFNQtGEvwpBmHY27e7eoaop9ISLRugAoZFCTXuMKucuedvCQuoSOAmsSFlG+uvtCGvw3TOQLw0FMn09PrNsD1k3uLxcDQhPTsf5vEfFbVWikWumY4W5DFKTWcKFtvzAgGKMyIJwOBbba74Ct2uk6nnxSVfXR2pJNzj4Ru18TGgSocg7dw+IVgt+GwnNsDdct5y5vuj2qAS7VQzm/UOMVpXOV6b7O1xfd2QmK3E=;\n\t5:i4dFWYtYrJiNdRtOEtDCJ3yMbCA/UrFyRjU6Xqx9v2gAEaJJvHewGK23KgdAhp0U7ZiUhrMUo3E82o5vam1WuKhiHS8xwgF6wfZUDXKiSqPUHQgsdWu1A6YxUSCSyyRk89L1/vEi4acg/SX3ATZjvdZNgAZEO5YTEB1yLQCdJZk=;\n\t24:ffQS9qpFlBmFYSa/pVIt0iEOM1JtEQEv+xJOnSPk99NWSbYR2X/AtIlBlDNP1yonBjEFncmZUMAjtJdhujW8pbZi8n31q+Lsnmh7rvSv+U0=;\n\t7:Zi+9EtUZeYS2AY3518z28RLDNYv88yIxzIkgaK9w7wz0KR7OJSkZiaV6nG6i0gnungbjwhnZSktmR8/mWzhNihwoWgLNbqz3ClhqYGnxKZzQmYjpU8ABb/THRp+Kqw7nA0TCX+JFB+il2No0BMp/75gvQ/DJD2ZNviGn5hDJMwwVZlOehi3oOwhsoocbkJOPYUb+l4PpVU0DNyfCh1Em0sJQBjfBqPVtRpEcZJIbEB7jvsg9EEQ8fxxledf1dQba",
            "1; BN6PR12MB1505;\n\t20:e1OPc17Ig/e/vFwsXh7sPpD/t7MvDt8tV0vV3FXMXTDQsSbKTfEI1IRxgY2Jkrnut3siR2s3tmVZHxW9BXNQfq5vlPbGAAI6zN9VCkX1q5ioAc4rJpU5PEkoWBL0fNin2UEWVrt8q27L6OO+feqSHJdJ5wWvFAeiNDX32fO8quxEiGMKJdPmtHUGOphp7bV479fC+jj3hn4AiaCzJlHS0rOp2uTSHlwauxlWr6zvX2gsPBYM7kps+o5Cvo4GDQKg"
        ],
        "X-MS-TrafficTypeDiagnostic": "BN6PR12MB1505:",
        "X-Microsoft-Antispam-PRVS": "<BN6PR12MB15052AE5A4847E91D9DAEB46AED40@BN6PR12MB1505.namprd12.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:(767451399110);",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231221)(944501300)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011);\n\tSRVR:BN6PR12MB1505; BCL:0; PCL:0; RULEID:; SRVR:BN6PR12MB1505; ",
        "X-Forefront-PRVS": "06167FAD59",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(396003)(39380400002)(39860400002)(346002)(376002)(366004)(199004)(189003)(97736004)(105586002)(2361001)(2351001)(72206003)(48376002)(4326008)(50226002)(76176011)(59450400001)(8676002)(26005)(316002)(8936002)(53936002)(106356001)(16586007)(186003)(7696005)(51416003)(16526019)(52116002)(386003)(81166006)(81156014)(8656006)(25786009)(575784001)(66066001)(68736007)(86362001)(47776003)(6486002)(5660300001)(6666003)(7736002)(53416004)(6116002)(305945005)(3846002)(478600001)(2950100002)(36756003)(6916009)(2906002)(50466002);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1505;\n\tH:wallaby-smavila.amd.com; FPR:; \n\tSPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; ",
        "Received-SPF": "None (protection.outlook.com: amd.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "lkl4Epe6SfoL3WIoh6hQJZOV0eAW/p28Oa4n+OOXUJXxbRSthALV0uI+DpC5Bq37i7NHQzGhKB/L6xwC6silKWIPPOjDixLGskvS4KmaDJsc9aJacJaGFcd+SDPEqiadHbeWkENIylF6IzMrCcfBnWysK9uZD9CW5zExs8jsCR4Al5C0aQFH0eANJW1r+Z5U",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "19 Mar 2018 12:24:47.6163\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "518fd44a-6621-4b22-2836-08d58d946866",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "BN6PR12MB1505",
        "Subject": "[dpdk-dev] [PATCH v5 17/19] crypto/ccp: support cpu based md5 and\n\tsha2 family authentication algo",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Signed-off-by: Ravi Kumar <Ravi1.kumar@amd.com>\n---\n config/common_base                   |   1 +\n drivers/crypto/ccp/ccp_crypto.c      | 282 ++++++++++++++++++++++++++++++++++-\n drivers/crypto/ccp/ccp_crypto.h      |   5 +-\n drivers/crypto/ccp/ccp_pmd_ops.c     |  23 +++\n drivers/crypto/ccp/ccp_pmd_private.h |  10 ++\n 5 files changed, 316 insertions(+), 5 deletions(-)",
