get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98139/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98139,
    "url": "https://patches.dpdk.org/api/patches/98139/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210907075957.28848-15-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210907075957.28848-15-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210907075957.28848-15-hemant.agrawal@nxp.com",
    "date": "2021-09-07T07:59:56",
    "name": "[v2,14/15] test/crypto: add raw API test for dpaax",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "74840a471eaf9d26e4a823a4dab3882c4de0d785",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210907075957.28848-15-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18727,
            "url": "https://patches.dpdk.org/api/series/18727/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18727",
            "date": "2021-09-07T07:59:42",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/18727/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98139/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/98139/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 6AB20A0C41;\n\tTue,  7 Sep 2021 10:05:48 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id DA8DE41193;\n\tTue,  7 Sep 2021 10:04:23 +0200 (CEST)",
            "from EUR05-VI1-obe.outbound.protection.outlook.com\n (mail-vi1eur05on2067.outbound.protection.outlook.com [40.107.21.67])\n by mails.dpdk.org (Postfix) with ESMTP id 732A44118D\n for <dev@dpdk.org>; Tue,  7 Sep 2021 10:04:22 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8709.eurprd04.prod.outlook.com (2603:10a6:10:2dc::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14; Tue, 7 Sep\n 2021 08:04:21 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%4]) with mapi id 15.20.4478.025; Tue, 7 Sep 2021\n 08:04:20 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR02CA0068.apcprd02.prod.outlook.com (2603:1096:4:54::32) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4478.19 via Frontend Transport; Tue, 7 Sep 2021 08:04:18 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=QDk6GokaXgn1Wkt6HpKQfqxVeXhL5fuJEDsGJpWMKss5nZjFaFtsBSslVT8/yTb5NW56K5fX64ViDmK51FpnrsOB/xF01GQtJHnlxQfgqnmSKrBX3RkA8OBV4XelzdOfi4o6m2Cx4KJJU2kaaM8Ex4TFkpSUb6UCUEYwzoC21nA3UcgJ6mGsrAu2y6mSW9I+QLTHDLKNqrrl1rQzVQFbGNVT+Lmo9JxLgdp9NW4aAC6s+B/1QZskyrjSdBa2ee295w0qVqzNSnexhftt5Q6rV0VBRjJ/JppwG1TDvgWJBdVGyDMNceCq+zLavRPxP/DKyoMGLg7N80cuCDNCYK/5gQ==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=UhM+ASv+OO7vwbI/wgetgQblf2Ks639IJ1hL23i/c+g=;\n b=jgEWugVMbnM1z5gzbE7axjuusDyaRo3/bUya0ynqnRsPGemWfn8O0XAILpX1gCv/5tkX+DlloemPTvqdqDnoEQjtGkxAv1jrlxpdIc10c6VC6GV4KpMRx3HQxnew/kOl755ql+Yw/luELUvAl1lavkMQKJkMSRu8uMoPZO22wpsCDqXhyMv2/rnCBPSTb1FrnCAizg5hAh3YFmn4pr5zYj/pK6OHOEXHDvOY0aq/azIt0I0fheMVPB2jxSRKS3uoS1E22qwEVpr+xsXIvBgnuTpIO/3s0jIRfjAEwNJ4UchNyBZE+db9h2BQthLrC7cOHgx667N1+3O5qsOCXi/FUQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=UhM+ASv+OO7vwbI/wgetgQblf2Ks639IJ1hL23i/c+g=;\n b=lzrzgmHKfPZOtQlGjRVq6xWodW4BeFCb2asEBBQzfB6K8kWMcfYbNNDJso1UwcvcZql0/5IbJHWpKNaRt4Rj/ipBw4DEFAcZ3R2PsbsLvo0oXJVJjS4I8gYzj0nH1ucoMwnS3UJwzDyesw4kDnzDIFMoF3P40Md2KF5gpGuM6dc=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "konstantin.ananyev@intel.com, roy.fan.zhang@intel.com,\n Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Tue,  7 Sep 2021 13:29:56 +0530",
        "Message-Id": "<20210907075957.28848-15-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210907075957.28848-1-hemant.agrawal@nxp.com>",
        "References": "<20210825071510.7913-1-hemant.agrawal@nxp.com>\n <20210907075957.28848-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR02CA0068.apcprd02.prod.outlook.com\n (2603:1096:4:54::32) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "e0859d31-22ef-4956-8400-08d971d618cb",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8709:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB8709B95C489C2A741B2947DF89D39@DU2PR04MB8709.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:469;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(396003)(376002)(346002)(39860400002)(136003)(366004)(36756003)(38350700002)(186003)(52116002)(1076003)(6666004)(38100700002)(5660300002)(66476007)(66556008)(6486002)(6506007)(8936002)(8676002)(44832011)(26005)(66946007)(4326008)(86362001)(2616005)(2906002)(956004)(316002)(478600001)(6512007)(83380400001);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e0859d31-22ef-4956-8400-08d971d618cb",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 Sep 2021 08:04:20.4567 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n F7F7qyxuZVcEOTqAJAUYDhOgwJUhKT/F5uIJk6hpMi1b+7gdsTQZKLMPbK2QNXrpt2DjaOulOHLDjKEap0+eYw==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8709",
