get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/40874/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 40874,
    "url": "http://patchwork.dpdk.org/api/patches/40874/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/1528476325-15585-14-git-send-email-anoob.joseph@caviumnetworks.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1528476325-15585-14-git-send-email-anoob.joseph@caviumnetworks.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1528476325-15585-14-git-send-email-anoob.joseph@caviumnetworks.com",
    "date": "2018-06-08T16:45:22",
    "name": "[dpdk-dev,13/16] crypto/cpt: adds the session related function callbacks",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "472d48f8e63d501bedbd4ff70fd0acba1345c0ba",
    "submitter": {
        "id": 893,
        "url": "http://patchwork.dpdk.org/api/people/893/?format=api",
        "name": "Anoob Joseph",
        "email": "anoob.joseph@caviumnetworks.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/1528476325-15585-14-git-send-email-anoob.joseph@caviumnetworks.com/mbox/",
    "series": [
        {
            "id": 58,
            "url": "http://patchwork.dpdk.org/api/series/58/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=58",
            "date": "2018-06-08T16:45:09",
            "name": "Adding Cavium's crypto device(CPT) driver",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/58/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/40874/comments/",
    "check": "warning",
    "checks": "http://patchwork.dpdk.org/api/patches/40874/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id B999F1BB82;\n\tFri,  8 Jun 2018 18:49:38 +0200 (CEST)",
            "from NAM04-SN1-obe.outbound.protection.outlook.com\n\t(mail-eopbgr700073.outbound.protection.outlook.com [40.107.70.73])\n\tby dpdk.org (Postfix) with ESMTP id 0743E1BB82\n\tfor <dev@dpdk.org>; Fri,  8 Jun 2018 18:49:36 +0200 (CEST)",
            "from ajoseph83.caveonetworks.com.caveonetworks.com (115.113.156.2)\n\tby SN6PR07MB4911.namprd07.prod.outlook.com (2603:10b6:805:3c::29)\n\twith Microsoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.820.15;\n\tFri, 8 Jun 2018 16:49:31 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=e8N+gFqXyyKGgp4qhnQv4GcJBS7tnikqC3Nc0sJrDcw=;\n\tb=oKmLAy0LHQv7xDvupIt6PKyK3w0O1Cl11nyj1etH3tfwweIUMeuoXM+bjP4xY/o3Hr5rrsH+wCyW/iVS/b9gC3yKAifl9kcYiokCVSapu2O4DqVKfs51e1wtvZyR+N24VQDIKkfByXAxwvzqKoHBGzDeqDEop6fDV5yJtvuOLfg=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Anoob.Joseph@cavium.com; ",
        "From": "Anoob Joseph <anoob.joseph@caviumnetworks.com>",
        "To": "Akhil Goyal <akhil.goyal@nxp.com>,\n\tPablo de Lara <pablo.de.lara.guarch@intel.com>,\n\tThomas Monjalon <thomas@monjalon.net>",
        "Cc": "Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>,\n\tAnkur Dwivedi <ankur.dwivedi@cavium.com>,\n\tJerin Jacob <jerin.jacob@caviumnetworks.com>,\n\tMurthy NSSR <Nidadavolu.Murthy@cavium.com>,\n\tNarayana Prasad <narayanaprasad.athreya@caviumnetworks.com>,\n\tNithin Dabilpuram <nithin.dabilpuram@cavium.com>,\n\tSrisivasubramanian Srinivasan\n\t<Srisivasubramanian.Srinivasan@cavium.com>, dev@dpdk.org",
