get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/96838/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 96838,
    "url": "https://patches.dpdk.org/api/patches/96838/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210812071244.28799-17-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210812071244.28799-17-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210812071244.28799-17-hemant.agrawal@nxp.com",
    "date": "2021-08-12T07:12:44",
    "name": "[RFC,16/16] test/crypto: enabling raw API support in 5G algos",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "e82ddc144f856106f8b0e13af6f30058f9a6b84c",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210812071244.28799-17-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18259,
            "url": "https://patches.dpdk.org/api/series/18259/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18259",
            "date": "2021-08-12T07:12:28",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/18259/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/96838/comments/",
    "check": "fail",
    "checks": "https://patches.dpdk.org/api/patches/96838/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 9D7B2A0C52;\n\tThu, 12 Aug 2021 09:18:05 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id B762941272;\n\tThu, 12 Aug 2021 09:16:34 +0200 (CEST)",
            "from EUR02-VE1-obe.outbound.protection.outlook.com\n (mail-eopbgr20070.outbound.protection.outlook.com [40.107.2.70])\n by mails.dpdk.org (Postfix) with ESMTP id 721444126A\n for <dev@dpdk.org>; Thu, 12 Aug 2021 09:16:33 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DB9PR04MB8461.eurprd04.prod.outlook.com (2603:10a6:10:2bc::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.13; Thu, 12 Aug\n 2021 07:16:32 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793%9]) with mapi id 15.20.4415.016; Thu, 12 Aug 2021\n 07:16:32 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR02CA0105.apcprd02.prod.outlook.com (2603:1096:4:92::21) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4415.14 via Frontend Transport; Thu, 12 Aug 2021 07:16:31 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=jAprVlF/DZyfSbj6T4vOleqePNpgGXYXnFNevqxgU1AkLssj2vg6uK0ql/tHJq1HXFmrHi7S5TIY/VSi9YV/vcylVlpKe4YLs4ByKdGLdWQwExu/WyHUuinOREHBoVBK4A0j8cD2In1y5RLGuodfOnzWkV7J0/lOFTEJR3M7Dy29avJ/Dz0pS9tBJHylp/oh6RwuF9K9dinyEWywaNa+pSxcIkuzm8ju5kDOTs+e4mkfe+86RMopWgEd+QXCq+Ol8S/+b41ihMIX5ruVNMcNZyEztA+/Rj9flny2T0gDQPsY4lpIsW/PANK4dWjez04NgmCIV8JmfXjM3tc+bYXQrQ==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Ja32qw5ZGijgE/hddaC442uYcjv1gYi0TKk1x3fzxEA=;\n b=DCVVgi6Qe2Fp4Pcr6tyEiOs/VwbpfxhOubi6+TBYEJSdhq0jirtwEABW+EYQ3uQLMl9chNmj9BopsNs1y/LvpKJFdmPL6hRqWpgQcpfS6SHkMGG5Zz8xkild0Yq76oHbeJi60ik7cZhnJxi/0WyGb6E+i92JWzUJ8V/MtRIWlBC61lz8Na5TwfzCbLJmxNI7gVMGC77khV3P6Fy0+LPcK8rQ9L5kxe3vXTPImcmYxELyQj9ymHF2L371yuYGfOfodhsrJGS6mQVLQ+e7w7eMNzFslusyK+UcCfUQBmFLfkFQpEWsrcV8heb3vhBFigVEdDPu8XX8G0O2wjuque7+1w==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Ja32qw5ZGijgE/hddaC442uYcjv1gYi0TKk1x3fzxEA=;\n b=pEQJccR46Swv2qnSyOuiRBPP6QkQx4JS6VTOAiNHz3eAABMcQCvnoAMn/r7T14XRUng/oty1Qr8m7DTDJ4EDQ8+IUQ594+J+FQRs5fdrxujZYsLO7bP6nUziQs7FF6kPf7eV5CwrklxCse+3WndcIjfqDhZ3PvvBrBbwaDE8v2A=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Thu, 12 Aug 2021 12:42:44 +0530",
        "Message-Id": "<20210812071244.28799-17-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "References": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR02CA0105.apcprd02.prod.outlook.com\n (2603:1096:4:92::21) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "f0f1ec0a-a633-4106-ddcd-08d95d611ccb",
