get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/96830/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 96830,
    "url": "http://patchwork.dpdk.org/api/patches/96830/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20210812071244.28799-9-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210812071244.28799-9-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210812071244.28799-9-hemant.agrawal@nxp.com",
    "date": "2021-08-12T07:12:36",
    "name": "[RFC,08/16] crypto/dpaa2_sec: support AEAD with raw buffer APIs",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "ad88bc609917adb870083c64a03b5f9150c23319",
    "submitter": {
        "id": 477,
        "url": "http://patchwork.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20210812071244.28799-9-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18259,
            "url": "http://patchwork.dpdk.org/api/series/18259/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=18259",
            "date": "2021-08-12T07:12:28",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/18259/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/96830/comments/",
    "check": "warning",
    "checks": "http://patchwork.dpdk.org/api/patches/96830/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 29531A0C52;\n\tThu, 12 Aug 2021 09:17:06 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 44A7441234;\n\tThu, 12 Aug 2021 09:16:21 +0200 (CEST)",
            "from EUR02-VE1-obe.outbound.protection.outlook.com\n (mail-eopbgr20058.outbound.protection.outlook.com [40.107.2.58])\n by mails.dpdk.org (Postfix) with ESMTP id D4F9D41228\n for <dev@dpdk.org>; Thu, 12 Aug 2021 09:16:18 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DB9PR04MB8461.eurprd04.prod.outlook.com (2603:10a6:10:2bc::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.13; Thu, 12 Aug\n 2021 07:16:18 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793%9]) with mapi id 15.20.4415.016; Thu, 12 Aug 2021\n 07:16:18 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR02CA0105.apcprd02.prod.outlook.com (2603:1096:4:92::21) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4415.14 via Frontend Transport; Thu, 12 Aug 2021 07:16:16 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=i/wr80nCW10+x2fwCNvRI5GnCzxiS5nmXaWnPkYQFUDBTRZI2yfEO+G+46Cb1K3buXTGLBhCmqgLZbDOGrsKtCeEHSE+9F0YleS6/YJFm/meuSr+7KLqaV4OfW98p+tYwNfmze8qo2hXvc3HLxnqt/BodlizAqdksnBsVS0PHUCm4Zg+HX49tpIUkqkGJnpiwtgtdo2eZBU7/diKl5FiJBBKCy2yiCTyuv1vKK6/iZ60P6tYGealrrY6QwWgM/190QlOFQ6Re23GGLFeDbIo032V05Y1H86U9FnLy71KS7k3tk/W4aS/wnpc+rmhao5jisqqNuYths1umXHunJ+h4A==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=nWqXNWEr4a6i8egkR07rxpTsafyVbCvpEDpE7I3CS3g=;\n