        "Subject": "[dpdk-dev] [PATCH v2 14/15] test/crypto: add raw API test for dpaax",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support for raw API tests for\ndpaa_sec and dpaa2_sec platforms.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n app/test/test_cryptodev.c | 116 +++++++++++++++++++++++++++++++++++---\n 1 file changed, 109 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex ed63524edc..de4fb0f3d1 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -175,11 +175,11 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n {\n \tstruct rte_crypto_sym_op *sop = op->sym;\n \tstruct rte_crypto_op *ret_op = NULL;\n-\tstruct rte_crypto_vec data_vec[UINT8_MAX];\n+\tstruct rte_crypto_vec data_vec[UINT8_MAX], dest_data_vec[UINT8_MAX];\n \tstruct rte_crypto_va_iova_ptr cipher_iv, digest, aad_auth_iv;\n \tunion rte_crypto_sym_ofs ofs;\n \tstruct rte_crypto_sym_vec vec;\n-\tstruct rte_crypto_sgl sgl;\n+\tstruct rte_crypto_sgl sgl, dest_sgl;\n \tuint32_t max_len;\n \tunion rte_cryptodev_session_ctx sess;\n \tuint32_t count = 0;\n@@ -315,6 +315,19 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t}\n \n \tsgl.num = n;\n+\t/* Out of place */\n+\tif (sop->m_dst != NULL) {\n+\t\tdest_sgl.vec = dest_data_vec;\n+\t\tvec.dest_sgl = &dest_sgl;\n+\t\tn = rte_crypto_mbuf_to_vec(sop->m_dst, 0, max_len,\n+\t\t\t\tdest_data_vec, RTE_DIM(dest_data_vec));\n+\t\tif (n < 0 || n > sop->m_dst->nb_segs) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tdest_sgl.num = n;\n+\t} else\n+\t\tvec.dest_sgl = NULL;\n \n \tif (rte_cryptodev_raw_enqueue_burst(ctx, &vec, ofs, (void **)&op,\n \t\t\t&enqueue_status) < 1) {\n@@ -8305,10 +8318,21 @@ test_pdcp_proto_SGL(int i, int oop,\n \tint to_trn_tbl[16];\n \tint segs = 1;\n \tunsigned int trn_data = 0;\n+\tstruct rte_cryptodev_info dev_info;\n+\tuint64_t feat_flags;\n \tstruct rte_security_ctx *ctx = (struct rte_security_ctx *)\n \t\t\t\trte_cryptodev_get_sec_ctx(\n \t\t\t\tts_params->valid_devs[0]);\n+\tstruct rte_mbuf *temp_mbuf;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tfeat_flags = dev_info.feature_flags;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \t/* Verify the capabilities */\n \tstruct rte_security_capability_idx sec_cap_idx;\n \n@@ -8492,8 +8516,23 @@ test_pdcp_proto_SGL(int i, int oop,\n \t\tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (process_crypto_request(ts_params->valid_devs[0], ut_params->op)\n-\t\t== NULL) {\n+\ttemp_mbuf = ut_params->op->sym->m_src;\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\t/* filling lengths */\n+\t\twhile (temp_mbuf) {\n+\t\t\tut_params->op->sym->cipher.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\tut_params->op->sym->auth.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\ttemp_mbuf = temp_mbuf->next;\n+\t\t}\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 1, 0, 0);\n+\t} else {\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\t\t\t\t\t\t\tut_params->op);\n+\t}\n+\tif (ut_params->op == NULL) {\n \t\tprintf(\"TestCase %s()-%d line %d failed %s: \",\n \t\t\t__func__, i, __LINE__,\n \t\t\t\"failed to process sym crypto op\");\n@@ -9934,6 +9973,7 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tint retval;\n \tuint8_t *ciphertext, *auth_tag;\n \tuint16_t plaintext_pad_len;\n+\tstruct rte_cryptodev_info dev_info;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -9943,7 +9983,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \t\t\t&cap_idx) == NULL)\n \t\treturn TEST_SKIPPED;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n+\n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))\n \t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto */\n@@ -9980,7 +10024,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -10026,6 +10074,10 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \n \tint retval;\n \tuint8_t *plaintext;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10040,6 +10092,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \t\t\tglobal_api_test_type == CRYPTODEV_RAW_API_TEST)\n \t\treturn TEST_SKIPPED;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn TEST_SKIPPED;\n+\t}\n+\n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n \t\t\ttdata->algo,\n@@ -10070,7 +10128,11 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -14835,6 +14897,46 @@ test_cryptodev_cn10k(void)\n \treturn run_cryptodev_testsuite(RTE_STR(CRYPTODEV_NAME_CN10K_PMD));\n }\n \n+static int\n+test_cryptodev_dpaa2_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_cryptodev_dpaa_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa2_sec_raw_api);\n+REGISTER_TEST_COMMAND(cryptodev_dpaa_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa_sec_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_raw_api_autotest,\n \t\ttest_cryptodev_qat_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat);\n",
    "prefixes": [
        "v2",
        "14/15"
    ]
}