get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/96837/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 96837,
    "url": "http://patchwork.dpdk.org/api/patches/96837/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20210812071244.28799-16-hemant.agrawal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210812071244.28799-16-hemant.agrawal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210812071244.28799-16-hemant.agrawal@nxp.com",
    "date": "2021-08-12T07:12:43",
    "name": "[RFC,15/16] test/crypto: add raw API test for dpaax",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "74840a471eaf9d26e4a823a4dab3882c4de0d785",
    "submitter": {
        "id": 477,
        "url": "http://patchwork.dpdk.org/api/people/477/?format=api",
        "name": "Hemant Agrawal",
        "email": "hemant.agrawal@nxp.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20210812071244.28799-16-hemant.agrawal@nxp.com/mbox/",
    "series": [
        {
            "id": 18259,
            "url": "http://patchwork.dpdk.org/api/series/18259/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=18259",
            "date": "2021-08-12T07:12:28",
            "name": "crypto: add raw vector support in DPAAx",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/18259/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/96837/comments/",
    "check": "success",
    "checks": "http://patchwork.dpdk.org/api/patches/96837/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id CCCB6A0C52;\n\tThu, 12 Aug 2021 09:17:57 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 1DDFB41267;\n\tThu, 12 Aug 2021 09:16:33 +0200 (CEST)",
            "from EUR02-VE1-obe.outbound.protection.outlook.com\n (mail-eopbgr20071.outbound.protection.outlook.com [40.107.2.71])\n by mails.dpdk.org (Postfix) with ESMTP id C738741264\n for <dev@dpdk.org>; Thu, 12 Aug 2021 09:16:31 +0200 (CEST)",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15)\n by DB9PR04MB8461.eurprd04.prod.outlook.com (2603:10a6:10:2bc::7) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.13; Thu, 12 Aug\n 2021 07:16:31 +0000",
            "from DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793]) by DU2PR04MB8630.eurprd04.prod.outlook.com\n ([fe80::2590:514a:df1f:a793%9]) with mapi id 15.20.4415.016; Thu, 12 Aug 2021\n 07:16:31 +0000",
            "from dpdk-xeon.ap.freescale.net (92.120.0.67) by\n SG2PR02CA0105.apcprd02.prod.outlook.com (2603:1096:4:92::21) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.4415.14 via Frontend Transport; Thu, 12 Aug 2021 07:16:29 +0000"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=CjjKRMwrBILf9Fqh49Ch4DenCIZszYxuJh3DeJpKd4H6y6pcwBCewMHHFxyGX22moXdMo6FDBEARTOxZPeXtjITGl2lzdo4tjTyXrt5pDAhpGgmi3eQJ6loGJ5swlSuQ9kQ8fYDTBg3LTM1kAElHMXWOS9XCnEVwgmh45x39vZ4i2YukXY04Ra2yURVDlUQCDf5yJe3CP2zZSVnScVLgYJqaPzve3P56heMjpCjokFu4lP/kT4k16IIsftTDZFJKCp+Vt2SJQrYTAbDdjaDFTDPzCRh0h6PlNVhjQLrbfe7CIZYdi1R49AIZ37tiY/pBNqzFgzsTHUG/TZsKWt9hGA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=pMJNO1dkwlWbM+LAvtz/F3D+6Yzd3CJPsuGCZQpwoI8=;\n b=U67/9ET/mVKwcMiqWLnd4JWQqoHlXrq7kyWCDPYpnoit6botEIvaDEV9AXtG96lqqrBIOksHKUdX9cBD2JS0MA3LTLQhBllYW6xB1/8FfZ4YyI8Bf94/+Kz3ET0cEpHjdOwaBpiL/dhFU3Dy5ErV+aYy9OwWPuBhqjiWpvfZH1p6ZGPDBmXSgUZSAoXllfDVLvyfPVYRX8sryokMzlPPChwuU9NECE874ImCus5t6xFg1LeshsTyaM1ETQ5Q3gPKuRdwJ9FdLgqTKDOfPJk8I3d05UrPdbbtddye6Z7zFfL1jRB1WnyLzpbMEL4e1IdQohjYiVbjFed1wn9UlX9sdA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass\n header.d=nxp.com; arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=pMJNO1dkwlWbM+LAvtz/F3D+6Yzd3CJPsuGCZQpwoI8=;\n b=sNf4aLr01bdS9hDYMxFci/wHssPa2JmRII0bzY0ynNhdZreNeINcM15UKb6m2Qk68z52JA0nd+uYWh8yp1VzOoKqPEvysIeT78gbrH1TQARl5xM9f1KlJFmH1sx6WPq9IXhkduhniMKHHvf42jFpsTwb6EAx404uhsPJd+/oHbs=",
        "Authentication-Results": "dpdk.org; dkim=none (message not signed)\n header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com;",
        "From": "Hemant Agrawal <hemant.agrawal@nxp.com>",
        "To": "dev@dpdk.org,\n\tgakhil@marvell.com",
        "Cc": "Gagandeep Singh <g.singh@nxp.com>",
        "Date": "Thu, 12 Aug 2021 12:42:43 +0530",