        "Date": "Fri,  8 Jun 2018 22:15:22 +0530",
        "Message-Id": "<1528476325-15585-14-git-send-email-anoob.joseph@caviumnetworks.com>",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "References": "<1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[115.113.156.2]",
        "X-ClientProxiedBy": "BM1PR01CA0071.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:b00:1::11) To SN6PR07MB4911.namprd07.prod.outlook.com\n\t(2603:10b6:805:3c::29)",
        "X-MS-PublicTrafficType": "Email",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(7020095)(4652020)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);\n\tSRVR:SN6PR07MB4911; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; SN6PR07MB4911;\n\t3:WpZh2kde49myHua7C23n4WuDH7L+rjYAgjTthqFvSa7SEJWIId+fgME1iyzguiksjFyFzBUBuA5JfYHfu6H7ddlJrlcJXr31lJ20nvNXj8jV1fIxu/sS/3i+XAY0tjboxu7c3EJ7zO/HGX1+3VxtZSLSS8tPDuMYk/hgQ/fH0/SZNzipNr4bg+GG2Bg+9R/ujL1bj9NiZTd56VLZTyKNGjPitpAvKGWzftGdGdiRi6BKgBYqMLfM7vwqGhmbmjew;\n\t25:7wgFQjmFlSPcJn4mL7X30D6q2EIWzmnFnNS6bxQkWOUQWkZpE/r6khtGnUA53MCP9rW9/4OJYcxOkYKK1848KkgE9KZbjigjK6dOyqBKMgdi9UJXEqNNZRKkcm8hPz72a8fhrAdBwSDRchaCRzVZY7JN8vrCQBV6usaxy7fVNMKnN4K6/4h80a9NxPekT3YVkIKIMKR2wgoh97ulknQfkgpmz9Xz7ZrkzKNgaWSnOra9aAT1Gplft+fiBSlVyOEQ1L8/H46kdqeY4w94ydLqnjW8l3rYPx+Wl4+fO7ujUwqELpriDnmuFE4A9vlceo0dtaaFRNsvDo5dHnKGIalK4w==;\n\t31:D9XmssKzr2VIExXXh22roFuACemYdERV9onwaY/2fZ9CSp/IM/9/9uBfoD4kCLElEZYgW3DB13DRWhYdiG2WjXsBczzxb73v8bvOd0VThA+LdWeVxdp+WDV6xrVs1GMkganbP7AxrrMRlDZmA1knVfJfTFPeGcLiiraXcq3qWgQZ3UwjmqEi375Zfvn3PyuGYIyhH9WYlYEXy1KAVyMsQVtf3PRUhPk/7cwrYO4twuc=",
            "1; SN6PR07MB4911;\n\t20:oh/6hkw46mmKBv73GVR2X5+z96bCUz4mvUVwjUHi4e89HZqUMpG/uW2c+vImR4xyK8sxAQFRuMFP0wRRah24DBQFacT7rkFKIDy1uAI+4DBEB9WnVCzKn17LViYQotjvr/BZqg7W6aUQePHu2GV/jw3Iynt1HckUSICNPZ8HDlRM5wyBB4brFbaWns8+Pl/maN+rFmNBwLIEao8VqN07ORlLZobNC+E3//GQyG2Q+ytrR0km5t6y1NOl+wIqObC6gRRFjdNX4YvI26BcFL3eNPbaPi9s0aLsqKzhCHIBGAIZQHU8OH8IprVd5nEUyOSjhXe7bV+L+NsIQU27100c+Z+E6txvRzPI0Rvnj36m3RKRZ3+DF3ZxAmKRTWCb8swi+nmRuWWvoIVwUGBEJKYyt0gLzgjj8B1WV/zur2QzMLaFFRSg5CM/FtCIaWqIjAKl/pcaxqjjvVrapiXTKLw9VHa/It5an9X0Om++Zz10diTUDYseYlJzKGvuWNn9MlBTNIuvKx0CIFlLGaGzUE8Gv9OQ2RB08cEoJFoUye/tmQbdKPyeeZNd8vbhH1/qU7XVeHUFx29BuxXT/bZxKXmRNSxqKzcJiIJPmVFAxE+7E/8=;\n\t4:AB3Db0LaBq6/MsYqnYt1OBh4JeHb7a4XVHpwDvuK7vkGCMmHVknVyLW5xcFEEYD/83b9dHedgocbyVKID+3LbM5Ai5rCQS1Cjypljj3mNv8JLxhj6qE5aeggnpyzSBk7NCFMf4vI+4J5lQSU+h67Pg7hMoNIlQOYbX6NpgXSAk/+LuI1WHOU1eChC3pxCEcjRYk1ezjLUKhCT8WNZ6RjDmyKl63PvLiK+VzpfY8UIgyCzO6FZjWmXxRkkVaZzDcjNpCJOToSXu91HlUOPIlih4IFoZlhiEnjPifuJdB3jEb2KdrgNkDvTnfIipOkv+UN",
            "=?us-ascii?Q?1; SN6PR07MB4911;\n\t23:7AaOa9f9uC+P1qsVsBE52R4zXiez/BVa5SjbC1Xrv?=\n\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",
