get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/42391/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 42391,
    "url": "http://patches.dpdk.org/api/patches/42391/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1530806060-31227-3-git-send-email-shally.verma@caviumnetworks.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1530806060-31227-3-git-send-email-shally.verma@caviumnetworks.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1530806060-31227-3-git-send-email-shally.verma@caviumnetworks.com",
    "date": "2018-07-05T15:54:20",
    "name": "[v4,2/2] test/crypto: add dh and dsa test application",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "c91a11f4707574dda792234a22520362af8a12e1",
    "submitter": {
        "id": 960,
        "url": "http://patches.dpdk.org/api/people/960/?format=api",
        "name": "Shally Verma",
        "email": "shally.verma@caviumnetworks.com"
    },
    "delegate": {
        "id": 22,
        "url": "http://patches.dpdk.org/api/users/22/?format=api",
        "username": "pdelarag",
        "first_name": "Pablo",
        "last_name": "de Lara Guarch",
        "email": "pablo.de.lara.guarch@intel.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1530806060-31227-3-git-send-email-shally.verma@caviumnetworks.com/mbox/",
    "series": [
        {
            "id": 422,
            "url": "http://patches.dpdk.org/api/series/422/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=422",
            "date": "2018-07-05T15:54:18",
            "name": "test/crypto: add testcase for asym crypto",
            "version": 4,
            "mbox": "http://patches.dpdk.org/series/422/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/42391/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/42391/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 0EA9A1BFA5;\n\tThu,  5 Jul 2018 17:54:55 +0200 (CEST)",
            "from NAM01-SN1-obe.outbound.protection.outlook.com\n\t(mail-sn1nam01on0077.outbound.protection.outlook.com [104.47.32.77])\n\tby dpdk.org (Postfix) with ESMTP id E8B751BF46\n\tfor <dev@dpdk.org>; Thu,  5 Jul 2018 17:54:52 +0200 (CEST)",
            "from hyd1sverma-dt.caveonetworks.com (115.113.156.2) by\n\tCY4PR0701MB3634.namprd07.prod.outlook.com (2603:10b6:910:92::36) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.906.26;\n\tThu, 5 Jul 2018 15:54:49 +0000"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n\tbh=hvj8EHy4H1T+GHD3+V9B4PARdlmfr5y4c3xd905aSgM=;\n\tb=aUsYkYBFpuqbGdULVulNOSBUoipoYPTtj43xPbTlYzNlEaqPdJ/Pgn9B4LL2GFE67CIeB3aO9xeUltvv9pkszBaVElS5yJAmDdi6KJ+wrubMMyDb3xV2Y0F4louKeTgb+7O5tIShJ1HqQxhf4vBaBiaCKu48NOQfvfRY9x49AEs=",
        "Authentication-Results": "spf=none (sender IP is )\n\tsmtp.mailfrom=Shally.Verma@cavium.com; ",
        "From": "Shally Verma <shally.verma@caviumnetworks.com>",
        "To": "pablo.de.lara.guarch@intel.com",
        "Cc": "dev@dpdk.org, pathreya@caviumnetworks.com,\n\tSunila Sahu <sunila.sahu@caviumnetworks.com>,\n\tAshish Gupta <ashish.gupta@caviumnetworks.com>",
        "Date": "Thu,  5 Jul 2018 21:24:20 +0530",