    "diff": "diff --git a/config/common_base b/config/common_base\nindex 28237f0..65e34ae 100644\n--- a/config/common_base\n+++ b/config/common_base\n@@ -532,6 +532,7 @@ CONFIG_RTE_LIBRTE_PMD_NULL_CRYPTO=y\n # Compile PMD for AMD CCP crypto device\n #\n CONFIG_RTE_LIBRTE_PMD_CCP=n\n+CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=n\n \n #\n # Compile PMD for Marvell Crypto device\ndiff --git a/drivers/crypto/ccp/ccp_crypto.c b/drivers/crypto/ccp/ccp_crypto.c\nindex 53e731b..a0809e4 100644\n--- a/drivers/crypto/ccp/ccp_crypto.c\n+++ b/drivers/crypto/ccp/ccp_crypto.c\n@@ -27,6 +27,12 @@\n #include \"ccp_pci.h\"\n #include \"ccp_pmd_private.h\"\n \n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+#include <openssl/conf.h>\n+#include <openssl/err.h>\n+#include <openssl/hmac.h>\n+#endif\n+\n /* SHA initial context values */\n static uint32_t ccp_sha1_init[SHA_COMMON_DIGEST_SIZE / sizeof(uint32_t)] = {\n \tSHA1_H4, SHA1_H3,\n@@ -760,6 +766,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \telse\n \t\tsess->auth.op = CCP_AUTH_OP_VERIFY;\n \tswitch (auth_xform->algo) {\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_MD5_HMAC;\n+\t\tsess->auth.offset = (CCP_SB_BYTES << 1) - MD5_DIGEST_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tsess->auth.block_size = MD5_BLOCK_SIZE;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+\t\tbreak;\n+#endif\n \tcase RTE_CRYPTO_AUTH_SHA1:\n \t\tsess->auth.engine = CCP_ENGINE_SHA;\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA1;\n@@ -769,6 +786,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.offset = CCP_SB_BYTES - SHA1_DIGEST_SIZE;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tif (auth_xform->key.length > SHA1_BLOCK_SIZE)\n+\t\t\treturn -1;\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_SHA1_HMAC;\n+\t\tsess->auth.offset = CCP_SB_BYTES - SHA1_DIGEST_SIZE;\n+\t\tsess->auth.block_size = SHA1_BLOCK_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+#else\n \t\tif (auth_xform->key.length > SHA1_BLOCK_SIZE)\n \t\t\treturn -1;\n \t\tsess->auth.engine = CCP_ENGINE_SHA;\n@@ -784,6 +812,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\t\t   auth_xform->key.length);\n \t\tif (generate_partial_hash(sess))\n \t\t\treturn -1;\n+#endif\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA224:\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA224;\n@@ -794,6 +823,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.offset = CCP_SB_BYTES - SHA224_DIGEST_SIZE;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tif (auth_xform->key.length > SHA224_BLOCK_SIZE)\n+\t\t\treturn -1;\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_SHA224_HMAC;\n+\t\tsess->auth.offset = CCP_SB_BYTES - SHA224_DIGEST_SIZE;\n+\t\tsess->auth.block_size = SHA224_BLOCK_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+#else\n \t\tif (auth_xform->key.length > SHA224_BLOCK_SIZE)\n \t\t\treturn -1;\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA224_HMAC;\n@@ -809,6 +849,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\t\t   auth_xform->key.length);\n \t\tif (generate_partial_hash(sess))\n \t\t\treturn -1;\n+#endif\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA3_224:\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA3_224;\n@@ -843,6 +884,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.offset = CCP_SB_BYTES - SHA256_DIGEST_SIZE;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tif (auth_xform->key.length > SHA256_BLOCK_SIZE)\n+\t\t\treturn -1;\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_SHA256_HMAC;\n+\t\tsess->auth.offset = CCP_SB_BYTES - SHA256_DIGEST_SIZE;\n+\t\tsess->auth.block_size = SHA256_BLOCK_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+#else\n \t\tif (auth_xform->key.length > SHA256_BLOCK_SIZE)\n \t\t\treturn -1;\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA256_HMAC;\n@@ -858,6 +910,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\t\t   auth_xform->key.length);\n \t\tif (generate_partial_hash(sess))\n \t\t\treturn -1;\n+#endif\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA3_256:\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA3_256;\n@@ -892,6 +945,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.offset = (CCP_SB_BYTES << 1) - SHA384_DIGEST_SIZE;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tif (auth_xform->key.length > SHA384_BLOCK_SIZE)\n+\t\t\treturn -1;\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_SHA384_HMAC;\n+\t\tsess->auth.offset = (CCP_SB_BYTES << 1) - SHA384_DIGEST_SIZE;\n+\t\tsess->auth.block_size = SHA384_BLOCK_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+#else\n \t\tif (auth_xform->key.length > SHA384_BLOCK_SIZE)\n \t\t\treturn -1;\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA384_HMAC;\n@@ -907,6 +971,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\t\t   auth_xform->key.length);\n \t\tif (generate_partial_hash(sess))\n \t\t\treturn -1;\n+#endif\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA3_384:\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA3_384;\n@@ -941,6 +1006,17 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.offset = (CCP_SB_BYTES << 1) - SHA512_DIGEST_SIZE;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tif (auth_xform->key.length > SHA512_BLOCK_SIZE)\n+\t\t\treturn -1;\n+\t\tsess->auth.algo = CCP_AUTH_ALGO_SHA512_HMAC;\n+\t\tsess->auth.offset = (CCP_SB_BYTES << 1) - SHA512_DIGEST_SIZE;\n+\t\tsess->auth.block_size = SHA512_BLOCK_SIZE;\n+\t\tsess->auth.key_length = auth_xform->key.length;\n+\t\tmemset(sess->auth.key, 0, sess->auth.block_size);\n+\t\trte_memcpy(sess->auth.key, auth_xform->key.data,\n+\t\t\t   auth_xform->key.length);\n+#else\n \t\tif (auth_xform->key.length > SHA512_BLOCK_SIZE)\n \t\t\treturn -1;\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA512_HMAC;\n@@ -956,6 +1032,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\t\t   auth_xform->key.length);\n \t\tif (generate_partial_hash(sess))\n \t\t\treturn -1;\n+#endif\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA3_512:\n \t\tsess->auth.algo = CCP_AUTH_ALGO_SHA3_512;\n@@ -986,7 +1063,7 @@ ccp_configure_session_auth(struct