get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/98261/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 98261,
    "url": "https://patches.dpdk.org/api/patches/98261/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20210908065953.28349-2-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210908065953.28349-2-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210908065953.28349-2-hemant.agrawal@nxp.com",
    "date": "2021-09-08T06:59:45",
    "name": "[v4,02/10] crypto/dpaa_sec: support non-HMAC auth algos",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "b43d6c494cd0542d1dfe3d67e1359331db8c0fe9",
    "submitter": {
        "id": 477,
        "url": "https://patches.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20210908065953.28349-2-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18754,
            "url": "https://patches.dpdk.org/api/series/18754/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=18754",
            "date": "2021-09-08T06:59:44",
            "name": "[v4,01/10] crypto/dpaa_sec: support DES-CBC",
            "version": 4,
            "mbox": "https://patches.dpdk.org/series/18754/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/98261/comments/",
    "check": "warning",
    "checks": "https://patches.dpdk.org/api/patches/98261/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 47EF1A0C56;\n\tWed,  8 Sep 2021 09:04:07 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 8D30941134;\n\tWed,  8 Sep 2021 09:04:04 +0200 (CEST)",
            "from EUR04-DB3-obe.outbound.protection.outlook.com\n (mail-eopbgr60046.outbound.protection.outlook.com [40.107.6.46])\n by mails.dpdk.org (Postfix) with ESMTP id 6C9524112E\n for <dev@dpdk.org>; Wed,  8 Sep 2021 09:04:03 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DU2PR04MB8903.eurprd04.prod.outlook.com (2603:10a6:10:2e2::9) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.22; Wed, 8 Sep\n 2021 07:04:02 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::945d:e362:712d:1b80%4]) with mapi id 15.20.4478.025; Wed, 8 Sep 2021\n 07:04:02 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR01CA0087.apcprd01.prod.exchangelabs.com (2603:1096:3:15::13) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend\n Transport; Wed, 8 Sep 2021 07:04:01 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=NI69GCMtnLI6HRatZVCpthhyNzdUxFjdRGn3t2SPeOCV8kPbXKeacAfL7hh5ayNuJdaYtJX5H1hi5e006OeMckX4gY8jja7Dml+pu9Fo/CVpVUKnmqq3DBSIvFj9gFCweCICdfI9UFAsjW4dV30p2HO1E3PIhjyBRHVf7HiAZc39POeh3Np4brG4jyTfastWkc4wItPwYXduTOEeVSRPhN1onIugvWY07j2R12x4tMGcEIdhRUXCyKh3hTBdRSYv/mxxrBr1OYwdFlEZMz7WqTouxhmjG0Y23tcX/4EbQZF+asNWHMaaTmNApwYLfBCs7yzy0EBfpnNlqWfX2h8M8w==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n bh=d4O+ADMW8bsB9QHVli2s8cNEqht216Gu+5l9qki2DF0=;\n b=EeqPBB+sF4HZMLdU3sNOPvN28qH0NIGTwQz1KxT4sbWmrrepVNzWErUsIGHnwjphv6gi9/SnSB6w7WqfpgpafQ1eatU2/cXFByAuuQkqHoiD3m3kMIFinYwqxl/WLxE9T/xJzpXBpD8TdQwod9G80gVIDitKp8QSwGxG5O/q5itYdpdq3hylrVJ0X6YJSPE/Bk5Wu8qRK5F3Wk2e5s6XXYkcmXOe+JT9U1KCNEiZnlB7AjSeIf4QK+t0hefkA1cj290Q6xIko4kE1PZg0t9/ZF0B7NADq3j6aXwjACEYnEq5JT86omkd9EvaIarOOsbZyWHTimEQX1hJxDpnyjAN/w==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=d4O+ADMW8bsB9QHVli2s8cNEqht216Gu+5l9qki2DF0=;\n b=QHPQa61MHY4GMjwFJhgf2Yb2RmlJAnqEGv9jHgED5U4Q/0D5Nw1xlKCHoAkfpU1Z2NmMWawarWEHavLB023VNlgvrc9RO2/yfuvffQhKWlVtz7GI4AouufBtIkvH7zLJ61FC6+qFtYTDQ5O6xx19Ri/pjNv0rq2qG/AcXOhYQts=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Wed,  8 Sep 2021 12:29:45 +0530",
        "Message-Id": "<20210908065953.28349-2-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210908065953.28349-1-hemant.agrawal@nxp.com>",
        "References": "<20210907083953.8948-1-hemant.agrawal@nxp.com>\n <20210908065953.28349-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR01CA0087.apcprd01.prod.exchangelabs.com\n (2603:1096:3:15::13) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "7a95d4a9-ce4b-4579-6c1d-08d97296d6ac",