        "X-MS-TrafficTypeDiagnostic": "DB9PR04MB8461:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DB9PR04MB8461ACC5304AB5207B10872889F99@DB9PR04MB8461.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:5516;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n GIAYCxQ5XLInrA6Uc3Zr6cIaBpFsVX50E6nv1U/hSEEqf0wR9hkyszGppNlTVq+ZO7Heg8jx5wiPaE3ALBwShbPjpEzM4g5jhNZZw/xzV64z3iJukx/CpY6yncIbqPfykNvLwH/VdEyI/mcjM2Q9jkcZ9ClGb+eu+KlILItJWOLggk02FEuH/6xnjWUxD3PcwnnXIMiR0X7+HXJYtBKEVVRzPrPdDO1IZhGRfLWoe2NvUrTmT2+lfnKLWH1QI0M1tk8FxfHua9OcHbgykG9Odfmep2O2Tygfir3xvZtujtwF4ua67kxACY3tFcDPY+n/qz7/hOz1e5qAKKlC2hVfULDjLKDghtJfYPujxHe43lcEGk5e7/G3sDymzKKdTDmadZZUd6x2ctAReyEkS+zP3iQ4JfO37GEIXZ/TGcYSFDtZfRvu0iwVDljcr/kZxBHZDevzLjWi6d6wiSPyQlQ2TFvQG0zoP9Oq4wCh6sPku7NomHxa59+OG2sq6pjj7mfyOyu0mm08MZqrfGsqVvxOjKbhXW5Xt4gP7yh5qJyjchWmcmlyT2MNSrhiKADMxZJiiLqjCrosfANdn2RLSwsiJzdaeYRo9JmjIcQTt9q0vutf5eFLwf8VJatfByqPDJk6T/DSR3OABhRj3+LoBErGQGVc901MW5l+rzRzmfysgtk+ForPCV+GpgdRMc5to2xWJO3TsYuXRoNx0oM3qnFZTw==",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(376002)(346002)(39860400002)(396003)(136003)(366004)(8936002)(956004)(6512007)(2616005)(2906002)(6666004)(36756003)(86362001)(4326008)(83380400001)(38350700002)(44832011)(478600001)(26005)(6506007)(66476007)(186003)(52116002)(5660300002)(1076003)(66556008)(6486002)(38100700002)(8676002)(66946007)(316002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n f0f1ec0a-a633-4106-ddcd-08d95d611ccb",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "12 Aug 2021 07:16:32.7771 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n TfWdM2pD+HsvfoofvwneH/KflxhknODJG75idP0lR9fUx7HWd92bKN8a/X4Fr6Cl8X8f7h2Mg5shhLD+aC3+Aw==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DB9PR04MB8461",
        "Subject": "[dpdk-dev] [RFC 16/16] test/crypto: enabling raw API support in 5G\n algos",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support for RAW API testing with ZUC\nand SNOW test cases.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n app/test/test_cryptodev.c | 57 ++++++++++++++++++++++++++++++++++-----\n 1 file changed, 51 insertions(+), 6 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex 59bed6e6d2..ab3394bb09 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -368,6 +368,7 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t}\n \n \top->status = (count == MAX_RAW_DEQUEUE_COUNT + 1 || ret_op != op ||\n+\t\t\tret_op->status == RTE_CRYPTO_OP_STATUS_ERROR ||\n \t\t\tn_success < 1) ? RTE_CRYPTO_OP_STATUS_ERROR :\n \t\t\t\t\tRTE_CRYPTO_OP_STATUS_SUCCESS;\n \n@@ -4152,6 +4153,16 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata)\n \tint retval;\n \tunsigned plaintext_pad_len;\n \tunsigned plaintext_len;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n+\n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -4207,7 +4218,11 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n+\telse\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n \n@@ -4267,6 +4282,12 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata)\n \t\treturn TEST_SKIPPED;\n \t}\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n+\n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n \t\t\t\t\tRTE_CRYPTO_CIPHER_OP_ENCRYPT,\n@@ -4301,7 +4322,11 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n+\telse\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n \n@@ -4428,7 +4453,11 @@ test_snow3g_encryption_offset_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n+\telse\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n \n@@ -4559,7 +4588,16 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata)\n \tuint8_t *plaintext, *ciphertext;\n \tunsigned ciphertext_pad_len;\n \tunsigned ciphertext_len;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n@@ -4617,7 +4655,11 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n+\telse\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n \tut_params->obuf = ut_params->op->sym->m_dst;\n@@ -12653,10 +12695,13 @@ test_authenticated_decryption_fail_when_corruption(\n \telse {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\t\tTEST_ASSERT_NULL(ut_params->op, \"authentication not failed\");\n \t}\n+\tif (ut_params->op == NULL)\n+\t\treturn 0;\n+\telse if (ut_params->op->status != RTE_CRYPTO_OP_STATUS_SUCCESS)\n+\t\treturn 0;\n \n-\treturn 0;\n+\treturn -1;\n }\n \n static int\n",
    "prefixes": [
        "RFC",
        "16/16"
    ]
}