get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/97306/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 97306,
    "url": "https://patches.dpdk.org/api/patches/97306/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210825071510.7913-14-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210825071510.7913-14-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210825071510.7913-14-hemant.agrawal@nxp.com",
    "date": "2021-08-25T07:15:08",
    "name": "[13/15] crypto/dpaa_sec: support AEAD and proto with raw APIs",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "e90a3751c01219146ad0e4d903638a43d018a914",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210825071510.7913-14-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18444,
            "url": "https://patches.dpdk.org/api/series/18444/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18444",
            "date": "2021-08-25T07:14:55",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/18444/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/97306/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/97306/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 11166A0C53;\n\tWed, 25 Aug 2021 09:20:14 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id E3E86411E0;\n\tWed, 25 Aug 2021 09:19:19 +0200 (CEST)",
            "from EUR02-AM5-obe.outbound.protection.outlook.com\n (mail-eopbgr00072.outbound.protection.outlook.com [40.107.0.72])\n by mails.dpdk.org (Postfix) with ESMTP id F416740140\n for <dev@dpdk.org>; Wed, 25 Aug 2021 09:19:15 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8872.eurprd04.prod.outlook.com (2603:10a6:10:2e3::12)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19; Wed, 25 Aug\n 2021 07:19:15 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793%8]) with mapi id 15.20.4436.025; Wed, 25 Aug 2021\n 07:19:15 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR01CA0126.apcprd01.prod.exchangelabs.com (2603:1096:4:40::30) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4436.19 via Frontend\n Transport; Wed, 25 Aug 2021 07:19:13 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=RgRXymcS+B5C5DfqQGoiXX+bih50o5+HkuTzId28NBv0GS41cOr3RylCRJbiWFm9w9jBIZ8ufgzvApsPdQf0bjFpQnLQUcnfyHMAnIFU9KTljj+n+6vfUNjFYhQghmB2NFrRaXgP7AD67FSZKjvOgnVn3J9Ld5MGIem3s34r72617quvxp3T05j/rzn+nhWLeFkBOijiCXzOzm42Oe43EbNiCcwITYkVzzkXpVf4O62/Wn2l2fDe2gSJ/DUGqSoBIquhWyFVhSRaQZv5c/HrimtCFkT9rVn5ZfxQKaGaLJfjCvVzyVjvyzY4FT+2wjFjrYEnsPYYTf0hHKFi2lDoUA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=A8iJ+j/S+ByMy8rnX+hRPOi36XD4kCFUOgoetceQrj8=;\n b=GR5Nvn5+p3rppCv0ov0xhlZwrIlL1dkDuX9szJgKMROcTgUzlmwbFXXqo5M+325m7B6Uw6U8KvYq+lKXTHjeFcP7tp9HokdOg2hELKYxbYoIFK7MHvWczO9WcN5mZyvAz1bFC81uqDzX371yZKEAJzYSt1kRgXxThlaAVb9sefxwomyBpePS4Y8oAUSLhNYw5p78GDZn3ZRcsiyFwFhyyodg59j8lM9JsWrb3j6Fn71Ack+ZENWvD4u7pT8itc0E9PNYHE+GBar3xiaQNY/yu8/PHuFfNrXxYARqisn83k2Bdm93yQtYfQcOvl787wmMfHo31Zy+wCm4seSjOvvhnA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=A8iJ+j/S+ByMy8rnX+hRPOi36XD4kCFUOgoetceQrj8=;\n b=kY62+08qDt/YaZq3KS+h0YYK9maAvkdsNTkhs5LMmBGclcWMv3qRu/qoKA+3jBDyE9+itARZr9E0yoLGShx4xia/Hd7RWvFG3sPh2T4IUjEZa4P5Et55VGrlWp9oz4aAAUrAYEFcyDj34GnbSfJwPcgbC6jZqoJ7QDWUcoYzsNs=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "konstantin.ananyev@intel.com, roy.fan.zhang@intel.com,\n Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Wed, 25 Aug 2021 12:45:08 +0530",
