get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/131740/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 131740,
    "url": "http://patchwork.dpdk.org/api/patches/131740/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20230920133403.6420-14-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230920133403.6420-14-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20230920133403.6420-14-hemant.agrawal@nxp.com",
    "date": "2023-09-20T13:34:03",
    "name": "[v2,13/13] crypto/dpaax_sec: enable sha224-hmac support for IPsec",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "af42dc540d5b9b83ad0ffc2664af601a19ddb57d",
    "submitter": {
        "id": 477,
        "url": "http://patchwork.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20230920133403.6420-14-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 29574,
            "url": "http://patchwork.dpdk.org/api/series/29574/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=29574",
            "date": "2023-09-20T13:33:50",
            "name": "crypto/dpaax_sec: misc enhancements",
            "version": 2,
            "mbox": "http://patchwork.dpdk.org/series/29574/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/131740/comments/",
    "check": "fail",
    "checks": "http://patchwork.dpdk.org/api/patches/131740/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id E6386425EA;\n\tWed, 20 Sep 2023 15:36:30 +0200 (CEST)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 761FE42DF7;\n\tWed, 20 Sep 2023 15:34:43 +0200 (CEST)",
            "from EUR03-DBA-obe.outbound.protection.outlook.com\n (mail-dbaeur03on2040.outbound.protection.outlook.com [40.107.104.40])\n by mails.dpdk.org (Postfix) with ESMTP id 38A5442D95\n for <dev@dpdk.org>; Wed, 20 Sep 2023 15:34:40 +0200 (CEST)",
            "from PAXPR04MB9328.eurprd04.prod.outlook.com (2603:10a6:102:2b6::15)\n by AS8PR04MB7606.eurprd04.prod.outlook.com (2603:10a6:20b:23e::8)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.27; Wed, 20 Sep\n 2023 13:34:38 +0000",
            "from PAXPR04MB9328.eurprd04.prod.outlook.com\n ([fe80::450d:89ac:4f6a:6ae2]) by PAXPR04MB9328.eurprd04.prod.outlook.com\n ([fe80::450d:89ac:4f6a:6ae2%4]) with mapi id 15.20.6792.021; Wed, 20 Sep 2023\n 13:34:37 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=Xxif286TvVgpjEBtEqrc3ed1jvAXX5Ij/UgynIicYVolsHdVHpTV3YGrLYI3Kt0yPOZvDRrywzhUFYuShSgcq7dsK1YeZjlicICzfLBLSVEluImwIeHRyhp8+lkDmOr++nsXjxgaL4KvnQP5QRQPcWgCYPzlxsmL0mYaWORlF/7iXjTuUpKbk5lZitxkUixLt4M1AJxPfh59P5G/SJshAQ8XaHihP18xYy4nVkR4Fg1Qci4KEMjF/02FwY+hyqOx0ARqoTk0sZqJNlIRrLykE2I0XBqomXyaJgaZiSiYcLqRPOou+wTKz8gZlJb6+vVFHsT4xci1Tv78yajf4lq0OQ==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=JJzEtjmEUfWPHGIiixk/UNGbsm+UaRpAMqfl7EPYmM8=;\n b=m5J5fUhcdhiJbnWUv33FutbIgaxc+kFQlBHNCdLVtdhPWyOzz73DzUb1fFoa+KF4sO9qHyHx09RrG7EkTjw1YO18f7unAXcnG/4iYIvPxmidvtmXgdcIpZCk5ONNqvvJe5Qxn2hPdO9RbW/PlZEq80lVrS4TzlMb6dofjhPqZEb1J70cwEsPErgC3Cyg9IFHJYG+/BzQLYOnC8nmFlTtmHYhB8XJI1JmAOv1yRU6NSDbn2pNpxyN4d1PfmYQ9KeZglyVM/sMeplrsFdAwcSjs2HzbcUJk4+OkvhqzlUn8BRaPzpfYiRZpyZcNUPp4WADKP0etS5+mSX/QwTHdDErEw==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=JJzEtjmEUfWPHGIiixk/UNGbsm+UaRpAMqfl7EPYmM8=;\n b=IaWDxbPtiOBwjuGc55cUO2iKWAVSDFYbny2gfx7tpc/W525sXUZy+P898u/jsU5AYjQt9PXiwllhzGqY3MulPfdMlE25OtSXYsTnb0JqS5De9yJLCh55vOWw7v7LmN0nr4woitL4QhUhPA+0RAGou8kdhrSjGF7ib+jZx6ET+IM=",
        "Authentication-Results": "dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "gakhil@marvell.com",
        "Cc": "dev@dpdk.org",
        "Subject": "[PATCH v2 13/13] crypto/dpaax_sec: enable sha224-hmac support for\n IPsec",
        "Date": "Wed, 20 Sep 2023 19:04:03 +0530",
        "Message-Id": "<20230920133403.6420-14-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20230920133403.6420-1-hemant.agrawal@nxp.com>",