b=jjOf601IKFh5S+8nq2pGjZYxvjkDNXnkrDj4+vvN/ZIkSxvst9H5/hzUrMZSjaUd2yH2jRmvtmcFkNyAkPh5yfUq0ZpVUQDRqYj+Dm/cA8CzV4QmyQ1Tww0FBJkjRbBLKJN4EzjBgXher1QfcFMEdh3mmsKrOa2kRrRbsSoySJ/msThjgHeNYu4buwbEk7WTm236urZQfl7bA80+J5hlzzcUWsctn2PbS9Xoj/048lSBO2HJdqN1iTqwr/YRslKbzmI4eSz6RUqw3kTaom7wxLz/v2cksRoXSb8gSO2Mow7F+4WBF+H4wwj5wqhNuENmKwjbAZ6E5lvIN62VBDhejA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=nWqXNWEr4a6i8egkR07rxpTsafyVbCvpEDpE7I3CS3g=;\n b=ATJAgpeYOtN3pZl8VgNNFoLw7A/hYTT0QNSOtFiinzA4Y5EJbqkFO0I+G6uo+g4k644yNE5gJRTrHwcinEgIDR3Xx/RTNWP+bMXkfMOCfzKzppFpHbt4roNc2RjuFZ/O2KkbgyDqDybiIivNPlGDbAwtOaats/ET2eY8Im/6ns8=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Thu, 12 Aug 2021 12:42:36 +0530",
        "Message-Id": "<20210812071244.28799-9-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "References": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR02CA0105.apcprd02.prod.outlook.com\n (2603:1096:4:92::21) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "d83a74e9-d94b-4b2c-f41e-08d95d611412",
        "X-MS-TrafficTypeDiagnostic": "DB9PR04MB8461:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DB9PR04MB8461994FD9E857EDA067F51F89F99@DB9PR04MB8461.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:4941;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(376002)(346002)(39860400002)(396003)(136003)(366004)(8936002)(956004)(6512007)(2616005)(2906002)(6666004)(36756003)(86362001)(4326008)(83380400001)(38350700002)(44832011)(478600001)(26005)(6506007)(66476007)(186003)(52116002)(5660300002)(1076003)(66556008)(6486002)(38100700002)(8676002)(66946007)(316002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n d83a74e9-d94b-4b2c-f41e-08d95d611412",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "12 Aug 2021 07:16:18.1694 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n j/+E7eL30OvqaermxJuwnfQEvE6JKzfh6UKiUwnT33wj5Itf8PaufW1M+NAUNJET9rDh3HI0smLZDEOTHmjMpQ==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DB9PR04MB8461",
        "Subject": "[dpdk-dev] [RFC 08/16] crypto/dpaa2_sec: support AEAD with raw\n buffer APIs",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gagandeep Singh <g.singh@nxp.com>\n\nadd raw vector API support for AEAD algos.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\n---\n drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 249 +++++++++++++++++---\n 1 file changed, 214 insertions(+), 35 deletions(-)",
    "diff": "diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c\nindex 79ba0ecb81..41f24c93b6 100644\n--- a/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c\n+++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c\n@@ -167,14 +167,126 @@ build_raw_dp_aead_fd(uint8_t *drv_ctx,\n \t\t       void *userdata,\n \t\t       struct qbman_fd *fd)\n {\n-\tRTE_SET_USED(drv_ctx);\n-\tRTE_SET_USED(sgl);\n-\tRTE_SET_USED(iv);\n-\tRTE_SET_USED(digest);\n-\tRTE_SET_USED(auth_iv);\n-\tRTE_SET_USED(ofs);\n-\tRTE_SET_USED(userdata);\n-\tRTE_SET_USED(fd);\n+\tdpaa2_sec_session *sess =\n+\t\t((struct