        "X-MS-TrafficTypeDiagnostic": "DU2PR04MB8903:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DU2PR04MB890363B401D98AF934DC2DB889D49@DU2PR04MB8903.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:4502;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(366004)(136003)(396003)(39860400002)(346002)(376002)(52116002)(38100700002)(956004)(478600001)(83380400001)(86362001)(5660300002)(38350700002)(6666004)(6486002)(316002)(1076003)(2906002)(4326008)(44832011)(6512007)(6506007)(2616005)(36756003)(8936002)(66946007)(66556008)(186003)(66476007)(26005)(8676002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 7a95d4a9-ce4b-4579-6c1d-08d97296d6ac",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "08 Sep 2021 07:04:02.4021 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n WpTfwKMuHMzaoXW5DKhnmQvKqPX+JMBITyEHq9QpADtaK7oCkzkYzVnkoQIY4Uub8UZJqVXY3P0lVcZ72OJZcg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DU2PR04MB8903",
        "Subject": "[dpdk-dev] [PATCH v4 02/10] crypto/dpaa_sec: support non-HMAC auth\n algos",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nThis patch add support for non-HMAC, md5, shax algos.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n doc/guides/cryptodevs/features/dpaa_sec.ini |   8 +-\n doc/guides/rel_notes/release_21_11.rst      |   2 +-\n drivers/crypto/dpaa_sec/dpaa_sec.c          |  55 +++++++--\n drivers/crypto/dpaa_sec/dpaa_sec.h          | 126 ++++++++++++++++++++\n 4 files changed, 181 insertions(+), 10 deletions(-)",
    "diff": "diff --git a/doc/guides/cryptodevs/features/dpaa_sec.ini b/doc/guides/cryptodevs/features/dpaa_sec.ini\nindex 5d0d04d601..eab14da96c 100644\n--- a/doc/guides/cryptodevs/features/dpaa_sec.ini\n+++ b/doc/guides/cryptodevs/features/dpaa_sec.ini\n@@ -33,11 +33,17 @@ ZUC EEA3      = Y\n ; Supported authentication algorithms of the 'dpaa_sec' crypto driver.\n ;\n [Auth]\n+MD5          = Y\n MD5 HMAC     = Y\n+SHA1         = Y\n SHA1 HMAC    = Y\n+SHA224       = Y\n SHA224 HMAC  = Y\n+SHA256       = Y\n SHA256 HMAC  = Y\n+SHA384       = Y\n SHA384 HMAC  = Y\n+SHA512       = Y\n SHA512 HMAC  = Y\n SNOW3G UIA2  = Y\n ZUC EIA3     = Y\n@@ -53,4 +59,4 @@ AES GCM (256) = Y\n ;\n ; Supported Asymmetric algorithms of the 'dpaa_sec' crypto driver.\n ;\n-[Asymmetric]\n\\ No newline at end of file\n+[Asymmetric]\ndiff --git a/doc/guides/rel_notes/release_21_11.rst b/doc/guides/rel_notes/release_21_11.rst\nindex 4aa16d6915..88c2a31d49 100644\n--- a/doc/guides/rel_notes/release_21_11.rst\n+++ b/doc/guides/rel_notes/release_21_11.rst\n@@ -75,7 +75,7 @@ New Features\n \n * **Updated NXP dpaa_sec crypto PMD.**\n \n-  * Added DES-CBC algo support\n+  * Added DES-CBC and non-HMAC algo support\n \n Removed Items\n -------------\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c\nindex af5c7c499c..95b9d7414f 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c\n@@ -489,6 +489,18 @@ dpaa_sec_prep_cdb(dpaa_sec_session *ses)\n \t\talginfo_a.algtype = ses->auth_key.alg;\n \t\talginfo_a.algmode = ses->auth_key.algmode;\n \t\tswitch (ses->auth_alg) {\n+\t\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\t\tshared_desc_len = cnstr_shdsc_hash(\n+\t\t\t\t\t\tcdb->sh_desc, true,\n+\t\t\t\t\t\tswap, SHR_NEVER, &alginfo_a,\n+\t\t\t\t\t\t!ses->dir,\n+\t\t\t\t\t\tses->digest_length);\n+\t\t\tbreak;\n \t\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n \t\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n \t\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n@@ -2080,43 +2092,70 @@ dpaa_sec_auth_init(struct rte_cryptodev *dev __rte_unused,\n {\n \tsession->ctxt = DPAA_SEC_AUTH;\n \tsession->auth_alg = xform->auth.algo;\n-\tsession->auth_key.data = rte_zmalloc(NULL, xform->auth.key.length,\n+\tsession->auth_key.length = xform->auth.key.length;\n+\tif (xform->auth.key.length) {\n+\t\tsession->auth_key.data =\n+\t\t\t\trte_zmalloc(NULL, xform->auth.key.length,\n \t\t\t\t\t     RTE_CACHE_LINE_SIZE);\n-\tif (session->auth_key.data == NULL && xform->auth.key.length > 0) {\n-\t\tDPAA_SEC_ERR(\"No Memory for auth key\");\n-\t\treturn -ENOMEM;\n+\t\tif (session->auth_key.data == NULL) {\n+\t\t\tDPAA_SEC_ERR(\"No Memory for auth key\");\n+\t\t\treturn -ENOMEM;\n+\t\t}\n+\t\tmemcpy(session->auth_key.data, xform->auth.key.data,\n+\t\t\t\txform->auth.key.length);\n+\n \t}\n-\tsession->auth_key.length = xform->auth.key.length;\n \tsession->digest_length = xform->auth.digest_length;\n \tif (session->cipher_alg == RTE_CRYPTO_CIPHER_NULL) {\n \t\tsession->iv.offset = xform->auth.iv.offset;\n \t\tsession->iv.length = xform->auth.iv.length;\n \t}\n \n-\tmemcpy(session->auth_key.data, xform->auth.key.data,\n-\t       xform->auth.key.length);\n-\n \tswitch (xform->auth.algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA1;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA1;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_MD5;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_MD5;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA224;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA224;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA256;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA256;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA384;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA384;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA512;\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HASH;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n \t\tsession->auth_key.alg = OP_ALG_ALGSEL_SHA512;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h\nindex 216e8c8b6f..d500a4c246 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.h\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.h\n@@ -240,6 +240,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, },\n \t\t}, },\n \t},\n+\t{       /* MD5 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_MD5,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 16,\n+\t\t\t\t\t.max = 16,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* MD5 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -261,6 +282,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA1 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA1,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 20,\n+\t\t\t\t\t.max = 20,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA1 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -282,6 +324,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA224 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA224,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 28,\n+\t\t\t\t\t.max = 28,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA224 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -303,6 +366,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA256 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA256,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 32,\n+\t\t\t\t\t.max = 32,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA256 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -324,6 +408,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA384 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA384,\n+\t\t\t\t.block_size = 64,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 48,\n+\t\t\t\t\t.max = 48,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA384 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n@@ -345,6 +450,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = {\n \t\t\t}, }\n \t\t}, }\n \t},\n+\t{\t/* SHA512 */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t{.sym = {\n+\t\t\t.xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,\n+\t\t\t{.auth = {\n+\t\t\t\t.algo = RTE_CRYPTO_AUTH_SHA512,\n+\t\t\t\t.block_size = 128,\n+\t\t\t\t.key_size = {\n+\t\t\t\t\t.min = 0,\n+\t\t\t\t\t.max = 0,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.digest_size = {\n+\t\t\t\t\t.min = 64,\n+\t\t\t\t\t.max = 64,\n+\t\t\t\t\t.increment = 0\n+\t\t\t\t},\n+\t\t\t\t.iv_size = { 0 }\n+\t\t\t}, }\n+\t\t}, }\n+\t},\n \t{\t/* SHA512 HMAC */\n \t\t.op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,\n \t\t{.sym = {\n",
    "prefixes": [
        "v4",
        "02/10"
    ]
}