get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98142/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98142,
    "url": "https://patches.dpdk.org/api/patches/98142/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210907083953.8948-2-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210907083953.8948-2-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210907083953.8948-2-hemant.agrawal@nxp.com",
    "date": "2021-09-07T08:39:45",
    "name": "[v3,02/10] crypto/dpaa_sec: support non-HMAC auth algos",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "010976a5a6a6f847269c95d35b41bd3fc748a15f",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210907083953.8948-2-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18728,
            "url": "https://patches.dpdk.org/api/series/18728/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18728",
            "date": "2021-09-07T08:39:44",
            "name": "[v3,01/10] crypto/dpaa_sec: support DES-CBC",
            "version": 3,
            "mbox": "https://patches.dpdk.org/series/18728/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98142/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/98142/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 9ADCFA0C46;\n\tTue,  7 Sep 2021 10:44:40 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 177A241123;\n\tTue,  7 Sep 2021 10:44:35 +0200 (CEST)",
            "from EUR03-DB5-obe.outbound.protection.outlook.com\n (mail-eopbgr40045.outbound.protection.outlook.com [40.107.4.45])\n by mails.dpdk.org (Postfix) with ESMTP id 69B6541100\n for <dev@dpdk.org>; Tue,  7 Sep 2021 10:44:34 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8935.eurprd04.prod.outlook.com (2603:10a6:10:2e2::20)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14; Tue, 7 Sep\n 2021 08:44:33 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%4]) with mapi id 15.20.4478.025; Tue, 7 Sep 2021\n 08:44:33 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SGBP274CA0024.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::36) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4478.20 via Frontend Transport; Tue, 7 Sep 2021 08:44:32 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=kpJUP2bCYNnC8G8QBiIqLiuZ5Ycil4P+eLAV6AkWLq5AgTFZgN5k3FBewIRkp0o5TtdiM4XKg1tXhjgv/pqdatr3kmQq+tP/QL5GuoVoYNkhIPsCznXCgQyfOgN4UVnvYq7Vddyl9coqOIOOMWzGtAQvuJVhp9Vf6RVHTjigfaNJRGsmn8DoSXQlxrkbTMwppRZ1NZ0nxQkL3mTDg/fFW70tqE8y0FinS8meTOKpo9WhMWFBGIEQffss3sxQf2xCYK39W5vZL6DtUsvtxjhcf2uT/yLyMpvUhB/hd+Q2Ud9QYwdWI1Q20De6/Niuz5g6xRpqdCe8k8Uu2IC5mbkW2g==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=szKEFX7wKRy9JNlscyzSYNe8o6r5Ua52+9HEk7MCQUI=;\n b=PI7Pobq/s8SanWqqlBs68Y7KNDA8J2SVKQyDntWbHJAbxCP5bx+gv0Y/HlyYyEoGn0YcsHbXFjnZABu+jji5at2UYsx4M25ydkQYhX+2u3sjEZBSHwWdYfsJE+hWYHOWSNkXvvAEY+wPC0jh2NRPtWaDsphQU8X5SrA/xqJ4H5yF84quM+VqqZIgOr3Pua5iwQ8MhAt0t0kYWF1aegUxy4gzRKtuSt5Y+Pe2dCDAWiSNxBII2LWNDZc7701zKX5vd5hQ4pAEMhsSFOEWXm0ooZRBGm/b4av70uE4YT4v1clhNCZQdN7KRMlPB7lfBZVrM9D3ErXrHwRnGB0VLEJlYQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=szKEFX7wKRy9JNlscyzSYNe8o6r5Ua52+9HEk7MCQUI=;\n b=Gb8ZnTLMvc0MN9V/BqOEeaSj4JQZgQDIZNKhVg8kE8T30VNRtx0u/HaWxCx1dVY82Mw8IQvaRIiAFrlqdyqcPlc32XHzt2SLzH5bC++LO8mJaQ/InmrdHwiiwqVsexaHyjr4L+EYYNNnSs7UdE2KKx4c46N1Y5vutSi/NU1kmt4=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Tue,  7 Sep 2021 14:09:45 +0530",
        "Message-Id": "<20210907083953.8948-2-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210907083953.8948-1-hemant.agrawal@nxp.com>",
        "References": "<20210825081837.23830-1-hemant.agrawal@nxp.com>\n <20210907083953.8948-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SGBP274CA0024.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::36)\n To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "51f0f26b-28c4-450d-9cd0-08d971dbb72c",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8935:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB893558A694A0584C457C3C4589D39@DU2PR04MB8935.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:4502;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(346002)(136003)(39860400002)(366004)(376002)(396003)(2906002)(956004)(86362001)(2616005)(83380400001)(478600001)(316002)(6512007)(4326008)(52116002)(1076003)(5660300002)(38100700002)(6666004)(36756003)(186003)(38350700002)(26005)(44832011)(66946007)(6486002)(6506007)(66476007)(66556008)(8936002)(8676002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 51f0f26b-28c4-450d-9cd0-08d971dbb72c",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 Sep 2021 08:44:33.6358 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n JGIlivy2D29/sPNGLnVLJtG7ujQVl/V/Jw9uqPj3KAvfdrtZsVbPhqKCXKoTuQo3VWdP8X0Gf8rX/Uf4/tG7qg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8935",