        "Message-Id": "<20210812071244.28799-16-hemant.agrawal@nxp.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "References": "<20210812071244.28799-1-hemant.agrawal@nxp.com>",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "SG2PR02CA0105.apcprd02.prod.outlook.com\n (2603:1096:4:92::21) To DU2PR04MB8630.eurprd04.prod.outlook.com\n (2603:10a6:10:2dd::15)",
        "MIME-Version": "1.0",
        "X-MS-Exchange-MessageSentRepresentingType": "1",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "b2f5e791-7a88-42fc-86c9-08d95d611bc3",
        "X-MS-TrafficTypeDiagnostic": "DB9PR04MB8461:",
        "X-MS-Exchange-Transport-Forked": "True",
        "X-Microsoft-Antispam-PRVS": "\n <DB9PR04MB8461EBABD6D5AB1380A3528E89F99@DB9PR04MB8461.eurprd04.prod.outlook.com>",
        "X-MS-Oob-TLC-OOBClassifiers": "OLM:469;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n t37/2/rkEgwRXlDIVVra25D8YuIX7Db+A8xvi3iHuoL+vYVwdf5jBkzsYNUc8VCKaKSNWUFT4IK5duSIdk5ByVLKc7g0qSCI23Frtz0KP6Jgxd6XQqF2ib3girSpPLOKQ6o+5PVJNvDXI4cKtRtVJkcqiOuaNagSNu5zOLphf+ZeWbHl5pIMCiJiDcg60KmoPSLpb2FBlLOk7P5sKKFeMT1cKJpMraLVPaYMv0K/E/kv/yyGcrgMWR929s3sB9YaWbolfvSGP1M7Gln20BeltA2DiQWwfAER9Qbq0mRRGHj+lU4V3FPOffR5w1EqF3PD/p2hRhjsoMJd5PmUaDCMsXqMnmiYTCAohqcXWIKi6E45fVOcHObNURiiSVTjxjop7ZH/ltQixV68SIUVTBLZI46olvpCIv95w6GwhqEzpuC9hZv2ur0Rl6ijDSW/sWJxTLMmxBSTgvcx2ydHwwDEZttYi/5uIU1eclt9oEK3KlfXXDzJg3Kxr26NZK0dkaFqwAWVwwZmAyLlMravUaz9lOcsdDEffyuFeXZc6OtujMg6U7XeSGxcJbNagboHSLoDAE9SBYJxml+xVnB6aIzRrwY61vtfJ/LMhDn68pNB+O6aOG9oz0HtjSlYS0YY+2xqEMMp4dUikHHGV6Atdpz/m5cC7u1N5CPttGZFkzsA2TmnGJb/1l41/IkFMtFJRgJao1ptnf2+ro5H/VAi3PkSRw==",
        "X-Forefront-Antispam-Report": "CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(4636009)(376002)(346002)(39860400002)(396003)(136003)(366004)(8936002)(956004)(6512007)(2616005)(2906002)(6666004)(36756003)(86362001)(4326008)(83380400001)(38350700002)(44832011)(478600001)(26005)(6506007)(66476007)(186003)(52116002)(5660300002)(1076003)(66556008)(6486002)(38100700002)(8676002)(66946007)(316002);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "nxp.com",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n b2f5e791-7a88-42fc-86c9-08d95d611bc3",
        "X-MS-Exchange-CrossTenant-AuthSource": "DU2PR04MB8630.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "12 Aug 2021 07:16:31.0447 (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n Dlef9FWICMurnJWxL6hMDzs5ZJF9MCbV0Nn3CpELTgnR9Mtft7iX/a1AT6mBAQxG5MPgtZjMgjTuGGlU6UBVuw==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DB9PR04MB8461",
        "Subject": "[dpdk-dev] [RFC 15/16] test/crypto: add raw API test for dpaax",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch add support for raw API tests for\ndpaa_sec and dpaa2_sec platforms.\n\nSigned-off-by: Gagandeep Singh <g.singh@nxp.com>\nSigned-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>\n---\n app/test/test_cryptodev.c | 116 +++++++++++++++++++++++++++++++++++---\n 1 file changed, 109 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex aecd507fa1..59bed6e6d2 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -175,11 +175,11 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n {\n \tstruct rte_crypto_sym_op *sop = op->sym;\n \tstruct rte_crypto_op *ret_op = NULL;\n-\tstruct rte_crypto_vec data_vec[UINT8_MAX];\n+\tstruct rte_crypto_vec data_vec[UINT8_MAX], dest_data_vec[UINT8_MAX];\n \tstruct rte_crypto_va_iova_ptr cipher_iv, digest, aad_auth_iv;\n \tunion rte_crypto_sym_ofs ofs;\n \tstruct rte_crypto_sym_vec vec;\n-\tstruct rte_crypto_sgl sgl;\n+\tstruct rte_crypto_sgl sgl, dest_sgl;\n \tuint32_t max_len;\n \tunion rte_cryptodev_session_ctx sess;\n \tuint32_t count = 0;\n@@ -315,6 +315,19 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t}\n \n \tsgl.num = n;\n+\t/* Out of place */\n+\tif (sop->m_dst != NULL) {\n+\t\tdest_sgl.vec = dest_data_vec;\n+\t\tvec.dest_sgl = &dest_sgl;\n+\t\tn = rte_crypto_mbuf_to_vec(sop->m_dst, 0, max_len,\n+\t\t\t\tdest_data_vec, RTE_DIM(dest_data_vec));\n+\t\tif (n < 0 || n > sop->m_dst->nb_segs) {\n+\t\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tdest_sgl.num = n;\n+\t} else\n+\t\tvec.dest_sgl = NULL;\n \n \tif (rte_cryptodev_raw_enqueue_burst(ctx, &vec, ofs, (void **)&op,\n \t\t\t&enqueue_status) < 1) {\n@@ -8305,10 +8318,21 @@ test_pdcp_proto_SGL(int i, int oop,\n \tint to_trn_tbl[16];\n \tint segs = 1;\n \tunsigned int trn_data = 0;\n+\tstruct rte_cryptodev_info dev_info;\n+\tuint64_t feat_flags;\n \tstruct rte_security_ctx *ctx = (struct rte_security_ctx *)\n \t\t\t\trte_cryptodev_get_sec_ctx(\n \t\t\t\tts_params->valid_devs[0]);\n+\tstruct rte_mbuf *temp_mbuf;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tfeat_flags = dev_info.feature_flags;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n \t/* Verify the capabilities */\n \tstruct rte_security_capability_idx sec_cap_idx;\n \n@@ -8492,8 +8516,23 @@ test_pdcp_proto_SGL(int i, int oop,\n \t\tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (process_crypto_request(ts_params->valid_devs[0], ut_params->op)\n-\t\t== NULL) {\n+\ttemp_mbuf = ut_params->op->sym->m_src;\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\t/* filling lengths */\n+\t\twhile (temp_mbuf) {\n+\t\t\tut_params->op->sym->cipher.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\tut_params->op->sym->auth.data.length\n+\t\t\t\t+= temp_mbuf->pkt_len;\n+\t\t\ttemp_mbuf = temp_mbuf->next;\n+\t\t}\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 1, 1, 0, 0);\n+\t} else {\n+\t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n+\t\t\t\t\t\t\tut_params->op);\n+\t}\n+\tif (ut_params->op == NULL) {\n \t\tprintf(\"TestCase %s()-%d line %d failed %s: \",\n \t\t\t__func__, i, __LINE__,\n \t\t\t\"failed to process sym crypto op\");\n@@ -9934,6 +9973,7 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tint retval;\n \tuint8_t *ciphertext, *auth_tag;\n \tuint16_t plaintext_pad_len;\n+\tstruct rte_cryptodev_info dev_info;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -9943,7 +9983,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \t\t\t&cap_idx) == NULL)\n \t\treturn TEST_SKIPPED;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n+\n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))\n \t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto */\n@@ -9980,7 +10024,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -10026,6 +10074,10 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \n \tint retval;\n \tuint8_t *plaintext;\n+\tstruct rte_cryptodev_info dev_info;\n+\n+\trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n+\tuint64_t feat_flags = dev_info.feature_flags;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10040,6 +10092,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \t\t\tglobal_api_test_type == CRYPTODEV_RAW_API_TEST)\n \t\treturn TEST_SKIPPED;\n \n+\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n+\t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n+\t\tprintf(\"Device does not support RAW data-path APIs.\\n\");\n+\t\treturn TEST_SKIPPED;\n+\t}\n+\n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n \t\t\ttdata->algo,\n@@ -10070,7 +10128,11 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n+\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n+\t\t\t\tut_params->op, 0, 0, 0, 0);\n+\telse\n+\t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n \tTEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,\n@@ -14834,6 +14896,46 @@ test_cryptodev_cn10k(void)\n \treturn run_cryptodev_testsuite(RTE_STR(CRYPTODEV_NAME_CN10K_PMD));\n }\n \n+static int\n+test_cryptodev_dpaa2_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+static int\n+test_cryptodev_dpaa_sec_raw_api(void)\n+{\n+\tstatic const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD);\n+\tint ret;\n+\n+\tret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP,\n+\t\t\t\"RAW API\");\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tglobal_api_test_type = CRYPTODEV_RAW_API_TEST;\n+\tret = run_cryptodev_testsuite(pmd_name);\n+\tglobal_api_test_type = CRYPTODEV_API_TEST;\n+\n+\treturn ret;\n+}\n+\n+REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa2_sec_raw_api);\n+REGISTER_TEST_COMMAND(cryptodev_dpaa_sec_raw_api_autotest,\n+\t\ttest_cryptodev_dpaa_sec_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_raw_api_autotest,\n \t\ttest_cryptodev_qat_raw_api);\n REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat);\n",
    "prefixes": [
        "RFC",
        "15/16"
    ]
}