ccp_session *sess,\n \t\tsess->auth.engine = CCP_ENGINE_AES;\n \t\tsess->auth.um.aes_mode = CCP_AES_MODE_CMAC;\n \t\tsess->auth.key_length = auth_xform->key.length;\n-\t\t/**<padding and hash result*/\n+\t\t/* padding and hash result */\n \t\tsess->auth.ctx_len = CCP_SB_BYTES << 1;\n \t\tsess->auth.offset = AES_BLOCK_SIZE;\n \t\tsess->auth.block_size = AES_BLOCK_SIZE;\n@@ -1182,14 +1259,22 @@ ccp_auth_slot(struct ccp_session *session)\n \t\tcount = 3;\n \t\t/**< op + lsb passthrough cpy to/from*/\n \t\tbreak;\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tcase CCP_AUTH_ALGO_MD5_HMAC:\n+\t\tbreak;\n+#endif\n \tcase CCP_AUTH_ALGO_SHA1_HMAC:\n \tcase CCP_AUTH_ALGO_SHA224_HMAC:\n \tcase CCP_AUTH_ALGO_SHA256_HMAC:\n+#ifndef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n \t\tcount = 6;\n+#endif\n \t\tbreak;\n \tcase CCP_AUTH_ALGO_SHA384_HMAC:\n \tcase CCP_AUTH_ALGO_SHA512_HMAC:\n+#ifndef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n \t\tcount = 7;\n+#endif\n \t\t/**\n \t\t * 1. Load PHash1 = H(k ^ ipad); to LSB\n \t\t * 2. generate IHash = H(hash on meassage with PHash1\n@@ -1296,6 +1381,122 @@ ccp_compute_slot_count(struct ccp_session *session)\n \treturn count;\n }\n \n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+static uint8_t\n+algo_select(int sessalgo,\n+\t    const EVP_MD **algo)\n+{\n+\tint res = 0;\n+\n+\tswitch (sessalgo) {\n+\tcase CCP_AUTH_ALGO_MD5_HMAC:\n+\t\t*algo = EVP_md5();\n+\t\tbreak;\n+\tcase CCP_AUTH_ALGO_SHA1_HMAC:\n+\t\t*algo = EVP_sha1();\n+\t\tbreak;\n+\tcase CCP_AUTH_ALGO_SHA224_HMAC:\n+\t\t*algo = EVP_sha224();\n+\t\tbreak;\n+\tcase CCP_AUTH_ALGO_SHA256_HMAC:\n+\t\t*algo = EVP_sha256();\n+\t\tbreak;\n+\tcase CCP_AUTH_ALGO_SHA384_HMAC:\n+\t\t*algo = EVP_sha384();\n+\t\tbreak;\n+\tcase CCP_AUTH_ALGO_SHA512_HMAC:\n+\t\t*algo = EVP_sha512();\n+\t\tbreak;\n+\tdefault:\n+\t\tres = -EINVAL;\n+\t\tbreak;\n+\t}\n+\treturn res;\n+}\n+\n+static int\n+process_cpu_auth_hmac(uint8_t *src, uint8_t *dst,\n+\t\t      __rte_unused uint8_t *iv,\n+\t\t      EVP_PKEY *pkey,\n+\t\t      int srclen,\n+\t\t      EVP_MD_CTX *ctx,\n+\t\t      const EVP_MD *algo,\n+\t\t      uint16_t d_len)\n+{\n+\tsize_t dstlen;\n+\tunsigned char temp_dst[64];\n+\n+\tif (EVP_DigestSignInit(ctx, NULL, algo, NULL, pkey) <= 0)\n+\t\tgoto process_auth_err;\n+\n+\tif (EVP_DigestSignUpdate(ctx, (char *)src, srclen) <= 0)\n+\t\tgoto process_auth_err;\n+\n+\tif (EVP_DigestSignFinal(ctx, temp_dst, &dstlen) <= 0)\n+\t\tgoto process_auth_err;\n+\n+\tmemcpy(dst, temp_dst, d_len);\n+\treturn 0;\n+process_auth_err:\n+\tCCP_LOG_ERR(\"Process cpu auth failed\");\n+\treturn -EINVAL;\n+}\n+\n+static int cpu_crypto_auth(struct ccp_qp *qp,\n+\t\t\t   struct rte_crypto_op *op,\n+\t\t\t   struct ccp_session *sess,\n+\t\t\t   EVP_MD_CTX *ctx)\n+{\n+\tuint8_t *src, *dst;\n+\tint srclen, status;\n+\tstruct rte_mbuf *mbuf_src, *mbuf_dst;\n+\tconst EVP_MD *algo = NULL;\n+\tEVP_PKEY *pkey;\n+\n+\talgo_select(sess->auth.algo, &algo);\n+\tpkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, sess->auth.key,\n+\t\t\t\t    sess->auth.key_length);\n+\tmbuf_src = op->sym->m_src;\n+\tmbuf_dst = op->sym->m_dst ? op->sym->m_dst : op->sym->m_src;\n+\tsrclen = op->sym->auth.data.length;\n+\tsrc = rte_pktmbuf_mtod_offset(mbuf_src, uint8_t *,\n+\t\t\t\t      op->sym->auth.data.offset);\n+\n+\tif (sess->auth.op == CCP_AUTH_OP_VERIFY) {\n+\t\tdst = qp->temp_digest;\n+\t} else {\n+\t\tdst = op->sym->auth.digest.data;\n+\t\tif (dst == NULL) {\n+\t\t\tdst = rte_pktmbuf_mtod_offset(mbuf_dst, uint8_t *,\n+\t\t\t\t\t\t     op->sym->auth.data.offset +\n+\t\t\t\t\t\t     sess->auth.digest_length);\n+\t\t}\n+\t}\n+\tstatus = process_cpu_auth_hmac(src, dst, NULL,\n+\t\t\t\t       pkey, srclen,\n+\t\t\t\t       ctx,\n+\t\t\t\t       algo,\n+\t\t\t\t       sess->auth.digest_length);\n+\tif (status) {\n+\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\treturn status;\n+\t}\n+\n+\tif (sess->auth.op == CCP_AUTH_OP_VERIFY) {\n+\t\tif (memcmp(dst, op->sym->auth.digest.data,\n+\t\t\t   sess->auth.digest_length) != 0) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_AUTH_FAILED;\n+\t\t} else {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n+\t\t}\n+\t} else {\n+\t\top->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n+\t}\n+\tEVP_PKEY_free(pkey);\n+\treturn 0;\n+}\n+#endif\n+\n static void\n ccp_perform_passthru(struct ccp_passthru *pst,\n \t\t     struct ccp_queue *cmd_q)\n@@ -2391,14 +2592,24 @@ ccp_crypto_auth(struct rte_crypto_op *op,\n \t\tresult = ccp_perform_sha(op, cmd_q);\n \t\tb_info->desccnt += 3;\n \t\tbreak;\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tcase CCP_AUTH_ALGO_MD5_HMAC:\n+\t\tbreak;\n+#endif\n \tcase CCP_AUTH_ALGO_SHA1_HMAC:\n \tcase CCP_AUTH_ALGO_SHA224_HMAC:\n \tcase CCP_AUTH_ALGO_SHA256_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tbreak;\n+#endif\n \t\tresult = ccp_perform_hmac(op, cmd_q);\n \t\tb_info->desccnt += 6;\n \t\tbreak;\n \tcase CCP_AUTH_ALGO_SHA384_HMAC:\n \tcase CCP_AUTH_ALGO_SHA512_HMAC:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\tbreak;\n+#endif\n \t\tresult = ccp_perform_hmac(op, cmd_q);\n \t\tb_info->desccnt += 7;\n \t\tbreak;\n@@ -2462,7 +2673,7 @@ ccp_crypto_aead(struct rte_crypto_op *op,\n }\n \n int\n-process_ops_to_enqueue(const struct ccp_qp *qp,\n+process_ops_to_enqueue(struct ccp_qp *qp,\n \t\t       struct rte_crypto_op **op,\n \t\t       struct ccp_queue *cmd_q,\n \t\t       uint16_t nb_ops,\n@@ -2471,11 +2682,22 @@ process_ops_to_enqueue(const struct ccp_qp *qp,\n \tint i, result = 0;\n \tstruct ccp_batch_info *b_info;\n \tstruct ccp_session *session;\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tEVP_MD_CTX *auth_ctx = NULL;\n+#endif\n \n \tif (rte_mempool_get(qp->batch_mp, (void **)&b_info)) {\n \t\tCCP_LOG_ERR(\"batch info allocation failed\");\n \t\treturn 0;\n \t}\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tauth_ctx = EVP_MD_CTX_create();\n+\tif (unlikely(!auth_ctx)) {\n+\t\tCCP_LOG_ERR(\"Unable to create auth ctx\");\n+\t\treturn 0;\n+\t}\n+\tb_info->auth_ctr = 0;\n+#endif\n \t/* populate batch info necessary for dequeue */\n \tb_info->op_idx = 0;\n \tb_info->lsb_buf_idx = 0;\n@@ -2497,6 +2719,11 @@ process_ops_to_enqueue(const struct ccp_qp *qp,\n \t\t\tbreak;\n \t\tcase CCP_CMD_AUTH:\n \t\t\tresult = ccp_crypto_auth(op[i], cmd_q, b_info);\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\t\tb_info->auth_ctr++;\n+\t\t\tresult = cpu_crypto_auth(qp, op[i],\n+\t\t\t\t\t\t session, auth_ctx);\n+#endif\n \t\t\tbreak;\n \t\tcase CCP_CMD_CIPHER_HASH:\n \t\t\tresult = ccp_crypto_cipher(op[i], cmd_q, b_info);\n@@ -2506,6 +2733,12 @@ process_ops_to_enqueue(const struct ccp_qp *qp,\n \t\t\tbreak;\n \t\tcase CCP_CMD_HASH_CIPHER:\n \t\t\tresult = ccp_crypto_auth(op[i], cmd_q, b_info);\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\t\tresult = cpu_crypto_auth(qp, op[i],\n+\t\t\t\t\t\t session, auth_ctx);\n+\t\t\tif (op[i]->status != RTE_CRYPTO_OP_STATUS_SUCCESS)\n+\t\t\t\tcontinue;\n+#endif\n \t\t\tif (result)\n \t\t\t\tbreak;\n \t\t\tresult = ccp_crypto_cipher(op[i], cmd_q, b_info);\n@@ -2539,6 +2772,9 @@ process_ops_to_enqueue(const struct ccp_qp *qp,\n \n \trte_ring_enqueue(qp->processed_pkts, (void *)b_info);\n \n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tEVP_MD_CTX_destroy(auth_ctx);\n+#endif\n \treturn i;\n }\n \n@@ -2607,13 +2843,27 @@ static inline void ccp_auth_dq_prepare(struct rte_crypto_op *op)\n }\n \n static int\n-ccp_prepare_ops(struct rte_crypto_op **op_d,\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+ccp_prepare_ops(struct ccp_qp *qp,\n+#else\n+ccp_prepare_ops(struct ccp_qp *qp __rte_unused,\n+#endif\n+\t\tstruct rte_crypto_op **op_d,\n \t\tstruct ccp_batch_info *b_info,\n \t\tuint16_t nb_ops)\n {\n \tint i, min_ops;\n \tstruct ccp_session *session;\n \n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tEVP_MD_CTX *auth_ctx = NULL;\n+\n+\tauth_ctx = EVP_MD_CTX_create();\n+\tif (unlikely(!auth_ctx)) {\n+\t\tCCP_LOG_ERR(\"Unable to create auth ctx\");\n+\t\treturn 0;\n+\t}\n+#endif\n \tmin_ops = RTE_MIN(nb_ops, b_info->opcnt);\n \n \tfor (i = 0; i < min_ops; i++) {\n@@ -2626,8 +2876,25 @@ ccp_prepare_ops(struct rte_crypto_op **op_d,\n \t\t\top_d[i]->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n \t\t\tbreak;\n \t\tcase CCP_CMD_AUTH:\n+#ifndef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\t\tccp_auth_dq_prepare(op_d[i]);\n+#endif\n+\t\t\tbreak;\n \t\tcase CCP_CMD_CIPHER_HASH:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\t\tcpu_crypto_auth(qp, op_d[i],\n+\t\t\t\t\tsession, auth_ctx);\n+#else\n+\t\t\tccp_auth_dq_prepare(op_d[i]);\n+#endif\n+\t\t\tbreak;\n \t\tcase CCP_CMD_HASH_CIPHER:\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t\t\top_d[i]->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n+#else\n+\t\t\tccp_auth_dq_prepare(op_d[i]);\n+#endif\n+\t\t\tbreak;\n \t\tcase CCP_CMD_COMBINED:\n \t\t\tccp_auth_dq_prepare(op_d[i]);\n \t\t\tbreak;\n@@ -2636,6 +2903,9 @@ ccp_prepare_ops(struct rte_crypto_op **op_d,\n \t\t}\n \t}\n \n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tEVP_MD_CTX_destroy(auth_ctx);\n+#endif\n \tb_info->opcnt -= min_ops;\n \treturn min_ops;\n }\n@@ -2655,6 +2925,10 @@ process_ops_to_dequeue(struct ccp_qp *qp,\n \t} else if (rte_ring_dequeue(qp->processed_pkts,\n \t\t\t\t    (void **)&b_info))\n \t\treturn 0;\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tif (b_info->auth_ctr == b_info->opcnt)\n+\t\tgoto success;\n+#endif\n \tcur_head_offset = CCP_READ_REG(b_info->cmd_q->reg_base,\n \t\t\t\t       