        "References": "<20230823070855.27532-1-hemant.agrawal@nxp.com>\n <20230920133403.6420-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SI2PR01CA0015.apcprd01.prod.exchangelabs.com\n (2603:1096:4:191::15) To PAXPR04MB9328.eurprd04.prod.outlook.com\n (2603:10a6:102:2b6::15)",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "PAXPR04MB9328:EE_|AS8PR04MB7606:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "ee963275-3386-4ab5-496f-08dbb9de55c5",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n Qgc1nshIvWn5VRPKZWoKCwC1gheoA6qnKEyD+UAn6C48rxoWUoQ+QOz/40TH2RoS5NIH38LGr2TiBCbNHaEUy7H8/3x3nuUQeGPUIXobebd+48HqgpKjfOXGiM58M8gosow4DgGYNyxlEx+MK/mjQobEBooNhqmb1G2MF1iM4mdQ4bFaRnXpqtlxQl1IfM9FuYa65/MKNjRbrtjlSahgAVWAZDYrEmpx/88m1OIWL4atUA/+aFj6dg9Y0HJ3t6HM/9BUr4mAtUjW2RZUKZOBjq6pR1qC8VvelXWcJaJ7ERlt26VFdiYn2WbVqaDYfJeP+En5od7+GbD4cRSIpjdEOrC+F/WbFRF0Ai/3rPD/uGcOGzQEyEmG6QkfP01mk+kJMkK5U/FM+po/o3vV39iMyh3ncH7Ltd0Es3h+jpuPjRwP4bUmm/iymytrIDMctFbuJjSJexGp/YIXtw7S3rE+PY4h93UnZuloC/jrSnyuijZcFbWxc9nPhSVnPJC7kSYeEaNGf7k4CvcAt/4gyal62q1gg7YyzCraems8hEbLkxnVLEAZWYMw3nwYM2H91DgoagHgmwhuSsUfK5ETe5pZh1tqoACHAgEiK49MEJZbBDZOEabu1sdxP/fZa419vfEV",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:PAXPR04MB9328.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(13230031)(396003)(366004)(136003)(376002)(346002)(39860400002)(451199024)(186009)(1800799009)(6506007)(52116002)(6666004)(6512007)(478600001)(26005)(6486002)(4326008)(2616005)(41300700001)(5660300002)(2906002)(66946007)(66476007)(66556008)(8676002)(83380400001)(8936002)(6916009)(44832011)(316002)(1076003)(86362001)(36756003)(38100700002)(38350700002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n ee963275-3386-4ab5-496f-08dbb9de55c5",
        "X-MS-Exchange-CrossTenant-AuthSource": "PAXPR04MB9328.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "20 Sep 2023 13:34:37.7295 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n AkCiHTboi56mGHz55xp9NhwtW1d/qmtGRakSu1mtUu2fB7OJDe7lqsOMDlKpHVtehbbhOYpMLe9devtVNOD8mg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "AS8PR04MB7606",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Enabling the SHA224 support in ipsec proto mode\nfor dpaax drivers.\n\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n drivers/common/dpaax/caamflib/desc.h             |  5 ++++-\n drivers/common/dpaax/caamflib/desc/ipsec.h       |  5 +++++\n drivers/common/dpaax/caamflib/rta/protocol_cmd.h |  5 ++++-\n drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c      | 10 +++++++++-\n drivers/crypto/dpaa_sec/dpaa_sec.c               | 10 +++++++++-\n 5 files changed, 31 insertions(+), 4 deletions(-)",
    "diff": "diff --git a/drivers/common/dpaax/caamflib/desc.h b/drivers/common/dpaax/caamflib/desc.h\nindex 635d6bad07..4a1285c4d4 100644\n--- a/drivers/common/dpaax/caamflib/desc.h\n+++ b/drivers/common/dpaax/caamflib/desc.h\n@@ -1,7 +1,7 @@\n /* SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0)\n  *\n  * Copyright 2008-2016 Freescale Semiconductor Inc.\n- * Copyright 2016, 2019 NXP\n+ * Copyright 2016, 2019, 2023 NXP\n  *\n  */\n \n@@ -662,6 +662,9 @@ extern enum rta_sec_era rta_sec_era;\n #define OP_PCL_IPSEC_HMAC_SHA2_256_128\t\t 0x000c\n #define OP_PCL_IPSEC_HMAC_SHA2_384_192\t\t 0x000d\n #define OP_PCL_IPSEC_HMAC_SHA2_512_256\t\t 0x000e\n+#define OP_PCL_IPSEC_HMAC_SHA2_224_96\t\t 0x00f2\n+#define OP_PCL_IPSEC_HMAC_SHA2_224_112\t\t 0x00f4\n+#define OP_PCL_IPSEC_HMAC_SHA2_224_224\t\t 0x00f8\n \n /* For SRTP - OP_PCLID_SRTP */\n #define OP_PCL_SRTP_CIPHER_MASK\t\t\t 0xff00\ndiff --git a/drivers/common/dpaax/caamflib/desc/ipsec.h b/drivers/common/dpaax/caamflib/desc/ipsec.h\nindex 14e80baf77..95fc3ea5ba 100644\n--- a/drivers/common/dpaax/caamflib/desc/ipsec.h\n+++ b/drivers/common/dpaax/caamflib/desc/ipsec.h\n@@ -710,6 +710,11 @@ static inline void __gen_auth_key(struct program *program,\n \tcase OP_PCL_IPSEC_HMAC_SHA2_512_256:\n \t\tdkp_protid = OP_PCLID_DKP_SHA512;\n \t\tbreak;\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_96:\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_112:\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_224:\n+\t\tdkp_protid = OP_PCLID_DKP_SHA224;\n+\t\tbreak;\n \tdefault:\n \t\tKEY(program, KEY2, authdata->key_enc_flags, authdata->key,\n \t\t    authdata->keylen, INLINE_KEY(authdata));\ndiff --git a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h\nindex ac5c8af716..5b33f103be 100644\n--- a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h\n+++ b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h\n@@ -1,7 +1,7 @@\n /* SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0)\n  *\n  * Copyright 2008-2016 Freescale Semiconductor Inc.\n- * Copyright 2016,2019 NXP\n+ * Copyright 2016,2019,2023 NXP\n  *\n  */\n \n@@ -241,6 +241,9 @@ __rta_ipsec_proto(uint16_t protoinfo)\n \tcase OP_PCL_IPSEC_HMAC_MD5_128:\n \tcase OP_PCL_IPSEC_HMAC_SHA1_160:\n \tcase OP_PCL_IPSEC_AES_CMAC_96:\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_96:\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_112:\n+\tcase OP_PCL_IPSEC_HMAC_SHA2_224_224:\n \tcase OP_PCL_IPSEC_HMAC_SHA2_256_128:\n \tcase OP_PCL_IPSEC_HMAC_SHA2_384_192:\n \tcase OP_PCL_IPSEC_HMAC_SHA2_512_256:\ndiff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c\nindex 77ed68ad6d..bb5a2c629e 100644\n--- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c\n+++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c\n@@ -3005,6 +3005,15 @@ dpaa2_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform,\n \t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_MD5_96;\n \t\tauthdata->algmode = OP_ALG_AAI_HMAC;\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\t\tauthdata->algmode = OP_ALG_AAI_HMAC;\n+\t\tif (session->digest_length == 6)\n+\t\t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_96;\n+\t\telse if (session->digest_length == 14)\n+\t\t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_224;\n+\t\telse\n+\t\t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_112;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n \t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_256_128;\n \t\tauthdata->algmode = OP_ALG_AAI_HMAC;\n@@ -3032,7 +3041,6 @@ dpaa2_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform,\n \tcase RTE_CRYPTO_AUTH_NULL:\n \t\tauthdata->algtype = OP_PCL_IPSEC_HMAC_NULL;\n \t\tbreak;\n-\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n \tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n \tcase RTE_CRYPTO_AUTH_SHA1:\n \tcase RTE_CRYPTO_AUTH_SHA256:\ndiff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c\nindex 0fcba95916..a301e8edb2 100644\n--- a/drivers/crypto/dpaa_sec/dpaa_sec.c\n+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c\n@@ -2817,6 +2817,15 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform,\n \t\t\t\"+++Using sha256-hmac truncated len is non-standard,\"\n \t\t\t\"it will not work with lookaside proto\");\n \t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n+\t\tif (session->digest_length == 6)\n+\t\t\tsession->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_96;\n+\t\telse if (session->digest_length == 14)\n+\t\t\tsession->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_224;\n+\t\telse\n+\t\t\tsession->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_112;\n+\t\tbreak;\n \tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n \t\tsession->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_384_192;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_HMAC;\n@@ -2836,7 +2845,6 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform,\n \t\tsession->auth_key.alg = OP_PCL_IPSEC_AES_XCBC_MAC_96;\n \t\tsession->auth_key.algmode = OP_ALG_AAI_XCBC_MAC;\n \t\tbreak;\n-\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n \tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n \tcase RTE_CRYPTO_AUTH_SHA1:\n \tcase RTE_CRYPTO_AUTH_SHA256:\n",
    "prefixes": [
        "v2",
        "13/13"
    ]
}