            "1; SN6PR07MB4911;\n\t6:lVJwZW/cAu/V6f6dEiDWfQKlROdCFyBBWp+cw1ENOMBtXUnmCOWYS5Vcn7Heep4j6JTrs0jTNGPz7aFrfcKDSVaF5nn8BaDE8rJ8QzK36sXvxtkKH7QYBZuLzaECYwLwhUpdOoq23nKz5Jb3YIubMblgY9hTDKgzJKieKKs6by9wC38d25yyPAePEJbyXUNsYl1D9ZcgW7urxUzeAvTG3xbZ9WrLD5bT7CsWcEqWA3g6htg1gywy/RAPhTQyhFsxhJaVR4P3OdgJ3XT3Ss7sIVgjUDW/7f0naYADtq7Way4eI7ljHbsnCN1nTgtAtyXTsNwPDKZ7UKfZ7xs7hEqPTLel4LoG3c4/QvMp3C4p+xUyIFazqKPIBsr2ua1RlUiCprmiYDzQvBHg3TEXKOBcG/p47R3AAryFgYerYB+g7M6miym1NRwSx+Lbi2NjhVguPmswwn/iwOfsmKw91wIV/Q==;\n\t5:YkPPIDAYoIlZoF5cHf9eMC+b7jLQ72huJz9mczrMNYF7U5nUT+zgYb0l3oh7meEEBBMEVW+PKL5bMXkRXe+viaXB6XF5hhau4zxZMrQenoiWScn6bLgr8gyLVr2gS9/zq6FISJf8fKl76xj+V8jvWQ/s3dRHP1tCUhI6vAnk7dM=;\n\t24:nMV/QLcx07+N4PLhDaUq3u/UvDd20P/VwVIIKeTxRAVdP3CG1gsBJT8wV6FWubObSFUxvCKwE6WQ1cYusWeXcDayf5bCvw+Vddzkz+HVmLw=",
            "1; SN6PR07MB4911;\n\t7:fbNfdeXco/GCayiA+YOWfaLzo+N88snHGMAIEroXdt1vdoCxF1vAJ8Rzn3ErtXjtWOIemJfsh7MiwsVvikF8+a75CXPsyyntsb0CLyjkP+45o3JKlq3UFnOBmxpXHx6nlc/KbOFN3muPgqEk8EeMxlRL2G93zp55W9bsCsTk56vUmEdap0+ZgQXUCuGqtKT0/DcWYhxudyh1deY0fnA0bJ5dsNVYdI5HWETFQ1H3Inh5lWgO0uIcMkSjI8GoLPeb"
        ],
        "X-MS-TrafficTypeDiagnostic": "SN6PR07MB4911:",
        "X-Microsoft-Antispam-PRVS": "<SN6PR07MB49118355DA09B6D762FAA6ECF87B0@SN6PR07MB4911.namprd07.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:(131327999870524);",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3002001)(3231254)(944501410)(52105095)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016);\n\tSRVR:SN6PR07MB4911; BCL:0; PCL:0; RULEID:; SRVR:SN6PR07MB4911; ",
        "X-Forefront-PRVS": "06973FFAD3",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(376002)(396003)(346002)(39380400002)(366004)(39860400002)(189003)(199004)(26005)(52116002)(956004)(305945005)(8676002)(81156014)(50226002)(8936002)(81166006)(7736002)(68736007)(105586002)(106356001)(3846002)(6116002)(72206003)(478600001)(6486002)(97736004)(6506007)(16586007)(6512007)(53936002)(47776003)(486006)(25786009)(5660300001)(50466002)(48376002)(6666003)(4326008)(54906003)(76176011)(36756003)(110136005)(66066001)(8656006)(2906002)(316002)(55236004)(11346002)(16526019)(386003)(186003)(59450400001)(446003)(476003)(42882007)(44832011)(2616005)(51416003);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR07MB4911;\n\tH:ajoseph83.caveonetworks.com.caveonetworks.com; FPR:; SPF:None;\n\tLANG:en; PTR:InfoNoRecords; MX:1; A:1; ",
        "Received-SPF": "None (protection.outlook.com: cavium.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "fn3/1zTVg5bYXxm1VVRIhnHzKY1IZWJClGWDIqlM96OQVrABHtxZX6yDWBJSaDpV4gqLaDjxDZCHkVQxvRBPdtVECUuhSryn0E3rTUFCSYK+IW0PEMp4tevwGqxXgizxtYlmuK59t81TCdCco1vQ393x42IrxmmLe83E9WagGKSpyPv2nCqcY1/7YoYEvlsF",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Office365-Filtering-Correlation-Id": "805dfa46-4a63-47c5-e46a-08d5cd5fd0db",
        "X-OriginatorOrg": "caviumnetworks.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "08 Jun 2018 16:49:31.6674\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "805dfa46-4a63-47c5-e46a-08d5cd5fd0db",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "711e4ccf-2e9b-4bcf-a551-4094005b6194",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "SN6PR07MB4911",
