get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/48786/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 48786,
    "url": "https://patches.dpdk.org/api/patches/48786/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20181213151817.27478-1-roy.fan.zhang@intel.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20181213151817.27478-1-roy.fan.zhang@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20181213151817.27478-1-roy.fan.zhang@intel.com",
    "date": "2018-12-13T15:18:17",
    "name": "[v2] crypto/aesni_mb: add plain sha support",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "b73c34be6dfcbf2b72c3ef3fa51ed98d9b12ee33",
    "submitter": {
        "id": 304,
        "url": "https://patches.dpdk.org/api/people/304/?format=api",
        "name": "Fan Zhang",
        "email": "roy.fan.zhang@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20181213151817.27478-1-roy.fan.zhang@intel.com/mbox/",
    "series": [
        {
            "id": 2764,
            "url": "https://patches.dpdk.org/api/series/2764/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=2764",
            "date": "2018-12-13T15:18:17",
            "name": "[v2] crypto/aesni_mb: add plain sha support",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/2764/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/48786/comments/",
    "check": "warning",
    "checks": "https://patches.dpdk.org/api/patches/48786/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 49D081B55D;\n\tThu, 13 Dec 2018 16:18:22 +0100 (CET)",
            "from mga03.intel.com (mga03.intel.com [134.134.136.65])\n\tby dpdk.org (Postfix) with ESMTP id B1B254CE4\n\tfor <dev@dpdk.org>; Thu, 13 Dec 2018 16:18:20 +0100 (CET)",
            "from fmsmga004.fm.intel.com ([10.253.24.48])\n\tby orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t13 Dec 2018 07:18:19 -0800",
            "from silpixa00398673.ir.intel.com (HELO\n\tsilpixa00398673.ger.corp.intel.com) ([10.237.223.54])\n\tby fmsmga004.fm.intel.com with ESMTP; 13 Dec 2018 07:18:18 -0800"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.56,349,1539673200\"; d=\"scan'208\";a=\"127601641\"",
        "From": "Fan Zhang <roy.fan.zhang@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "akhil.goyal@nxp.com, Damian Nowak <damianx.nowak@intel.com>,\n\tLukasz Krakowiak <lukaszx.krakowiak@intel.com>",
        "Date": "Thu, 13 Dec 2018 15:18:17 +0000",
        "Message-Id": "<20181213151817.27478-1-roy.fan.zhang@intel.com>",
        "X-Mailer": "git-send-email 2.13.6",
        "In-Reply-To": "<20181115172439.67683-1-roy.fan.zhang@intel.com>",
        "References": "<20181115172439.67683-1-roy.fan.zhang@intel.com>",
        "Subject": "[dpdk-dev] [PATCH v2] crypto/aesni_mb: add plain sha support",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Damian Nowak <damianx.nowak@intel.com>\n\nThis patch adds the plain SHAx algorithm support to AESNI-MB PMD.\n\nThis patch depends on the following patch:\n\"crypto/aesni_mb: use architure independent marcos\"\n(http://patchwork.dpdk.org/patch/48633/\").\n\nSigned-off-by: Damian Nowak <damianx.nowak@intel.com>\nSigned-off-by: Lukasz Krakowiak <lukaszx.krakowiak@intel.com>\nAcked-by: Fan Zhang <roy.fan.zhang@intel.com>\n---\n doc/guides/cryptodevs/aesni_mb.rst                 |   5 +\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd_next.c    |  25 +++++\n .../crypto/aesni_mb/rte_aesni_mb_pmd_ops_next.c    | 105 +++++++++++++++++++++\n drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h |   5 +\n test/test/test_cryptodev_blockcipher.c             |  13 ++-\n test/test/test_cryptodev_hash_test_vectors.h       |  10 ++\n 6 files changed, 162 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst\nindex 63e060d75..aa067152a 100644\n--- a/doc/guides/cryptodevs/aesni_mb.rst\n+++ b/doc/guides/cryptodevs/aesni_mb.rst\n@@ -40,6 +40,11 @@ Hash algorithms:\n * RTE_CRYPTO_HASH_SHA512_HMAC\n * RTE_CRYPTO_HASH_AES_XCBC_HMAC\n * RTE_CRYPTO_HASH_AES_CMAC\n+* RTE_CRYPTO_HASH_SHA1\n+* RTE_CRYPTO_HASH_SHA224\n+* RTE_CRYPTO_HASH_SHA256\n+* RTE_CRYPTO_HASH_SHA384\n+* RTE_CRYPTO_HASH_SHA512\n \n AEAD algorithms:\n \ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_next.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_next.c\nindex 2c25b7b32..c794652ce 100755\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_next.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_next.c\n@@ -107,6 +107,7 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \thash_one_block_t hash_oneblock_fn;\n \tunsigned int key_larger_block_size = 0;\n \tuint8_t hashed_key[HMAC_MAX_BLOCK_SIZE] = { 0 };\n+\tuint32_t auth_precompute = 1;\n \n \tif (xform == NULL) {\n \t\tsess->auth.algo = NULL_HASH;\n@@ -189,6 +190,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \t\t\tkey_larger_block_size = 1;\n \t\t}\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tsess->auth.algo = PLAIN_SHA1;\n+\t\tauth_precompute = 0;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n \t\tsess->auth.algo = SHA_224;\n \t\thash_oneblock_fn = mb_mgr->sha224_one_block;\n@@ -200,6 +205,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \t\t\tkey_larger_block_size = 1;\n \t\t}\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tsess->auth.algo = PLAIN_SHA_224;\n+\t\tauth_precompute = 0;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n \t\tsess->auth.algo = SHA_256;\n \t\thash_oneblock_fn = mb_mgr->sha256_one_block;\n@@ -211,6 +220,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \t\t\tkey_larger_block_size = 1;\n \t\t}\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tsess->auth.algo = PLAIN_SHA_256;\n+\t\tauth_precompute = 0;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n \t\tsess->auth.algo = SHA_384;\n \t\thash_oneblock_fn = mb_mgr->sha384_one_block;\n@@ -222,6 +235,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \t\t\tkey_larger_block_size = 1;\n \t\t}\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tsess->auth.algo = PLAIN_SHA_384;\n+\t\tauth_precompute = 0;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n \t\tsess->auth.algo = SHA_512;\n \t\thash_oneblock_fn = mb_mgr->sha512_one_block;\n@@ -233,6 +250,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \t\t\tkey_larger_block_size = 1;\n \t\t}\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tsess->auth.algo = PLAIN_SHA_512;\n+\t\tauth_precompute = 0;\n+\t\tbreak;\n \tdefault:\n \t\tAESNI_MB_LOG(ERR, \"Unsupported authentication algorithm selection\");\n \t\treturn -ENOTSUP;\n@@ -254,6 +275,10 @@ aesni_mb_set_session_auth_parameters(const MB_MGR *mb_mgr,\n \telse\n \t\tsess->auth.gen_digest_len = sess->auth.req_digest_len;\n \n+\t/* Plain SHA does not require precompute key */\n+\tif (auth_precompute == 0)\n+\t\treturn 0;\n+\n \t/* Calculate Authentication precomputes */\n \tif (key_larger_block_size) {\n \t\tcalculate_auth_precomputes(hash_oneblock_fn,\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops_next.c b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops_next.c\nindex 5788e37d1..c57065d0f 100755\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops_next.c\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops_next.c\n@@ -54,6 +54,27 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA1 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA224 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -75,6 +96,27 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA224 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA256 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -96,6 +138,27 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA256 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA384 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -117,6 +180,27 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA384 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA512 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -138,6 +222,27 @@ static const struct rte_cryptodev_capabilities aesni_mb_pmd_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA512  */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* AES XCBC HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\ndiff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\nindex 34dd43095..6f4f5eeea 100644\n--- a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\n+++ b/drivers/crypto/aesni_mb/rte_aesni_mb_pmd_private.h\n@@ -109,6 +109,11 @@ static const unsigned auth_digest_byte_lengths[] = {\n \t\t[AES_CMAC]\t= 16,\n \t\t[AES_GMAC]\t= 12,\n \t\t[NULL_HASH]\t= 0,\n+\t\t[PLAIN_SHA1] \t= 20,\n+\t\t[PLAIN_SHA_224] = 28,\n+\t\t[PLAIN_SHA_256] = 32,\n+\t\t[PLAIN_SHA_384] = 48,\n+\t\t[PLAIN_SHA_512] = 64\n \t/**< Vector mode dependent pointer table of the multi-buffer APIs */\n \n };\ndiff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c\nindex 1c3f29f6b..467957bab 100644\n--- a/test/test/test_cryptodev_blockcipher.c\n+++ b/test/test/test_cryptodev_blockcipher.c\n@@ -124,7 +124,18 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t,\n \t\tdigest_len = tdata->digest.len;\n \t} else if (driver_id == aesni_mb_pmd ||\n \t\t\tdriver_id == scheduler_pmd) {\n-\t\tdigest_len = tdata->digest.truncated_len;\n+\t\tswitch (tdata->auth_algo) {\n+\t\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\t\tdigest_len = tdata->digest.len;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\tdigest_len = tdata->digest.truncated_len;\n+\t\t\tbreak;\n+\t\t}\n \t} else {\n \t\tsnprintf(test_msg, BLOCKCIPHER_TEST_MSG_LEN,\n \t\t\t\"line %u FAILED: %s\",\ndiff --git a/test/test/test_cryptodev_hash_test_vectors.h b/test/test/test_cryptodev_hash_test_vectors.h\nindex a02dfb3c3..e6e4bd8bb 100644\n--- a/test/test/test_cryptodev_hash_test_vectors.h\n+++ b/test/test/test_cryptodev_hash_test_vectors.h\n@@ -417,6 +417,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha1_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -426,6 +427,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha1_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -485,6 +487,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha224_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -494,6 +497,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha224_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -531,6 +535,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha256_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -540,6 +545,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha256_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -579,6 +585,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha384_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -588,6 +595,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha384_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -627,6 +635,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha512_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n@@ -636,6 +645,7 @@ static const struct blockcipher_test_case hash_test_cases[] = {\n \t\t.test_data = &sha512_test_vector,\n \t\t.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,\n \t\t.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |\n+\t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MB |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_CCP |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_MVSAM |\n \t\t\t    BLOCKCIPHER_TEST_TARGET_PMD_OCTEONTX\n",
    "prefixes": [
        "v2"
    ]
}