        "Message-Id": "<20210825071510.7913-14-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210825071510.7913-1-hemant.agrawal@nxp.com>",
        "References": "<20210812071244.28799-1-hemant.agrawal@nxp.com>\n <20210825071510.7913-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR01CA0126.apcprd01.prod.exchangelabs.com\n (2603:1096:4:40::30) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "197ebe44-e411-440f-68f6-08d96798a4da",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8872:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB887261654751E7D2C735A23089C69@DU2PR04MB8872.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:169;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(346002)(136003)(366004)(39860400002)(376002)(396003)(26005)(1076003)(478600001)(8936002)(38350700002)(38100700002)(5660300002)(316002)(8676002)(6666004)(2906002)(6486002)(956004)(83380400001)(186003)(52116002)(2616005)(86362001)(6512007)(4326008)(36756003)(6506007)(66946007)(44832011)(66476007)(66556008);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 197ebe44-e411-440f-68f6-08d96798a4da",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "25 Aug 2021 07:19:15.0059 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n FwkA5kr10I+CD0nXP9BxgRN6s9L7DQSMCI7WrP9SZBJ8OZMMkXEEg+3ZbM97HPui4kd8KNB0QL30KV6m4ykNIg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8872",
        "Subject": "[dpdk-dev] [PATCH 13/15] crypto/dpaa_sec: support AEAD and proto\n with raw APIs",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nThis add support for AEAD and proto offload with raw APIs\nfor dpaa_sec driver.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 293 ++++++++++++++++++++++\n 1 file changed, 293 insertions(+)",
    "diff": "diff --git a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\nindex 4e34629f18..b0c22a7c26 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\n@@ -218,6 +218,163 @@ build_dpaa_raw_dp_auth_fd(uint8_t *drv_ctx,\n \treturn cf;\n }\n \n+static inline struct dpaa_sec_job *\n+build_raw_cipher_auth_gcm_sg(uint8_t *drv_ctx,\n+\t\t\tstruct rte_crypto_sgl *sgl,\n+\t\t\tstruct rte_crypto_sgl *dest_sgl,\n+\t\t\tstruct rte_crypto_va_iova_ptr *iv,\n+\t\t\tstruct rte_crypto_va_iova_ptr *digest,\n+\t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n+\t\t\tunion rte_crypto_sym_ofs ofs,\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd)\n+{\n+\tdpaa_sec_session *ses =\n+\t\t((struct dpaa_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct dpaa_sec_job *cf;\n+\tstruct dpaa_sec_op_ctx *ctx;\n+\tstruct qm_sg_entry *sg, *out_sg, *in_sg;\n+\tuint8_t extra_req_segs;\n+\tuint8_t *IV_ptr = iv->va;\n+\tint data_len = 0, aead_len = 0;\n+\tunsigned int i;\n+\n+\tfor (i = 0; i < sgl->num; i++)\n+\t\tdata_len += sgl->vec[i].len;\n+\n+\textra_req_segs = 4;\n+\taead_len = data_len - ofs.ofs.cipher.head - ofs.ofs.cipher.tail;\n+\n+\tif (ses->auth_only_len)\n+\t\textra_req_segs++;\n+\n+\tif (sgl->num > MAX_SG_ENTRIES) {\n+\t\tDPAA_SEC_DP_ERR(\"AEAD: Max sec segs supported is %d\",\n+\t\t\t\tMAX_SG_ENTRIES);\n+\t\treturn NULL;\n+\t}\n+\n+\tctx = dpaa_sec_alloc_raw_ctx(ses,  sgl->num * 2 + extra_req_segs);\n+\tif (!ctx)\n+\t\treturn NULL;\n+\n+\tcf = &ctx->job;\n+\tctx->userdata = (void *)userdata;\n+\n+\trte_prefetch0(cf->sg);\n+\n+\t/* output */\n+\tout_sg = &cf->sg[0];\n+\tout_sg->extension = 1;\n+\tif (is_encode(ses))\n+\t\tout_sg->length = aead_len + ses->digest_length;\n+\telse\n+\t\tout_sg->length = aead_len;\n+\n+\t/* output sg entries */\n+\tsg = &cf->sg[2];\n+\tqm_sg_entry_set64(out_sg, rte_dpaa_mem_vtop(sg));\n+\tcpu_to_hw_sg(out_sg);\n+\n+\tif (dest_sgl) {\n+\t\t/* 1st seg */\n+\t\tqm_sg_entry_set64(sg, dest_sgl->vec[0].iova);\n+\t\tsg->length = dest_sgl->vec[0].len - ofs.ofs.cipher.head;\n+\t\tsg->offset = ofs.ofs.cipher.head;\n+\n+\t\t/* Successive segs */\n+\t\tfor (i = 1; i < dest_sgl->num; i++) {\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, dest_sgl->vec[i].iova);\n+\t\t\tsg->length = dest_sgl->vec[i].len;\n+\t\t}\n+\t} else {\n+\t\t/* 1st seg */\n+\t\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\t\tsg->length = sgl->vec[0].len - ofs.ofs.cipher.head;\n+\t\tsg->offset = ofs.ofs.cipher.head;\n+\n+\t\t/* Successive segs */\n+\t\tfor (i = 1; i < sgl->num; i++) {\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\t\tsg->length = sgl->vec[i].len;\n+\t\t}\n+\n+\t}\n+\n+\tif (is_encode(ses)) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\t/* set auth output */\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, digest->iova);\n+\t\tsg->length = ses->digest_length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\t/* input */\n+\tin_sg = &cf->sg[1];\n+\tin_sg->extension = 1;\n+\tin_sg->final = 1;\n+\tif (is_encode(ses))\n+\t\tin_sg->length = ses->iv.length + aead_len\n+\t\t\t\t\t\t+ ses->auth_only_len;\n+\telse\n+\t\tin_sg->length = ses->iv.length + aead_len\n+\t\t\t\t+ ses->auth_only_len + ses->digest_length;\n+\n+\t/* input sg entries */\n+\tsg++;\n+\tqm_sg_entry_set64(in_sg, rte_dpaa_mem_vtop(sg));\n+\tcpu_to_hw_sg(in_sg);\n+\n+\t/* 1st seg IV */\n+\tqm_sg_entry_set64(sg, rte_dpaa_mem_vtop(IV_ptr));\n+\tsg->length = ses->iv.length;\n+\tcpu_to_hw_sg(sg);\n+\n+\t/* 2 seg auth only */\n+\tif (ses->auth_only_len) {\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, auth_iv->iova);\n+\t\tsg->length = ses->auth_only_len;\n+\t\tcpu_to_hw_sg(sg);\n+\t}\n+\n+\t/* 3rd seg */\n+\tsg++;\n+\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\tsg->length = sgl->vec[0].len - ofs.ofs.cipher.head;\n+\tsg->offset = ofs.ofs.cipher.head;\n+\n+\t/* Successive segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\tsg->length =  sgl->vec[i].len;\n+\t}\n+\n+\tif (is_decode(ses)) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\tmemcpy(ctx->digest, digest->va,\n+\t\t\tses->digest_length);\n+\t\tqm_sg_entry_set64(sg, rte_dpaa_mem_vtop(ctx->digest));\n+\t\tsg->length = ses->digest_length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\tif (ses->auth_only_len)\n+\t\tfd->cmd = 0x80000000 | ses->auth_only_len;\n+\n+\treturn cf;\n+}\n+\n static inline struct dpaa_sec_job *\n build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx,\n \t\t\tstruct rte_crypto_sgl *sgl,\n@@ -484,6 +641,135 @@ build_dpaa_raw_dp_cipher_fd(uint8_t *drv_ctx,\n \treturn cf;\n }\n \n+#ifdef RTE_LIBRTE_SECURITY\n+static inline struct dpaa_sec_job *\n+build_dpaa_raw_proto_sg(uint8_t *drv_ctx,\n+\t\t\tstruct rte_crypto_sgl *sgl,\n+\t\t\tstruct rte_crypto_sgl *dest_sgl,\n+\t\t\tstruct rte_crypto_va_iova_ptr *iv,\n+\t\t\tstruct rte_crypto_va_iova_ptr *digest,\n+\t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n+\t\t\tunion rte_crypto_sym_ofs ofs,\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd)\n+{\n+\tRTE_SET_USED(iv);\n+\tRTE_SET_USED(digest);\n+\tRTE_SET_USED(auth_iv);\n+\tRTE_SET_USED(ofs);\n+\n+\tdpaa_sec_session *ses =\n+\t\t((struct dpaa_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct dpaa_sec_job *cf;\n+\tstruct dpaa_sec_op_ctx *ctx;\n+\tstruct qm_sg_entry *sg, *out_sg, *in_sg;\n+\tuint32_t in_len = 0, out_len = 0;\n+\tunsigned int i;\n+\n+\tif (sgl->num > MAX_SG_ENTRIES) {\n+\t\tDPAA_SEC_DP_ERR(\"Proto: Max sec segs supported is %d\",\n+\t\t\t\tMAX_SG_ENTRIES);\n+\t\treturn NULL;\n+\t}\n+\n+\tctx = dpaa_sec_alloc_raw_ctx(ses, sgl->num * 2 + 4);\n+\tif (!ctx)\n+\t\treturn NULL;\n+\tcf = &ctx->job;\n+\tctx->userdata = (void *)userdata;\n+\t/* output */\n+\tout_sg = &cf->sg[0];\n+\tout_sg->extension = 1;\n+\tqm_sg_entry_set64(out_sg, rte_dpaa_mem_vtop(&cf->sg[2]));\n+\n+\tif (dest_sgl) {\n+\t\t/* 1st seg */\n+\t\tsg = &cf->sg[2];\n+\t\tqm_sg_entry_set64(sg, dest_sgl->vec[0].iova);\n+\t\tsg->offset = 0;\n+\t\tsg->length = dest_sgl->vec[0].len;\n+\t\tout_len += sg->length;\n+\n+\t\tfor (i = 1; i < dest_sgl->num; i++) {\n+\t\t/* Successive segs */\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, dest_sgl->vec[i].iova);\n+\t\t\tsg->offset = 0;\n+\t\t\tsg->length = dest_sgl->vec[i].len;\n+\t\t\tout_len += sg->length;\n+\t\t}\n+\t\tsg->length = dest_sgl->vec[i - 1].tot_len;\n+\t} else {\n+\t\t/* 1st seg */\n+\t\tsg = &cf->sg[2];\n+\t\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\t\tsg->offset = 0;\n+\t\tsg->length = sgl->vec[0].len;\n+\t\tout_len += sg->length;\n+\n+\t\tfor (i = 1; i < sgl->num; i++) {\n+\t\t/* Successive segs */\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\t\tsg->offset = 0;\n+\t\t\tsg->length = sgl->vec[i].len;\n+\t\t\tout_len += sg->length;\n+\t\t}\n+\t\tsg->length = sgl->vec[i - 1].tot_len;\n+\n+\t}\n+\tout_len += sg->length;\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\tout_sg->length = out_len;\n+\tcpu_to_hw_sg(out_sg);\n+\n+\t/* input */\n+\tin_sg = &cf->sg[1];\n+\tin_sg->extension = 1;\n+\tin_sg->final = 1;\n+\tin_len = sgl->vec[0].len;\n+\n+\tsg++;\n+\tqm_sg_entry_set64(in_sg, rte_dpaa_mem_vtop(sg));\n+\n+\t/* 1st seg */\n+\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\tsg->length = sgl->vec[0].len;\n+\tsg->offset = 0;\n+\n+\t/* Successive segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\tsg->length = sgl->vec[i].len;\n+\t\tsg->offset = 0;\n+\t\tin_len += sg->length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\tin_sg->length = in_len;\n+\tcpu_to_hw_sg(in_sg);\n+\n+\tif ((ses->ctxt == DPAA_SEC_PDCP) && ses->pdcp.hfn_ovd) {\n+\t\tfd->cmd = 0x80000000 |\n+\t\t\t*((uint32_t *)((uint8_t *)userdata +\n+\t\t\tses->pdcp.hfn_ovd_offset));\n+\t\tDPAA_SEC_DP_DEBUG(\"Per packet HFN: %x, ovd:%u\\n\",\n+\t\t\t*((uint32_t *)((uint8_t *)userdata +\n+\t\t\tses->pdcp.hfn_ovd_offset)),\n+\t\t\tses->pdcp.hfn_ovd);\n+\t}\n+\n+\treturn cf;\n+}\n+#endif\n+\n static uint32_t\n dpaa_sec_raw_enqueue_burst(void *qp_data, uint8_t *drv_ctx,\n \tstruct rte_crypto_sym_vec *vec, union rte_crypto_sym_ofs ofs,\n@@ -744,6 +1030,13 @@ dpaa_sec_configure_raw_dp_ctx(struct rte_cryptodev *dev, uint16_t qp_id,\n \t\tsess->build_raw_dp_fd = build_dpaa_raw_dp_auth_fd;\n \telse if (sess->ctxt == DPAA_SEC_CIPHER_HASH)\n \t\tsess->build_raw_dp_fd = build_dpaa_raw_dp_chain_fd;\n+\telse if (sess->ctxt == DPAA_SEC_AEAD)\n+\t\tsess->build_raw_dp_fd = build_raw_cipher_auth_gcm_sg;\n+#ifdef RTE_LIBRTE_SECURITY\n+\telse if (sess->ctxt == DPAA_SEC_IPSEC ||\n+\t\t\tsess->ctxt == DPAA_SEC_PDCP)\n+\t\tsess->build_raw_dp_fd = build_dpaa_raw_proto_sg;\n+#endif\n \telse\n \t\treturn -ENOTSUP;\n \tdp_ctx = (struct dpaa_sec_raw_dp_ctx *)raw_dp_ctx->drv_ctx_data;\n",
    "prefixes": [
        "13/15"
    ]
}