        "Subject": "[dpdk-dev] [PATCH 13/16] crypto/cpt: adds the session related\n\tfunction callbacks",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>\n\nThis patch adds the session callbacks functions. The cipher\nkeys, auth keys and aead keys are set during the session configure.\n\nSigned-off-by: Ankur Dwivedi <ankur.dwivedi@cavium.com>\nSigned-off-by: Murthy NSSR <Nidadavolu.Murthy@cavium.com>\nSigned-off-by: Nithin Dabilpuram <nithin.dabilpuram@cavium.com>\nSigned-off-by: Ragothaman Jayaraman <Ragothaman.Jayaraman@cavium.com>\nSigned-off-by: Srisivasubramanian Srinivasan <Srisivasubramanian.Srinivasan@cavium.com>\n---\n drivers/crypto/cpt/cpt_pmd_cryptodev.c |   6 +-\n drivers/crypto/cpt/cpt_pmd_ops.c       | 470 +++++++++++++++++++++++++++++++++\n drivers/crypto/cpt/cpt_pmd_ops.h       |  11 +\n 3 files changed, 484 insertions(+), 3 deletions(-)",
    "diff": "diff --git a/drivers/crypto/cpt/cpt_pmd_cryptodev.c b/drivers/crypto/cpt/cpt_pmd_cryptodev.c\nindex 3961ec8..939f31b 100644\n--- a/drivers/crypto/cpt/cpt_pmd_cryptodev.c\n+++ b/drivers/crypto/cpt/cpt_pmd_cryptodev.c\n@@ -62,9 +62,9 @@\n \t.queue_pair_count = NULL,\n \n \t/* Crypto related operations */\n-\t.session_get_size = NULL,\n-\t.session_configure = NULL,\n-\t.session_clear = NULL\n+\t.session_get_size = cpt_pmd_get_session_size,\n+\t.session_configure = cpt_pmd_session_cfg,\n+\t.session_clear = cpt_pmd_session_clear\n };\n \n static int init_global_resources(void)\ndiff --git a/drivers/crypto/cpt/cpt_pmd_ops.c b/drivers/crypto/cpt/cpt_pmd_ops.c\nindex 1c60191..37808ce 100644\n--- a/drivers/crypto/cpt/cpt_pmd_ops.c\n+++ b/drivers/crypto/cpt/cpt_pmd_ops.c\n@@ -605,3 +605,473 @@ void cpt_pmd_stats_reset(struct rte_cryptodev *dev __rte_unused)\n \n \treturn 0;\n }\n+\n+unsigned int\n+cpt_pmd_get_session_size(struct rte_cryptodev *dev __rte_unused)\n+{\n+\treturn (sizeof(struct cpt_sess_misc) +\n+\t\tRTE_ALIGN_CEIL(cpt_fc_get_ctx_len(), 8));\n+}\n+\n+static int\n+fill_sess_aead(cpt_instance_t *instance, struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_aead_xform *aead_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\taead_form = &xform->aead;\n+\tif (aead_form->op == RTE_CRYPTO_AEAD_OP_ENCRYPT &&\n+\t   aead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CSP_OP_CIPHER_ENCRYPT;\n+\t\tsess->cpt_op |= CSP_OP_AUTH_GENERATE;\n+\t} else if (aead_form->op == RTE_CRYPTO_AEAD_OP_DECRYPT &&\n+\t\taead_form->algo == RTE_CRYPTO_AEAD_AES_GCM) {\n+\t\tsess->cpt_op |= CSP_OP_CIPHER_DECRYPT;\n+\t\tsess->cpt_op |= CSP_OP_AUTH_VERIFY;\n+\t} else {\n+\t\tPMD_DRV_LOG(ERR, \"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\tif (aead_form->key.length < cipher_key_len) {\n+\t\tPMD_DRV_LOG(ERR, \"Invalid cipher params keylen %lu\\n\",\n+\t\t(unsigned int long)aead_form->key.length);\n+\t\treturn -1;\n+\t}\n+\tswitch (aead_form->algo) {\n+\tcase RTE_CRYPTO_AEAD_AES_GCM:\n+\t\tenc_type = AES_GCM;\n+\t\tcipher_key_len = 16;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AEAD_AES_CCM:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Unsupported cipher alg %u\",\n+\t\t\t    aead_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t    aead_form->algo);\n+\t\treturn -1;\n+\t}\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = aead_form->digest_length;\n+\tsess->iv_offset = aead_form->iv.offset;\n+\tsess->iv_length = aead_form->iv.length;\n+\tsess->aad_length = aead_form->aad_length;\n+\tcpt_fc_ciph_set_key(instance,\n+\t\t(void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\t\t\tenc_type,\n+\t\t\taead_form->key.data,\n+\t\t\taead_form->key.length,\n+\t\t\tNULL);\n+\n+\tcpt_fc_auth_set_key(instance,\n+\t\t(void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\t\tauth_type,\n+\t\tNULL,\n+\t\t0,\n+\t\taead_form->digest_length);\n+\n+\treturn 0;\n+}\n+static int\n+fill_sess_cipher(cpt_instance_t *instance, struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_cipher_xform *c_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tuint32_t cipher_key_len = 0;\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, aes_ctr = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_CIPHER)\n+\t\treturn -1;\n+\n+\tc_form = &xform->cipher;\n+\n+\tif (c_form->op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\tsess->cpt_op |= CSP_OP_CIPHER_ENCRYPT;\n+\telse if (c_form->op == RTE_CRYPTO_CIPHER_OP_DECRYPT)\n+\t\tsess->cpt_op |= CSP_OP_CIPHER_DECRYPT;\n+\telse {\n+\t\tPMD_DRV_LOG(ERR, \"Unknown cipher operation\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (c_form->algo) {\n+\tcase RTE_CRYPTO_CIPHER_AES_CBC:\n+\t\tenc_type = AES_CBC;\n+\t\tcipher_key_len = 16;\n+\t\tsess->dir_dma_supp |= CSP_DDMA_ENC;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CBC:\n+\t\tenc_type = DES3_CBC;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_CTR:\n+\t\tenc_type = AES_CTR;\n+\t\tcipher_key_len = 16;\n+\t\taes_ctr = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_NULL:\n+\t\tenc_type = 0;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_KASUMI_F8:\n+\t\tenc_type = KASUMI_F8_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = K_F8;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_SNOW3G_UEA2:\n+\t\tenc_type = SNOW3G_UEA2;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_ZUC_EEA3:\n+\t\tenc_type = ZUC_EEA3;\n+\t\tcipher_key_len = 16;\n+\t\tzsk_flag = ZS_EA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_XTS:\n+\t\tenc_type = AES_XTS;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_ECB:\n+\t\tenc_type = DES3_ECB;\n+\t\tcipher_key_len = 24;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_AES_ECB:\n+\t\tenc_type = AES_ECB;\n+\t\tcipher_key_len = 16;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_CIPHER_3DES_CTR:\n+\tcase RTE_CRYPTO_CIPHER_AES_F8:\n+\tcase RTE_CRYPTO_CIPHER_ARC4:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Unsupported cipher alg %u\",\n+\t\t\t    c_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t    c_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tif (c_form->key.length < cipher_key_len) {\n+\t\tPMD_DRV_LOG(ERR, \"Invalid cipher params keylen %lu\\n\",\n+\t\t\t    (unsigned long) c_form->key.length);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->aes_ctr = aes_ctr;\n+\tsess->iv_offset = c_form->iv.offset;\n+\tsess->iv_length = c_form->iv.length;\n+\tcpt_fc_ciph_set_key(instance,\n+\t\t\t    SESS_PRIV(sess),\n+\t\t\t    enc_type,\n+\t\t\t    c_form->key.data,\n+\t\t\t    c_form->key.length,\n+\t\t\t    NULL);\n+\n+\treturn 0;\n+}\n+\n+static int\n+fill_sess_auth(cpt_instance_t *instance, struct rte_crypto_sym_xform *xform,\n+\t       struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\tgoto error_out;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CSP_OP_AUTH_VERIFY;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CSP_OP_AUTH_GENERATE;\n+\telse {\n+\t\tPMD_DRV_LOG(ERR, \"Unknown auth operation\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (a_form->key.length > 64) {\n+\t\tPMD_DRV_LOG(ERR, \"Auth key length is big\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\tsess->dir_dma_supp |= CSP_DDMA_AUTH;\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tauth_type = SHA1_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tauth_type = SHA2_SHA256;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tauth_type = SHA2_SHA512;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tauth_type = GMAC_TYPE;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tauth_type = SHA2_SHA224;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tauth_type = SHA2_SHA384;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tauth_type = MD5_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_KASUMI_F9:\n+\t\tauth_type = KASUMI_F9_ECB;\n+\t\t/*\n+\t\t * Indicate that direction needs to be taken out\n+\t\t * from end of src\n+\t\t */\n+\t\tzsk_flag = K_F9;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n+\t\tauth_type = SNOW3G_UIA2;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_ZUC_EIA3:\n+\t\tauth_type = ZUC_EIA3;\n+\t\tzsk_flag = ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Unsupported hash alg %u\",\n+\t\t\t    a_form->algo);\n+\t\tgoto error_out;\n+\tdefault:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Undefined Hash algo %u specified\",\n+\t\t\t    a_form->algo);\n+\t\tgoto error_out;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = a_form->digest_length;\n+\tif (zsk_flag) {\n+\t\tsess->auth_iv_offset = a_form->iv.offset;\n+\t\tsess->auth_iv_length = a_form->iv.length;\n+\t}\n+\tcpt_fc_auth_set_key(instance,\n+\t\t\t    SESS_PRIV(sess),\n+\t\t\t    auth_type,\n+\t\t\t    a_form->key.data,\n+\t\t\t    a_form->key.length,\n+\t\t\t    a_form->digest_length);\n+\n+\treturn 0;\n+\n+error_out:\n+\treturn -1;\n+}\n+static int\n+fill_sess_gmac(cpt_instance_t *instance, struct rte_crypto_sym_xform *xform,\n+\t\t struct cpt_sess_misc *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\tcipher_type_t enc_type = 0; /* NULL Cipher type */\n+\tauth_type_t auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0;\n+\n+\tif (xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)\n+\t\treturn -1;\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= CSP_OP_ENCODE;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= CSP_OP_DECODE;\n+\telse {\n+\t\tPMD_DRV_LOG(ERR, \"Unknown auth