get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98144/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98144,
    "url": "https://patches.dpdk.org/api/patches/98144/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210907083953.8948-4-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210907083953.8948-4-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210907083953.8948-4-hemant.agrawal@nxp.com",
    "date": "2021-09-07T08:39:47",
    "name": "[v3,04/10] crypto/dpaa_sec: add support for AES CMAC integrity check",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "40dbf185519e5ff6a20a25b40540bcc6f65aa0c7",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210907083953.8948-4-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18728,
            "url": "https://patches.dpdk.org/api/series/18728/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18728",
            "date": "2021-09-07T08:39:44",
            "name": "[v3,01/10] crypto/dpaa_sec: support DES-CBC",
            "version": 3,
            "mbox": "https://patches.dpdk.org/series/18728/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98144/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/98144/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 75C2CA0C46;\n\tTue,  7 Sep 2021 10:44:52 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 682BE4113B;\n\tTue,  7 Sep 2021 10:44:40 +0200 (CEST)",
            "from EUR04-HE1-obe.outbound.protection.outlook.com\n (mail-eopbgr70043.outbound.protection.outlook.com [40.107.7.43])\n by mails.dpdk.org (Postfix) with ESMTP id E9E4F41136\n for <dev@dpdk.org>; Tue,  7 Sep 2021 10:44:38 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8949.eurprd04.prod.outlook.com (2603:10a6:10:2e0::13)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14; Tue, 7 Sep\n 2021 08:44:37 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%4]) with mapi id 15.20.4478.025; Tue, 7 Sep 2021\n 08:44:37 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SGBP274CA0024.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::36) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4478.20 via Frontend Transport; Tue, 7 Sep 2021 08:44:35 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=BRuRvy+CyeY2X5TXQ2Z4mkQiN2ExG4duogQ1HNfK5HGMx43utBig1j2iZH55iIpQYwh2X9RjP/3TF5xoQtO+ZVyeXetdSA2xlcHaxze2F7umH0JFN2zQv+xXviSXq6xUab81vGYaUFwIRqhvAlcEASaDh0wLneO5rFbdw1pMemTMyk2arjcUHoB4Y+QkbwxLg5Qh9/mdsBlO66yUrNapvG0NZmCMBHTtGWgOoKvIZY/86Xk/eiy5v/n9fpLvjA2vu6+aa1IquQAmXs6K046RoQjRSUk0nbYj/sIi7eeNNnMIsiWGWrRIP37cUlJLExO+FfRYWsQVlScHbd1Th2asMw==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=bEIyEIZTFzPH8Q/eZ5eTHPrDk0xotFP+NSgPBWkjmkg=;\n b=cc8L9iuN9dG3d+dM+n6e8VQ67ppL5DgpOIKHVGc0EXtg6r19jQ05Pd1BDo4rTyIZbh8dRrJR+zEkj7vUJ52X599/mqmUlcULv/I0FSI74QAjoDluzCj8G7dW8MO6MBT8bVy6b9MVRtuYrFwC9O/h/UrHTtQ4DvJ5OUYOu2Va+jtUE+coFDirIm40IZVdForFVE/6joOWVPnRoDz5bXrotxRerLVVXa4WB2PcbGBtWh/wmT+f+BnYoa8MNlLigpxg9Uajn70wpvGjOXDnAlgI23fh5YIG0krGTZgITA4axf6KeGi7UeKl92rFBQfJ69kWUlIqj6282qREyXCUShupIQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=bEIyEIZTFzPH8Q/eZ5eTHPrDk0xotFP+NSgPBWkjmkg=;\n b=SUqXuY8BWWNr7Sa8k8axTDWZ5oiHa+9mQeSbsBwyw9nVw3FaQv9rLYUYTX00mJMN218pmqVo+R4LVTcEfXn1SnYOw5sZPxj8Uigd609/oOF1IK/fwkIzzjsJHbjK960D+W47UNvzcP0OIsQg/1dpRd5OFeOwaldR6zY8kpEHvmM=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Tue,  7 Sep 2021 14:09:47 +0530",
        "Message-Id": "<20210907083953.8948-4-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210907083953.8948-1-hemant.agrawal@nxp.com>",
        "References": "<20210825081837.23830-1-hemant.agrawal@nxp.com>\n <20210907083953.8948-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SGBP274CA0024.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::36)\n To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "e504fb2e-6f53-430c-a9aa-08d971dbb94a",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8949:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB8949E17B8A7162337839B23989D39@DU2PR04MB8949.