CMD_Q_HEAD_LO_BASE);\n \n@@ -2674,7 +2948,7 @@ process_ops_to_dequeue(struct ccp_qp *qp,\n \n \n success:\n-\tnb_ops = ccp_prepare_ops(op, b_info, nb_ops);\n+\tnb_ops = ccp_prepare_ops(qp, op, b_info, nb_ops);\n \trte_atomic64_add(&b_info->cmd_q->free_slots, b_info->desccnt);\n \tb_info->desccnt = 0;\n \tif (b_info->opcnt > 0) {\ndiff --git a/drivers/crypto/ccp/ccp_crypto.h b/drivers/crypto/ccp/ccp_crypto.h\nindex 23b0486..dd89ad9 100644\n--- a/drivers/crypto/ccp/ccp_crypto.h\n+++ b/drivers/crypto/ccp/ccp_crypto.h\n@@ -68,6 +68,9 @@\n #define SHA512_BLOCK_SIZE       128\n #define SHA3_512_BLOCK_SIZE     72\n \n+/* Maximum length for digest */\n+#define DIGEST_LENGTH_MAX\t64\n+\n /* SHA LSB intialiazation values */\n \n #define SHA1_H0\t\t0x67452301UL\n@@ -346,7 +349,7 @@ int ccp_compute_slot_count(struct ccp_session *session);\n  * @param nb_ops No. of ops to be submitted\n  * @return 0 on success otherwise -1\n  */\n-int process_ops_to_enqueue(const struct ccp_qp *qp,\n+int process_ops_to_enqueue(struct ccp_qp *qp,\n \t\t\t   struct rte_crypto_op **op,\n \t\t\t   struct ccp_queue *cmd_q,\n \t\t\t   uint16_t nb_ops,\ndiff --git a/drivers/crypto/ccp/ccp_pmd_ops.c b/drivers/crypto/ccp/ccp_pmd_ops.c\nindex 24ad961..3d0d875 100644\n--- a/drivers/crypto/ccp/ccp_pmd_ops.c\n+++ b/drivers/crypto/ccp/ccp_pmd_ops.c\n@@ -13,6 +13,29 @@\n #include \"ccp_crypto.h\"\n \n static const struct rte_cryptodev_capabilities ccp_pmd_capabilities[] = {\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\t{\t/* MD5 HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t .algo = RTE_CRYPTO_AUTH_MD5_HMAC,\n+\t\t\t\t .block_size = 64,\n+\t\t\t\t .key_size = {\n+\t\t\t\t\t .min = 1,\n+\t\t\t\t\t .max = 64,\n+\t\t\t\t\t .increment = 1\n+\t\t\t\t },\n+\t\t\t\t .digest_size = {\n+\t\t\t\t\t .min = 16,\n+\t\t\t\t\t .max = 16,\n+\t\t\t\t\t .increment = 0\n+\t\t\t\t },\n+\t\t\t\t .aad_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+#endif\n \t{\t/* SHA1 */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\ndiff --git a/drivers/crypto/ccp/ccp_pmd_private.h b/drivers/crypto/ccp/ccp_pmd_private.h\nindex 47c4fb2..560bed9 100644\n--- a/drivers/crypto/ccp/ccp_pmd_private.h\n+++ b/drivers/crypto/ccp/ccp_pmd_private.h\n@@ -6,6 +6,7 @@\n #define _CCP_PMD_PRIVATE_H_\n \n #include <rte_cryptodev.h>\n+#include \"ccp_crypto.h\"\n \n #define CRYPTODEV_NAME_CCP_PMD crypto_ccp\n \n@@ -61,6 +62,10 @@ struct ccp_batch_info {\n \tphys_addr_t lsb_buf_phys;\n \t/**< LSB intermediate buf for passthru */\n \tint lsb_buf_idx;\n+#ifdef RTE_LIBRTE_PMD_CCP_CPU_AUTH\n+\tuint16_t auth_ctr;\n+\t/**< auth only ops batch */\n+#endif\n } __rte_cache_aligned;\n \n /**< CCP crypto queue pair */\n@@ -81,6 +86,11 @@ struct ccp_qp {\n \t/**< Store ops pulled out of queue */\n \tstruct rte_cryptodev *dev;\n \t/**< rte crypto device to which this qp belongs */\n+\tuint8_t temp_digest[DIGEST_LENGTH_MAX];\n+\t/**< Buffer used to store the digest generated\n+\t * by the driver when verifying a digest provided\n+\t * by the user (using authentication verify operation)\n+\t */\n } __rte_cache_aligned;\n \n \n",
    "prefixes": [
        "dpdk-dev",
        "v5",
        "17/19"
    ]
}