dpaa2_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct ctxt_priv *priv = sess->ctxt;\n+\tstruct qbman_fle *fle, *sge, *ip_fle, *op_fle;\n+\tstruct sec_flow_context *flc;\n+\tuint32_t auth_only_len = sess->ext_params.aead_ctxt.auth_only_len;\n+\tint icv_len = sess->digest_length;\n+\tuint8_t *old_icv;\n+\tuint8_t *IV_ptr = iv->va;\n+\tunsigned int i = 0;\n+\tint data_len = 0, aead_len = 0;\n+\n+\tfor (i = 0; i < sgl->num; i++)\n+\t\tdata_len += sgl->vec[i].len;\n+\n+\taead_len = data_len - ofs.ofs.cipher.head - ofs.ofs.cipher.tail;\n+\n+\t/* first FLE entry used to store mbuf and session ctxt */\n+\tfle = (struct qbman_fle *)rte_malloc(NULL,\n+\t\t\tFLE_SG_MEM_SIZE(2 * sgl->num),\n+\t\t\tRTE_CACHE_LINE_SIZE);\n+\tif (unlikely(!fle)) {\n+\t\tDPAA2_SEC_ERR(\"GCM SG: Memory alloc failed for SGE\");\n+\t\treturn -ENOMEM;\n+\t}\n+\tmemset(fle, 0, FLE_SG_MEM_SIZE(2 * sgl->num));\n+\tDPAA2_SET_FLE_ADDR(fle, (size_t)userdata);\n+\tDPAA2_FLE_SAVE_CTXT(fle, (ptrdiff_t)priv);\n+\n+\top_fle = fle + 1;\n+\tip_fle = fle + 2;\n+\tsge = fle + 3;\n+\n+\t/* Save the shared descriptor */\n+\tflc = &priv->flc_desc[0].flc;\n+\n+\t/* Configure FD as a FRAME LIST */\n+\tDPAA2_SET_FD_ADDR(fd, DPAA2_VADDR_TO_IOVA(op_fle));\n+\tDPAA2_SET_FD_COMPOUND_FMT(fd);\n+\tDPAA2_SET_FD_FLC(fd, DPAA2_VADDR_TO_IOVA(flc));\n+\n+\t/* Configure Output FLE with Scatter/Gather Entry */\n+\tDPAA2_SET_FLE_SG_EXT(op_fle);\n+\tDPAA2_SET_FLE_ADDR(op_fle, DPAA2_VADDR_TO_IOVA(sge));\n+\n+\tif (auth_only_len)\n+\t\tDPAA2_SET_FLE_INTERNAL_JD(op_fle, auth_only_len);\n+\n+\top_fle->length = (sess->dir == DIR_ENC) ?\n+\t\t\t(aead_len + icv_len) :\n+\t\t\taead_len;\n+\n+\t/* Configure Output SGE for Encap/Decap */\n+\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[0].iova);\n+\tDPAA2_SET_FLE_OFFSET(sge, ofs.ofs.cipher.head);\n+\tsge->length = sgl->vec[0].len - ofs.ofs.cipher.head;\n+\n+\t/* o/p segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tsge++;\n+\t\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[i].iova);\n+\t\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\t\tsge->length = sgl->vec[i].len;\n+\t}\n+\n+\tif (sess->dir == DIR_ENC) {\n+\t\tsge++;\n+\t\tDPAA2_SET_FLE_ADDR(sge, digest->iova);\n+\t\tsge->length = icv_len;\n+\t}\n+\tDPAA2_SET_FLE_FIN(sge);\n+\n+\tsge++;\n+\n+\t/* Configure Input FLE with Scatter/Gather Entry */\n+\tDPAA2_SET_FLE_ADDR(ip_fle, DPAA2_VADDR_TO_IOVA(sge));\n+\tDPAA2_SET_FLE_SG_EXT(ip_fle);\n+\tDPAA2_SET_FLE_FIN(ip_fle);\n+\tip_fle->length = (sess->dir == DIR_ENC) ?