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:359;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n N4h4wQF7FxqrlcGL/H0cvMVCo5U0mNEhQefDiZlIBULZPUBBfx2800wsdPltJtL51h1iLpD6qEnGFifxHNdK2T4o+DkeYREoKBNIby5o66t7ClzpoMuwDFkp3ZJ6ELqD+j4vZuatHpN4katR85+c0kLWI7YF2SA6AZlyoT/ZwKM8TBeQzqjUyA/ieIX8YaaBsdgHRpqPlfDmKrtq3irGGoYw7GQHmlhfYsZp2zO65SkoWZ6QjxvCvbFKb+IkSl2zW9EFR20ZH6RmVTBg6aD0gF33cZcOij3xx5hMvVHo9+56Kl/0zpkUIZo3h/9R87mca++2F94xzpHwCddCvXJVUWWsWERoAm7rcPaA360uGgXzGlaArdcbijt7gQAnEv2zdSEw2RlCXhDUAwjMVWjCvaYAi43JGAaNflj1zOzTAuq3gDlQndeXvvqAnqfUaQYXUemeRyaBw1WzDWcOS+sgS8kcJ4kvirmlydWZYCI4HLJDflSn7PJdFRMMe2c5jKusc/W8yZW2M2vM5t825tFzgcHODMJgP65TW3ToMklCEuA5Vaiq3SurspPCa2OzJss6+wCQZupMAHyjTGkU13sf6fy2821RGAo7b/XFOCU7NHLPDOxjw71FW/ujmGzM1wvhgdFn/BOHSM7jRYpHPq2Ng/NZfhGr/rcdQaPntnuxKfYb8h08nAu5+969cSbssT3n8CkZPGHLG6gPCeZsvELdtw==",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(396003)(366004)(136003)(376002)(346002)(39860400002)(86362001)(36756003)(38100700002)(38350700002)(316002)(44832011)(52116002)(6506007)(6512007)(186003)(2906002)(956004)(6666004)(5660300002)(8936002)(8676002)(6486002)(2616005)(26005)(1076003)(83380400001)(4326008)(66946007)(478600001)(66556008)(66476007);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e504fb2e-6f53-430c-a9aa-08d971dbb94a",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 Sep 2021 08:44:37.1932 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n fHPEIvXTIyXhsP08AVevQEFcOJlcWHPrZpu+ohWrcvhrjnXRfaJEAxcU6o8Zfhaq8LyBCac6B8tmZ1VQ03Qfzw==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8949",
        "Subject": "[dpdk-dev] [PATCH v3 04/10] crypto/dpaa_sec: add support for AES\n CMAC integrity check",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nThis patch adds support for AES_CMAC integrity in non-security mode.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n doc/guides/cryptodevs/features/dpaa_sec.ini |  1 +\n drivers/crypto/dpaa_sec/dpaa_sec.c          | 10 +++++\n drivers/crypto/dpaa_sec/dpaa_sec.h          | 43 +++++++++++++++++++++\n 3 files changed, 54 insertions(+)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/dpaa_sec.ini b/doc/guides/cryptodevs/features/dpaa_sec.ini\nindex d7bc319373..6a8f77fb1d 100644\n--- a/doc/guides/cryptodevs/features/dpaa_sec.ini\n+++ b/doc/guides/cryptodevs/features/dpaa_sec.ini\n@@ -48,6 +48,7 @@ SHA512 HMAC  = Y\n SNOW3G UIA2  = Y\n ZUC EIA3     = Y\n AES XCBC MAC = Y\n+AES CMAC (128) = Y\n \n ;\n ; Supported AEAD algorithms of the 'dpaa_sec' crypto driver.\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c\nindex dab0ad28c0..7d3f971f3c 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c\n@@ -525,6 +525,7 @@ dpaa_sec_prep_cdb(dpaa_sec_session *ses)\n \t\t\t\t\t\tses->digest_length);\n \t\t\tbreak;\n \t\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\t\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n \t\t\tshared_desc_len = cnstr_shdsc_aes_mac(\n \t\t\t\t\t\tcdb->sh_desc,\n \t\t\t\t\t\ttrue, swap, SHR_NEVER,\n@@ -2177,6 +2178,10 @@ dpaa_sec_auth_init(struct rte_cryptodev *dev __rte_unused,\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_AES;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_XCBC_MAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_AES;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_CMAC;\n+\t\tbreak;\n \tdefault:\n \t\tDPAA_SEC_ERR(\"Crypto: Unsupported Auth specified %u\",\n \t\t\t      xform->auth.algo);\n@@ -2262,6 +2267,10 @@ dpaa_sec_chain_init(struct rte_cryptodev *dev __rte_unused,\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_AES;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_XCBC_MAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_AES;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_CMAC;\n+\t\tbreak;\n \tdefault:\n \t\tDPAA_SEC_ERR(\"Crypto: Unsupported Auth specified %u\",\n \t\t\t      auth_xform->algo);\n@@ -2697,6 +2706,7 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform,\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_AES_CMAC:\n \t\tsession->auth_key.alg = OP_PCL_IPSEC_AES_CMAC_96;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_CMAC;\n \t\tbreak;\n \tcase RTE_CRYPTO_AUTH_NULL:\n \t\tsession->auth_key.alg = OP_PCL_IPSEC_HMAC_NULL;\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h\nindex 153747c87c..faa740618f 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.h\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.h\n@@ -738,6 +738,49 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{       /* AES CMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_AES_CMAC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 12,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 4\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n+\t{       /* AES XCBC HMAC */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_AES_XCBC_MAC,\n+\t\t\t\t.block_size = 16,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 1,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 1\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 12,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 4\n+\t\t\t\t},\n+\t\t\t\t.aad_size = { 0 },\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n \n",
    "prefixes": [
        "v3",
        "04/10"
    ]
}