operation\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tenc_type = AES_GCM;\n+\t\tauth_type = GMAC_TYPE;\n+\t\tbreak;\n+\tdefault:\n+\t\tPMD_DRV_LOG(ERR, \"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t    a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->is_gmac = 1;\n+\tsess->iv_offset = a_form->iv.offset;\n+\tsess->iv_length = a_form->iv.length;\n+\tsess->mac_len = a_form->digest_length;\n+\tcpt_fc_ciph_set_key(instance,\n+\t\t(void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\t\t\tenc_type,\n+\t\t\ta_form->key.data,\n+\t\t\ta_form->key.length,\n+\t\t\tNULL);\n+\tcpt_fc_auth_set_key(instance,\n+\t\t(void *)((uint8_t *)sess + sizeof(struct cpt_sess_misc)),\n+\t\tauth_type,\n+\t\tNULL,\n+\t\t0,\n+\t\ta_form->digest_length);\n+\n+\treturn 0;\n+}\n+\n+static void\n+cpt_pmd_session_init(struct rte_mempool *mp __rte_unused, void *sym_sess,\n+\t\t uint8_t driver_id)\n+{\n+\tstruct rte_cryptodev_sym_session *sess = sym_sess;\n+\tstruct cpt_sess_misc *cpt_sess =\n+\t  (struct cpt_sess_misc *) get_session_private_data(sess, driver_id);\n+\n+\tPMD_INIT_FUNC_TRACE();\n+\tcpt_sess->ctx_dma_addr = rte_mempool_virt2iova(cpt_sess) +\n+\t\t\tsizeof(struct cpt_sess_misc);\n+}\n+\n+\n+int cpt_pmd_session_cfg(struct rte_cryptodev *dev,\n+\t\t    struct rte_crypto_sym_xform *xform,\n+\t\t    struct rte_cryptodev_sym_session *sess,\n+\t\t    struct rte_mempool *mempool)\n+{\n+\tstruct rte_crypto_sym_xform *chain;\n+\tvoid *sess_private_data;\n+\n+\tPMD_INIT_FUNC_TRACE();\n+\n+\t/*\n+\t * Microcode only supports the following combination.\n+\t * Encryption followed by authentication\n+\t * Authentication followed by decryption\n+\t * Also zuc, kasumi and snow3g are not supported in\n+\t * aead mode(ie. cipher+auth), but only cipher or auth.\n+\t */\n+\tif (xform->next) {\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH) {\n+\t\t\tif ((xform->auth.algo == RTE_CRYPTO_AUTH_SNOW3G_UIA2) ||\n+\t\t\t    (xform->auth.algo == RTE_CRYPTO_AUTH_ZUC_EIA3) ||\n+\t\t\t    (xform->auth.algo == RTE_CRYPTO_AUTH_KASUMI_F9)) {\n+\t\t\t\tPMD_DRV_LOG(ERR, \"Requested auth algorithm in \"\n+\t\t\t\t \"combination with cipher unsupported\\n\");\n+\t\t\t\tgoto err;\n+\t\t\t}\n+\t\t\tif ((xform->next->type ==\n+\t\t\t     RTE_CRYPTO_SYM_XFORM_CIPHER) &&\n+\t\t\t    (xform->next->cipher.op ==\n+\t\t\t     RTE_CRYPTO_CIPHER_OP_ENCRYPT)) {\n+\t\t\t\tPMD_DRV_LOG(ERR, \"Unsupported combination by \"\n+\t\t\t\t \"microcode\\n\");\n+\t\t\t\tgoto err;\n+\t\t\t\t/* Unsupported as of now by microcode */\n+\t\t\t}\n+\t\t}\n+\t\tif (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n+\t\t\tif ((xform->cipher.algo ==\n+\t\t\t     RTE_CRYPTO_CIPHER_SNOW3G_UEA2) ||\n+\t\t\t    (xform->cipher.algo ==\n+\t\t\t     RTE_CRYPTO_CIPHER_ZUC_EEA3) ||\n+\t\t\t    (xform->cipher.algo ==\n+\t\t\t     RTE_CRYPTO_CIPHER_KASUMI_F8)) {\n+\t\t\t\tPMD_DRV_LOG(ERR, \"Requested cipher algorithm \"\n+\t\t\t\t \"in combination with auth unsupported\\n\");\n+\t\t\t\tgoto err;\n+\t\t\t}\n+\t\t\tif ((xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH) &&\n+\t\t\t(xform->cipher.op == RTE_CRYPTO_CIPHER_OP_DECRYPT)) {\n+\t\t\t\t/* For GMAC auth there is no cipher operation */\n+\t\t\t\tif ((xform->aead.algo !