get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98137/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98137,
    "url": "https://patches.dpdk.org/api/patches/98137/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210907075957.28848-13-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210907075957.28848-13-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210907075957.28848-13-hemant.agrawal@nxp.com",
    "date": "2021-09-07T07:59:54",
    "name": "[v2,12/15] crypto/dpaa_sec: support authonly and chain with raw APIs",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "662aedc506ac7d749c4ced41ca74d8166ec31e1b",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210907075957.28848-13-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18727,
            "url": "https://patches.dpdk.org/api/series/18727/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18727",
            "date": "2021-09-07T07:59:42",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/18727/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98137/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/98137/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 17DCEA0C41;\n\tTue,  7 Sep 2021 10:05:34 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 618C841187;\n\tTue,  7 Sep 2021 10:04:17 +0200 (CEST)",
            "from EUR05-VI1-obe.outbound.protection.outlook.com\n (mail-vi1eur05on2078.outbound.protection.outlook.com [40.107.21.78])\n by mails.dpdk.org (Postfix) with ESMTP id CEE3C4117F\n for <dev@dpdk.org>; Tue,  7 Sep 2021 10:04:16 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8709.eurprd04.prod.outlook.com (2603:10a6:10:2dc::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14; Tue, 7 Sep\n 2021 08:04:16 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%4]) with mapi id 15.20.4478.025; Tue, 7 Sep 2021\n 08:04:16 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR02CA0068.apcprd02.prod.outlook.com (2603:1096:4:54::32) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4478.19 via Frontend Transport; Tue, 7 Sep 2021 08:04:14 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=JqAY08CR1hetFuDUwuMnQ49xkhyk6tKJ1YIX2zW/wXj1zXQYBBgZzgXhV+cGy9a9nDq1PEZMZ9cDjWNOgox8tpRM1V4t4CP1xpRhXIiOSP3RoBI1r2EbvjWmIMYsqprBXMDoTBx/7QEOs9p6fnQMAIO2uL2J8MJA5gRa18paPiyf1vUyHw8YOihgIFs4Vx3odyC6MSmPPj12HKmLWQNtjaowjyKm7IZdoMIkRbyKfkC/nn5AtsvSvW9XeKtBRbFTsEx+vmGenEpsdLGzYOpFL1ufbtDANvBMYpQwJyuje6tnrJOJNHEN52b8xrZaKCZSSMzfIkTgqf97S/nkmaWl+A==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=YqaXcWZmzes9i4Dns5vYrmIBnikEsdWyaDkbLdillH4=;\n b=Yw2NApbgt9zoRY/oCBz/OZipe+UJozWESLBSyQJQq1UeY6/XDjONn18gyB7ONqFa1zjc8gcIpbsUGyhhWY2ftDtczOsny1uvVfY+bjm+a0Lz2tp/lO1gBDUE20w/Uv7eISratwzy8ShS3ziYRPfoJ8tF4VNycLN4GG5/QRRoi8E+941dIIE8d8iIerim7zKUCT2n+ypSbendbkDW1laJHzHfpj5l3LnB22IeZfAQcxbrWBDidFfHYb7UdsakA0px5fw43iVcBW19ViCZt4gQxaLo3s5VTEhFSnybjugdyuAwnUgZ9gTLh5Oj6r6TXGbl1P+JevcPmZ/uNMIyqahvdg==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=YqaXcWZmzes9i4Dns5vYrmIBnikEsdWyaDkbLdillH4=;\n b=T0is956Noh6jLzjbPCE7kliNmN0DnH1wV9FgFbfoi6W4FuOeCviGFxPwDD9eDQKtwg/eZHRpAnJYbQHjofhKfe8ayhrm1GCMwsbYWo8KXRqk1PhmNZR7eRIo6x1ezQJkd0Rj5Pzs/R2/efScVpzq9+nXq06l03k/YBskRHlmg6E=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "konstantin.ananyev@intel.com, roy.fan.zhang@intel.com,\n Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Tue,  7 Sep 2021 13:29:54 +0530",