\n+\t\t(aead_len + sess->iv.length + auth_only_len) :\n+\t\t(aead_len + sess->iv.length + auth_only_len +\n+\t\ticv_len);\n+\n+\t/* Configure Input SGE for Encap/Decap */\n+\tDPAA2_SET_FLE_ADDR(sge, DPAA2_VADDR_TO_IOVA(IV_ptr));\n+\tsge->length = sess->iv.length;\n+\n+\tsge++;\n+\tif (auth_only_len) {\n+\t\tDPAA2_SET_FLE_ADDR(sge, auth_iv->iova);\n+\t\tsge->length = auth_only_len;\n+\t\tsge++;\n+\t}\n+\n+\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[0].iova);\n+\tDPAA2_SET_FLE_OFFSET(sge, ofs.ofs.cipher.head);\n+\tsge->length = sgl->vec[0].len - ofs.ofs.cipher.head;\n+\n+\t/* i/p segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tsge++;\n+\t\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[i].iova);\n+\t\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\t\tsge->length = sgl->vec[i].len;\n+\t}\n+\n+\tif (sess->dir == DIR_DEC) {\n+\t\tsge++;\n+\t\told_icv = (uint8_t *)(sge + 1);\n+\t\tmemcpy(old_icv,  digest->va, icv_len);\n+\t\tDPAA2_SET_FLE_ADDR(sge, DPAA2_VADDR_TO_IOVA(old_icv));\n+\t\tsge->length = icv_len;\n+\t}\n+\n+\tDPAA2_SET_FLE_FIN(sge);\n+\tif (auth_only_len) {\n+\t\tDPAA2_SET_FLE_INTERNAL_JD(ip_fle, auth_only_len);\n+\t\tDPAA2_SET_FD_INTERNAL_JD(fd, auth_only_len);\n+\t}\n+\tDPAA2_SET_FD_LEN(fd, ip_fle->length);\n \n \treturn 0;\n }\n@@ -311,36 +423,104 @@ build_raw_dp_proto_fd(uint8_t *drv_ctx,\n \t\t       void *userdata,\n \t\t       struct qbman_fd *fd)\n {\n-\tRTE_SET_USED(drv_ctx);\n-\tRTE_SET_USED(sgl);\n \tRTE_SET_USED(iv);\n \tRTE_SET_USED(digest);\n \tRTE_SET_USED(auth_iv);\n \tRTE_SET_USED(ofs);\n-\tRTE_SET_USED(userdata);\n-\tRTE_SET_USED(fd);\n \n-\treturn 0;\n-}\n+\tdpaa2_sec_session *sess =\n+\t\t((struct dpaa2_sec_raw_dp_ctx *)drv_ctx)->session;\n+\tstruct ctxt_priv *priv = sess->ctxt;\n+\tstruct qbman_fle *fle, *sge, *ip_fle, *op_fle;\n+\tstruct sec_flow_context *flc;\n+\tuint32_t in_len = 0, out_len = 0, i;\n \n-static int\n-build_raw_dp_proto_compound_fd(uint8_t *drv_ctx,\n-\t\t       struct rte_crypto_sgl *sgl,\n-\t\t       struct rte_crypto_va_iova_ptr *iv,\n-\t\t       struct rte_crypto_va_iova_ptr *digest,\n-\t\t       struct rte_crypto_va_iova_ptr *auth_iv,\n-\t\t       union rte_crypto_sym_ofs ofs,\n-\t\t       void *userdata,\n-\t\t       struct qbman_fd *fd)\n-{\n-\tRTE_SET_USED(drv_ctx);\n-\tRTE_SET_USED(sgl);\n-\tRTE_SET_USED(iv);\n-\tRTE_SET_USED(digest);\n-\tRTE_SET_USED(auth_iv);\n-\tRTE_SET_USED(ofs);\n-\tRTE_SET_USED(userdata);\n-\tRTE_SET_USED(fd);\n+\t/* first FLE entry used to store mbuf and session ctxt */\n+\tfle = (struct qbman_fle *)rte_malloc(NULL,\n+\t\t\tFLE_SG_MEM_SIZE(2 * sgl->num),\n+\t\t\tRTE_CACHE_LINE_SIZE);\n+\tif (unlikely(!fle)) {\n+\t\tDPAA2_SEC_DP_ERR(\"Proto:SG: Memory alloc failed for SGE\");\n+\t\treturn -ENOMEM;\n+\t}\n+\tmemset(fle, 0, FLE_SG_MEM_SIZE(2 * sgl->num));\n+\tDPAA2_SET_FLE_ADDR(fle, (size_t)userdata);\n+\tDPAA2_FLE_SAVE_CTXT(fle, (ptrdiff_t)priv);\n+\n+\t/* Save the shared descriptor */\n+\tflc = &priv->flc_desc[0].flc;\n+\top_fle = fle + 1;\n+\tip_fle = fle + 2;\n+\tsge = fle + 3;\n+\n+\tDPAA2_SET_FD_IVP(fd);\n+\tDPAA2_SET_FLE_IVP(op_fle);\n+\tDPAA2_SET_FLE_IVP(ip_fle);\n+\n+\t/* Configure FD as a FRAME LIST */\n+\tDPAA2_SET_FD_ADDR(fd, DPAA2_VADDR_TO_IOVA(op_fle));\n+\tDPAA2_SET_FD_COMPOUND_FMT(fd);\n+\tDPAA2_SET_FD_FLC(fd, DPAA2_VADDR_TO_IOVA(flc));\n+\n+\t/* Configure Output FLE with Scatter/Gather Entry */\n+\tDPAA2_SET_FLE_SG_EXT(op_fle);\n+\tDPAA2_SET_FLE_ADDR(op_fle, DPAA2_VADDR_TO_IOVA(sge));\n+\n+\t/* Configure Output SGE for Encap/Decap */\n+\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[0].iova);\n+\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\tsge->length = sgl->vec[0].len;\n+\tout_len += sge->length;\n+\t/* o/p segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tsge++;\n+\t\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[i].iova);\n+\t\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\t\tsge->length = sgl->vec[i].len;\n+\t\tout_len += sge->length;\n+\t}\n+\tsge->length = sgl->vec[i - 1].tot_len;\n+\tout_len += sge->length;\n+\n+\tDPAA2_SET_FLE_FIN(sge);\n+\top_fle->length = out_len;\n+\n+\tsge++;\n+\n+\t/* Configure Input FLE with Scatter/Gather Entry */\n+\tDPAA2_SET_FLE_ADDR(ip_fle, DPAA2_VADDR_TO_IOVA(sge));\n+\tDPAA2_SET_FLE_SG_EXT(ip_fle);\n+\tDPAA2_SET_FLE_FIN(ip_fle);\n+\n+\t/* Configure input SGE for Encap/Decap */\n+\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[0].iova);\n+\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\tsge->length = sgl->vec[0].len;\n+\tin_len += sge->length;\n+\t/* i/p segs */\n+\tfor (i = 1; i < sgl->num; i++) {\n+\t\tsge++;\n+\t\tDPAA2_SET_FLE_ADDR(sge, sgl->vec[i].iova);\n+\t\tDPAA2_SET_FLE_OFFSET(sge, 0);\n+\t\tsge->length = sgl->vec[i].len;\n+\t\tin_len += sge->length;\n+\t}\n+\n+\tip_fle->length = in_len;\n+\tDPAA2_SET_FLE_FIN(sge);\n+\n+\t/* In case of PDCP, per packet HFN is stored in\n+\t * mbuf priv after sym_op.\n+\t */\n+\tif (sess->ctxt_type == DPAA2_SEC_PDCP && sess->pdcp.hfn_ovd) {\n+\t\tuint32_t hfn_ovd = *(uint32_t *)((uint8_t *)userdata +\n+\t\t\t\tsess->pdcp.hfn_ovd_offset);\n+\t\t/*enable HFN override override */\n+\t\tDPAA2_SET_FLE_INTERNAL_JD(ip_fle, hfn_ovd);\n+\t\tDPAA2_SET_FLE_INTERNAL_JD(op_fle, hfn_ovd);\n+\t\tDPAA2_SET_FD_INTERNAL_JD(fd, hfn_ovd);\n+\t}\n+\tDPAA2_SET_FD_LEN(fd, ip_fle->length);\n \n \treturn 0;\n }\n@@ -793,10 +973,9 @@ dpaa2_sec_configure_raw_dp_ctx(struct rte_cryptodev *dev, uint16_t qp_id,\n \t\tsess->build_raw_dp_fd = build_raw_dp_auth_fd;\n \telse if (sess->ctxt_type == DPAA2_SEC_CIPHER)\n \t\tsess->build_raw_dp_fd = build_raw_dp_cipher_fd;\n-\telse if (sess->ctxt_type == DPAA2_SEC_IPSEC)\n+\telse if (sess->ctxt_type == DPAA2_SEC_IPSEC ||\n+\t\tsess->ctxt_type == DPAA2_SEC_PDCP)\n \t\tsess->build_raw_dp_fd = build_raw_dp_proto_fd;\n-\telse if (sess->ctxt_type == DPAA2_SEC_PDCP)\n-\t\tsess->build_raw_dp_fd = build_raw_dp_proto_compound_fd;\n \telse\n \t\treturn -ENOTSUP;\n \tdp_ctx = (struct dpaa2_sec_raw_dp_ctx *)raw_dp_ctx->drv_ctx_data;\n",
    "prefixes": [
        "RFC",
        "08/16"
    ]
}