        "Subject": "[dpdk-dev] [PATCH v3 02/10] crypto/dpaa_sec: support non-HMAC auth\n algos",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nThis patch add support for non-HMAC, md5, shax algos.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n doc/guides/cryptodevs/features/dpaa_sec.ini |   8 +-\n drivers/crypto/dpaa_sec/dpaa_sec.c          |  55 +++++++--\n drivers/crypto/dpaa_sec/dpaa_sec.h          | 126 ++++++++++++++++++++\n 3 files changed, 180 insertions(+), 9 deletions(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/dpaa_sec.ini b/doc/guides/cryptodevs/features/dpaa_sec.ini\nindex 5d0d04d601..eab14da96c 100644\n--- a/doc/guides/cryptodevs/features/dpaa_sec.ini\n+++ b/doc/guides/cryptodevs/features/dpaa_sec.ini\n@@ -33,11 +33,17 @@ ZUC EEA3      = Y\n ; Supported authentication algorithms of the 'dpaa_sec' crypto driver.\n ;\n [Auth]\n+MD5          = Y\n MD5 HMAC     = Y\n+SHA1         = Y\n SHA1 HMAC    = Y\n+SHA224       = Y\n SHA224 HMAC  = Y\n+SHA256       = Y\n SHA256 HMAC  = Y\n+SHA384       = Y\n SHA384 HMAC  = Y\n+SHA512       = Y\n SHA512 HMAC  = Y\n SNOW3G UIA2  = Y\n ZUC EIA3     = Y\n@@ -53,4 +59,4 @@ AES GCM (256) = Y\n ;\n ; Supported Asymmetric algorithms of the 'dpaa_sec' crypto driver.\n ;\n-[Asymmetric]\n\\ No newline at end of file\n+[Asymmetric]\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c\nindex 0a58f4e917..4f5d9d7f49 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c\n@@ -486,6 +486,18 @@ dpaa_sec_prep_cdb(dpaa_sec_session *ses)\n \t\talginfo_a.algtype = ses->auth_key.alg;\n \t\talginfo_a.algmode = ses->auth_key.algmode;\n \t\tswitch (ses->auth_alg) {\n+\t\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\t\tshared_desc_len = cnstr_shdsc_hash(\n+\t\t\t\t\t\tcdb->sh_desc, true,\n+\t\t\t\t\t\tswap, SHR_NEVER, &alginfo_a,\n+\t\t\t\t\t\t!ses->dir,\n+\t\t\t\t\t\tses->digest_length);\n+\t\t\tbreak;\n \t\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n \t\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n \t\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n@@ -2077,43 +2089,70 @@ dpaa_sec_auth_init(struct rte_cryptodev *dev __rte_unused,\n {\n \tsession->ctxt = DPAA_SEC_AUTH;\n \tsession->auth_alg = xform->auth.algo;\n-\tsession->auth_key.data = rte_zmalloc(NULL, xform->auth.key.length,\n+\tsession->auth_key.length = xform->auth.key.length;\n+\tif (xform->auth.key.length) {\n+\t\tsession->auth_key.data =\n+\t\t\t\trte_zmalloc(NULL, xform->auth.key.length,\n \t\t\t\t\t     RTE_CACHE_LINE_SIZE);\n-\tif (session->auth_key.data == NULL && xform->auth.key.length > 0) {\n-\t\tDPAA_SEC_ERR(\"No Memory for auth key\");\n-\t\treturn -ENOMEM;\n+\t\tif (session->auth_key.data == NULL) {\n+\t\t\tDPAA_SEC_ERR(\"No Memory for auth key\");\n+\t\t\treturn -ENOMEM;\n+\t\t}\n+\t\tmemcpy(session->auth_key.data, xform->auth.key.data,\n+\t\t\t\txform->auth.key.length);\n+\n \t}\n-\tsession->auth_key.length = xform->auth.key.length;\n \tsession->digest_length = xform->auth.digest_length;\n \tif (session->cipher_alg == RTE_CRYPTO_CIPHER_NULL) {\n \t\tsession->iv.offset = xform->auth.iv.offset;\n \t\tsession->iv.length = xform->auth.iv.length;\n \t}\n \n-\tmemcpy(session->auth_key.data, xform->auth.key.data,\n-\t       xform->auth.key.length);\n-\n \tswitch (xform->auth.algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA1;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA1;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_MD5;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_MD5;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA224;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA224;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA256;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA256;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA384;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA384;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA512;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA512;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h\nindex 9685010f3f..153747c87c 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.h\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.h\n@@ -266,6 +266,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, },\n \t\t}, },\n \t},\n+\t{       /* MD5 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_MD5,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* MD5 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -287,6 +308,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA1 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 20,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA1 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -308,6 +350,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA224 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 28,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA224 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -329,6 +392,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA256 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA256 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -350,6 +434,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA384 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 48,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA384 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -371,6 +476,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA512 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 64,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA512 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n",
    "prefixes": [
        "v3",
        "02/10"
    ]
}