        "Message-Id": "<20210907075957.28848-13-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210907075957.28848-1-hemant.agrawal@nxp.com>",
        "References": "<20210825071510.7913-1-hemant.agrawal@nxp.com>\n <20210907075957.28848-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR02CA0068.apcprd02.prod.outlook.com\n (2603:1096:4:54::32) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "3f4b5762-7333-4ba4-06d3-08d971d61614",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8709:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB8709310F924F76C375D6872C89D39@DU2PR04MB8709.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:1443;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(396003)(376002)(346002)(39860400002)(136003)(366004)(36756003)(38350700002)(186003)(52116002)(1076003)(6666004)(38100700002)(5660300002)(66476007)(66556008)(6486002)(6506007)(8936002)(8676002)(44832011)(26005)(66946007)(4326008)(86362001)(2616005)(2906002)(956004)(316002)(478600001)(6512007)(83380400001);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 3f4b5762-7333-4ba4-06d3-08d971d61614",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 Sep 2021 08:04:15.9277 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n GqPGLmFFDjQNzTerpP8sz+qorvVn08eQ7By3/cBUlt15dFTv91LDkXv8aNLe6wV6ulIlWS7O/igEycwpe82Y4Q==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8709",
        "Subject": "[dpdk-dev] [PATCH v2 12/15] crypto/dpaa_sec: support authonly and\n chain with raw APIs",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nThis patch improves the raw vector support in dpaa_sec driver\nfor authonly and chain usecase.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n drivers/crypto/dpaa_sec/dpaa_sec.h        |   3 +-\n drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 296 +++++++++++++++++++++-\n 2 files changed, 287 insertions(+), 12 deletions(-)",
    "diff": "diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h\nindex f6e83d46e7..2e0ab93ff0 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.h\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.h\n@@ -135,7 +135,8 @@ typedef struct dpaa_sec_job* (*dpaa_sec_build_raw_dp_fd_t)(uint8_t *drv_ctx,\n \t\t\tstruct rte_crypto_va_iova_ptr *digest,\n \t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n \t\t\tunion rte_crypto_sym_ofs ofs,\n-\t\t\tvoid *userdata);\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd);\n \n typedef struct dpaa_sec_session_entry {\n \tstruct sec_cdb cdb;\t/**< cmd block associated with qp */\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\nindex ee0ca2e0d5..4e34629f18 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c\n@@ -12,6 +12,7 @@\n #endif\n \n /* RTA header files */\n+#include <desc/algo.h>\n #include <desc/ipsec.h>\n \n #include <rte_dpaa_bus.h>\n@@ -26,6 +27,17 @@ struct dpaa_sec_raw_dp_ctx {\n \tuint16_t cached_dequeue;\n };\n \n+static inline int\n+is_encode(dpaa_sec_session *ses)\n+{\n+\treturn ses->dir == DIR_ENC;\n+}\n+\n+static