=\n+\t\t\t\t     RTE_CRYPTO_AEAD_AES_GCM) ||\n+\t\t\t\t    (xform->next->auth.algo !=\n+\t\t\t\t     RTE_CRYPTO_AUTH_AES_GMAC)) {\n+\t\t\t\t\tPMD_DRV_LOG(ERR, \"Unsupported \"\n+\t\t\t\t\t \"combination by microcode\\n\");\n+\t\t\t\t\tgoto err;\n+\t\t\t\t\t/* Unsupported as of now by microcode */\n+\t\t\t\t}\n+\t\t\t}\n+\t\t}\n+\t}\n+\n+\tif (unlikely(sess == NULL)) {\n+\t\tPMD_DRV_LOG(ERR, \"invalid session struct\");\n+\t\treturn -EINVAL;\n+\t}\n+\n+\tif (rte_mempool_get(mempool, &sess_private_data)) {\n+\t\tPMD_DRV_LOG(ERR, \"Could not allocate sess_private_data\\n\");\n+\t\treturn -ENOMEM;\n+\t}\n+\n+\tchain = xform;\n+\t((struct cpt_sess_misc *) sess_private_data)->dir_dma_supp = 0;\n+\t/* TODO: Need to restrict this loop to 2 chain elements? */\n+\twhile (chain) {\n+\t\tif (chain->type == RTE_CRYPTO_SYM_XFORM_AEAD) {\n+\t\t\tif (fill_sess_aead(NULL, chain, sess_private_data))\n+\t\t\t\tgoto err;\n+\t\t} else {\n+\t\tif (chain->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {\n+\t\t\tif (fill_sess_cipher(NULL, chain, sess_private_data))\n+\t\t\t\tgoto err;\n+\t\t} else if (chain->type == RTE_CRYPTO_SYM_XFORM_AUTH) {\n+\t\t\tif (chain->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC) {\n+\t\t\t\tif (fill_sess_gmac(NULL, chain,\n+\t\t\t\t    sess_private_data))\n+\t\t\t\t\tgoto err;\n+\t\t\t} else {\n+\t\t\tif (fill_sess_auth(NULL, chain, sess_private_data))\n+\t\t\t\tgoto err;\n+\t\t\t}\n+\t\t}\n+\t\t}\n+\t\tchain = chain->next;\n+\t}\n+\tset_session_private_data(sess, dev->driver_id, sess_private_data);\n+\tcpt_pmd_session_init(NULL, sess, dev->driver_id);\n+\treturn 0;\n+\n+err:\n+\t/* TODO: rte_mempool_put(); */\n+\treturn -EPERM;\n+}\n+\n+void\n+cpt_pmd_session_clear(struct rte_cryptodev *dev,\n+\t\t  struct rte_cryptodev_sym_session *sess)\n+{\n+\tvoid *session_private = get_session_private_data(sess, dev->driver_id);\n+\n+\tPMD_INIT_FUNC_TRACE();\n+\tif (session_private) {\n+\t\tmemset(session_private, 0, cpt_pmd_get_session_size(dev));\n+\t\tstruct rte_mempool *sess_mp =\n+\t\t   rte_mempool_from_obj(session_private);\n+\t\tset_session_private_data(sess, dev->driver_id, NULL);\n+\t\trte_mempool_put(sess_mp, session_private);\n+\t}\n+}\ndiff --git a/drivers/crypto/cpt/cpt_pmd_ops.h b/drivers/crypto/cpt/cpt_pmd_ops.h\nindex db2024b..314b2b1 100644\n--- a/drivers/crypto/cpt/cpt_pmd_ops.h\n+++ b/drivers/crypto/cpt/cpt_pmd_ops.h\n@@ -72,4 +72,15 @@ void cpt_pmd_stats_get(struct rte_cryptodev *dev,\n \n void cpt_pmd_stats_reset(struct rte_cryptodev *dev);\n \n+unsigned int\n+cpt_pmd_get_session_size(struct rte_cryptodev *dev);\n+\n+int cpt_pmd_session_cfg(struct rte_cryptodev *dev,\n+\t\t    struct rte_crypto_sym_xform *xform,\n+\t\t    struct rte_cryptodev_sym_session *sess,\n+\t\t    struct rte_mempool *mempool);\n+\n+void\n+cpt_pmd_session_clear(struct rte_cryptodev *dev,\n+\t\t  struct rte_cryptodev_sym_session *sess);\n #endif\n",
    "prefixes": [
        "dpdk-dev",
        "13/16"
    ]
}