inline int is_decode(dpaa_sec_session *ses)\n+{\n+\treturn ses->dir == DIR_DEC;\n+}\n+\n static __rte_always_inline int\n dpaa_sec_raw_enqueue_done(void *qp_data, uint8_t *drv_ctx, uint32_t n)\n {\n@@ -82,18 +94,276 @@ build_dpaa_raw_dp_auth_fd(uint8_t *drv_ctx,\n \t\t\tstruct rte_crypto_va_iova_ptr *digest,\n \t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n \t\t\tunion rte_crypto_sym_ofs ofs,\n-\t\t\tvoid *userdata)\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd)\n {\n-\tRTE_SET_USED(drv_ctx);\n-\tRTE_SET_USED(sgl);\n \tRTE_SET_USED(dest_sgl);\n \tRTE_SET_USED(iv);\n-\tRTE_SET_USED(digest);\n \tRTE_SET_USED(auth_iv);\n-\tRTE_SET_USED(ofs);\n-\tRTE_SET_USED(userdata);\n+\tRTE_SET_USED(fd);\n \n-\treturn NULL;\n+\tdpaa_sec_session *ses =\n+\t\t((struct dpaa_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct dpaa_sec_job *cf;\n+\tstruct dpaa_sec_op_ctx *ctx;\n+\tstruct qm_sg_entry *sg, *out_sg, *in_sg;\n+\tphys_addr_t start_addr;\n+\tuint8_t *old_digest, extra_segs;\n+\tint data_len, data_offset, total_len = 0;\n+\tunsigned int i;\n+\n+\tfor (i = 0; i < sgl->num; i++)\n+\t\ttotal_len += sgl->vec[i].len;\n+\n+\tdata_len = total_len - ofs.ofs.auth.head - ofs.ofs.auth.tail;\n+\tdata_offset =  ofs.ofs.auth.head;\n+\n+\t/* Support only length in bits for SNOW3G and ZUC */\n+\n+\tif (is_decode(ses))\n+\t\textra_segs = 3;\n+\telse\n+\t\textra_segs = 2;\n+\n+\tif (sgl->num > MAX_SG_ENTRIES) {\n+\t\tDPAA_SEC_DP_ERR(\"Auth: Max sec segs supported is %d\",\n+\t\t\t\tMAX_SG_ENTRIES);\n+\t\treturn NULL;\n+\t}\n+\tctx = dpaa_sec_alloc_raw_ctx(ses, sgl->num * 2 + extra_segs);\n+\tif (!ctx)\n+\t\treturn NULL;\n+\n+\tcf = &ctx->job;\n+\tctx->userdata = (void *)userdata;\n+\told_digest = ctx->digest;\n+\n+\t/* output */\n+\tout_sg = &cf->sg[0];\n+\tqm_sg_entry_set64(out_sg, digest->iova);\n+\tout_sg->length = ses->digest_length;\n+\tcpu_to_hw_sg(out_sg);\n+\n+\t/* input */\n+\tin_sg = &cf->sg[1];\n+\t/* need to extend the input to a compound frame */\n+\tin_sg->extension = 1;\n+\tin_sg->final = 1;\n+\tin_sg->length = data_len;\n+\tqm_sg_entry_set64(in_sg, rte_dpaa_mem_vtop(&cf->sg[2]));\n+\n+\t/* 1st seg */\n+\tsg = in_sg + 1;\n+\n+\tif (ses->iv.length) {\n+\t\tuint8_t *iv_ptr;\n+\n+\t\tiv_ptr = rte_crypto_op_ctod_offset(userdata, uint8_t *,\n+\t\t\t\t\t\t   ses->iv.offset);\n+\n+\t\tif (ses->auth_alg == RTE_CRYPTO_AUTH_SNOW3G_UIA2) {\n+\t\t\tiv_ptr = conv_to_snow_f9_iv(iv_ptr);\n+\t\t\tsg->length = 12;\n+\t\t} else if (ses->auth_alg == RTE_CRYPTO_AUTH_ZUC_EIA3) {\n+\t\t\tiv_ptr = conv_to_zuc_eia_iv(iv_ptr);\n+\t\t\tsg->length = 8;\n+\t\t} else {\n+\t\t\tsg->length = ses->iv.length;\n+\t\t}\n+\t\tqm_sg_entry_set64(sg, rte_dpaa_mem_vtop(iv_ptr));\n+\t\tin_sg->length += sg->length;\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t}\n+\n+\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\tsg->offset = data_offset;\n+\n+\tif (data_len <= (int)(sgl->vec[0].len - data_offset)) {\n+\t\tsg->length = data_len;\n+\t} else {\n+\t\tsg->length = sgl->vec[0].len - data_offset;\n+\n+\t\t/* remaining i/p segs */\n+\t\tfor (i = 1; i < sgl->num; i++) {\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\t\tif (data_len > (int)sgl->vec[i].len)\n+\t\t\t\tsg->length = sgl->vec[0].len;\n+\t\t\telse\n+\t\t\t\tsg->length = data_len;\n+\n+\t\t\tdata_len = data_len - sg->length;\n+\t\t\tif (data_len < 1)\n+\t\t\t\tbreak;\n+\t\t}\n+\t}\n+\n+\tif (is_decode(ses)) {\n+\t\t/* Digest verification case */\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\trte_memcpy(old_digest, digest->va,\n+\t\t\t\tses->digest_length);\n+\t\tstart_addr = rte_dpaa_mem_vtop(old_digest);\n+\t\tqm_sg_entry_set64(sg, start_addr);\n+\t\tsg->length = ses->digest_length;\n+\t\tin_sg->length += ses->digest_length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\tcpu_to_hw_sg(in_sg);\n+\n+\treturn cf;\n+}\n+\n+static inline struct dpaa_sec_job *\n+build_dpaa_raw_dp_chain_fd(uint8_t *drv_ctx,\n+\t\t\tstruct rte_crypto_sgl *sgl,\n+\t\t\tstruct rte_crypto_sgl *dest_sgl,\n+\t\t\tstruct rte_crypto_va_iova_ptr *iv,\n+\t\t\tstruct rte_crypto_va_iova_ptr *digest,\n+\t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n+\t\t\tunion rte_crypto_sym_ofs ofs,\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd)\n+{\n+\tRTE_SET_USED(auth_iv);\n+\n+\tdpaa_sec_session *ses =\n+\t\t((struct dpaa_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct dpaa_sec_job *cf;\n+\tstruct dpaa_sec_op_ctx *ctx;\n+\tstruct qm_sg_entry *sg, *out_sg, *in_sg;\n+\tuint8_t *IV_ptr = iv->va;\n+\tunsigned int i;\n+\tuint16_t auth_hdr_len = ofs.ofs.cipher.head -\n+\t\t\t\tofs.ofs.auth.head;\n+\tuint16_t auth_tail_len = ofs.ofs.auth.tail;\n+\tuint32_t auth_only_len = (auth_tail_len << 16) | auth_hdr_len;\n+\tint data_len = 0, auth_len = 0, cipher_len = 0;\n+\n+\tfor (i = 0; i < sgl->num; i++)\n+\t\tdata_len += sgl->vec[i].len;\n+\n+\tcipher_len = data_len - ofs.ofs.cipher.head - ofs.ofs.cipher.tail;\n+\tauth_len = data_len - ofs.ofs.auth.head - ofs.ofs.auth.tail;\n+\n+\tif (sgl->num > MAX_SG_ENTRIES) {\n+\t\tDPAA_SEC_DP_ERR(\"Cipher-Auth: Max sec segs supported is %d\",\n+\t\t\t\tMAX_SG_ENTRIES);\n+\t\treturn NULL;\n+\t}\n+\n+\tctx = dpaa_sec_alloc_raw_ctx(ses, sgl->num * 2 + 4);\n+\tif (!ctx)\n+\t\treturn NULL;\n+\n+\tcf = &ctx->job;\n+\tctx->userdata = (void *)userdata;\n+\n+\trte_prefetch0(cf->sg);\n+\n+\t/* output */\n+\tout_sg = &cf->sg[0];\n+\tout_sg->extension = 1;\n+\tif (is_encode(ses))\n+\t\tout_sg->length = cipher_len + ses->digest_length;\n+\telse\n+\t\tout_sg->length = cipher_len;\n+\n+\t/* output sg entries */\n+\tsg = &cf->sg[2];\n+\tqm_sg_entry_set64(out_sg, rte_dpaa_mem_vtop(sg));\n+\tcpu_to_hw_sg(out_sg);\n+\n+\t/* 1st seg */\n+\tif (dest_sgl) {\n+\t\tqm_sg_entry_set64(sg, dest_sgl->vec[0].iova);\n+\t\tsg->length = dest_sgl->vec[0].len - ofs.ofs.cipher.head;\n+\t\tsg->offset = ofs.ofs.cipher.head;\n+\n+\t\t/* Successive segs */\n+\t\tfor (i = 1; i < dest_sgl->num; i++) {\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, dest_sgl->vec[i].iova);\n+\t\t\tsg->length = dest_sgl->vec[i].len;\n+\t\t}\n+\t} else {\n+\t\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\t\tsg->length = sgl->vec[0].len - ofs.ofs.cipher.head;\n+\t\tsg->offset = ofs.ofs.cipher.head;\n+\n+\t\t/* Successive segs */\n+\t\tfor (i = 1; i < sgl->num; i++) {\n+\t\t\tcpu_to_hw_sg(sg);\n+\t\t\tsg++;\n+\t\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\t\tsg->length = sgl->vec[i].len;\n+\t\t}\n+\t}\n+\n+\tif (is_encode(ses)) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\t/* set auth output */\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, digest->iova);\n+\t\tsg->length = ses->digest_length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\t/* input */\n+\tin_sg = &cf->sg[1];\n+\tin_sg->extension = 1;\n+\tin_sg->final = 1;\n+\tif (is_encode(ses))\n+\t\tin_sg->length = ses->iv.length + auth_len;\n+\telse\n+\t\tin_sg->length = ses->iv.length + auth_len\n+\t\t\t\t\t\t+ ses->digest_length;\n+\n+\t/* input sg entries */\n+\tsg++;\n+\tqm_sg_entry_set64(in_sg, rte_dpaa_mem_vtop(sg));\n+\tcpu_to_hw_sg(in_sg);\n+\n+\t/* 1st seg IV */\n+\tqm_sg_entry_set64(sg, rte_dpaa_mem_vtop(IV_ptr));\n+\tsg->length = ses->iv.length;\n+\tcpu_to_hw_sg(sg);\n+\n+\t/* 2 seg */\n+\tsg++;\n+\tqm_sg_entry_set64(sg, sgl->vec[0].iova);\n+\tsg->length = sgl->vec[0].len - ofs.ofs.auth.head;\n+\tsg->offset = ofs.ofs.auth.head;\n+\n+\t/* Successive segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\tqm_sg_entry_set64(sg, sgl->vec[i].iova);\n+\t\tsg->length = sgl->vec[i].len;\n+\t}\n+\n+\tif (is_decode(ses)) {\n+\t\tcpu_to_hw_sg(sg);\n+\t\tsg++;\n+\t\tmemcpy(ctx->digest, digest->va,\n+\t\t\tses->digest_length);\n+\t\tqm_sg_entry_set64(sg, rte_dpaa_mem_vtop(ctx->digest));\n+\t\tsg->length = ses->digest_length;\n+\t}\n+\tsg->final = 1;\n+\tcpu_to_hw_sg(sg);\n+\n+\tif (auth_only_len)\n+\t\tfd->cmd = 0x80000000 | auth_only_len;\n+\n+\treturn cf;\n }\n \n static struct dpaa_sec_job *\n@@ -104,10 +374,13 @@ build_dpaa_raw_dp_cipher_fd(uint8_t *drv_ctx,\n \t\t\tstruct rte_crypto_va_iova_ptr *digest,\n \t\t\tstruct rte_crypto_va_iova_ptr *auth_iv,\n \t\t\tunion rte_crypto_sym_ofs ofs,\n-\t\t\tvoid *userdata)\n+\t\t\tvoid *userdata,\n+\t\t\tstruct qm_fd *fd)\n {\n \tRTE_SET_USED(digest);\n \tRTE_SET_USED(auth_iv);\n+\tRTE_SET_USED(fd);\n+\n \tdpaa_sec_session *ses =\n \t\t((struct dpaa_sec_raw_dp_ctx *)drv_ctx)->session;\n \tstruct dpaa_sec_job *cf;\n@@ -264,15 +537,14 @@ dpaa_sec_raw_enqueue_burst(void *qp_data, uint8_t *drv_ctx,\n \t\t\t\t\t\t&vec->digest[loop],\n \t\t\t\t\t\t&vec->auth_iv[loop],\n \t\t\t\t\t\tofs,\n-\t\t\t\t\t\tuser_data[loop]);\n+\t\t\t\t\t\tuser_data[loop],\n+\t\t\t\t\t\tfd);\n \t\t\tif (!cf) {\n \t\t\t\tDPAA_SEC_ERR(\"error: Improper packet contents\"\n \t\t\t\t\t\" for crypto operation\");\n \t\t\t\tgoto skip_tx;\n \t\t\t}\n \t\t\tinq[loop] = ses->inq[rte_lcore_id() % MAX_DPAA_CORES];\n-\t\t\tfd->opaque_addr = 0;\n-\t\t\tfd->cmd = 0;\n \t\t\tqm_fd_addr_set64(fd, rte_dpaa_mem_vtop(cf->sg));\n \t\t\tfd->_format1 = qm_fd_compound;\n \t\t\tfd->length29 = 2 * sizeof(struct qm_sg_entry);\n@@ -470,6 +742,8 @@ dpaa_sec_configure_raw_dp_ctx(struct rte_cryptodev *dev, uint16_t qp_id,\n \t\tsess->build_raw_dp_fd = build_dpaa_raw_dp_cipher_fd;\n \telse if (sess->ctxt == DPAA_SEC_AUTH)\n \t\tsess->build_raw_dp_fd = build_dpaa_raw_dp_auth_fd;\n+\telse if (sess->ctxt == DPAA_SEC_CIPHER_HASH)\n+\t\tsess->build_raw_dp_fd = build_dpaa_raw_dp_chain_fd;\n \telse\n \t\treturn -ENOTSUP;\n \tdp_ctx = (struct dpaa_sec_raw_dp_ctx *)raw_dp_ctx->drv_ctx_data;\n",
    "prefixes": [
        "v2",
        "12/15"
    ]
}