        "Message-Id": "<1530806060-31227-3-git-send-email-shally.verma@caviumnetworks.com>",
        "X-Mailer": "git-send-email 1.9.1",
        "In-Reply-To": "<1530806060-31227-1-git-send-email-shally.verma@caviumnetworks.com>",
        "References": "<1530806060-31227-1-git-send-email-shally.verma@caviumnetworks.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[115.113.156.2]",
        "X-ClientProxiedBy": "MA1PR0101CA0046.INDPRD01.PROD.OUTLOOK.COM\n\t(2603:1096:a00:22::32) To CY4PR0701MB3634.namprd07.prod.outlook.com\n\t(2603:10b6:910:92::36)",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "e198d485-60d5-4d63-f967-08d5e28fa4de",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020);\n\tSRVR:CY4PR0701MB3634; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; CY4PR0701MB3634;\n\t3:gjbJQnLUB8TrkBYlDbxxGHRamm9zZ80WiGlKmxGrSQyQlAEHrQVYKy93Fbefu2pZzIDetLTIRJcre02/Ao9A22OyonJnfJUovaSgOBXtWbq5vkKOBHMTgnSGZ6WXp+08sm98ZqCCTorNQnMe+SBtH945Oc5UHxgfjlVhFMlEfQkz0v95hZ2vRcV14Hn0qvUDp4ehCZBmtQ/8UrAU2i361b3iPKJOEHFUcWZY8dpFbWmpAarI2Ick38+tJ1DhVOIc;\n\t25:A6JfMuJPRS3ckPdmI5exbn2jgtKNBdHvjDHCI5UZu6a4cuk70W5qscJvQ5v/c1Iok9dW6Q0e6fTbEr/BR7mRywMG93UtW5M35Oy43ruEqzNtosoubcuD32A67HEn0/bc10vW82MeiNNBBLPQf/Ttk+A282mEHr7wKhwQjMw8XtbX8tJcw8EapElBLEWhEaXk0/BWNWHm9Io0Z31qBcJpqGUxvq3mWK32RU5UO5qbrdC1UcKVYBHuhCYx+QRO76u7nYhHhJCo+ueqXu7z5eKcZKTMg9HFlZW02POYZJbJIDUDG9oxch6aVh1cdbikWCiFhQTygttgdc1TtDh1SJ1nSw==;\n\t31:q8EmBcZ6j4bgm3/Mi/QknQRbY6ytYnif5nP6o0qR57wPvarAVr6JM1kXZmemqEYqmF1eZ1sQgMVNKHy5rcnZYoAj5xopVk2pgiMjNgiT/hd9LxxGj30eWur20gqGvyeITPIuMcHbtDJz7KCsS91cVvhguF/tzxtTjyrMwa86U+O9mc5ELwyzvnCs5b4EPfm2V7DKPxNUvrHpHM71Xrpzcv7++sRkGUzM1XRIwK572ks=",
            "1; CY4PR0701MB3634;\n\t20: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;\n\t4:g5BSFIgWyZGHE52bCcvcd076EzXmsVbYdck/pkgA2+IT0ti/jrNEHeL6QFfa+0Mhko2CcZoeHEgg1ozgfKrH0xMHVZ5IZCK4JyrzzBg9doN0YzgbWJ/JD0MWlOvFdD7BqKB/qZLL9/63/Bg+K7ufOBYSSBMHfeSTxSc/RxIMApTUA4/gM6j5uxi4WEIcgQ21dsA+1sGUe2ES6KjfZVOMmYBGAdh3+xXJcrejfbLxktzyiz7WYM3rocDeg47arJhTdpHLjtVQ21R/puxns/MhZA==",
            "=?us-ascii?Q?1; CY4PR0701MB3634;\n\t23:FeankXIIaoYjkY6AKp/Rfvqgq1Nf6ji18Nvb/R/?=\n\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",
            "1; CY4PR0701MB3634;\n\t6:9BpYDnr0r7TNqfCtK1ZINRB02ArxhEJf0cu8NTO3Y790OPa8GSNNiZfWh+A6PsBSSO/7IRV2Oc+nlNlKKqa9npKTBPvSFWinsHxJV6hjTLjwNlENUfCYuqRgbvskoUdxaJVeNkagQyo/LEO3EgO7Dbqc1t0TKA4HPPb7gIv9AY6cs2TEP4Df6NJ/YF5xTKd9OHP9sdEHS9qgLknpbAI8ZMQG08ajCVe1hGLVBiCetldaL5evEhhchxLtsBeiMTr0fqFVyV2q8SxJ8f7uGPYMrhvdA5HKZBjRZEpk+mlHjx1JfstJQpGVuDFVrDAyzYYKhMn9MPob1jAX786q2+3tOmlcXZDyFaQb98mepzDeE4gU0/s/n843qs/8lUNCgvrackEeUepOcgDNc7s5OhqdO9MQAQSMXpsj5GIrUa0OkiJMPEaczFCPYwKuQE054BfLAG1iD9rLlrcrOr6QIj8EEA==;\n\t5:jef7A7mAi7DfmptAhrWfoMCoITPan9b3DwgEi8LdwMkl7cU2WL5lFBj+zEL72cDFu2LEQmsxg07r5HWNGfXSYEuFeKH/6SGtJOduMOIsiAfO0RFuz0I51/khrfzBrVzbRbh5eKKc5LZQSCgVuR/4V5UwhLVx7KTa1KvOYLdwv7Q=;\n\t24:CClX9RwxteELqmwHtI9F6q5V90oN9/Q2Fts9VqE37nvzDZq7ZjOodH3nQPUvaxteHiV6j2hAcW5ieINt3tG2hmFf5NnA9dfRX60aUU7rZR4=",
            "1; CY4PR0701MB3634;\n\t7:wiB02tGZe7U2Qf4036BFeJrzhwmnH/834xUXZFRHWbLoZy/Bx2p/a4/tFGTK70Yh7/AxqIU3BSqswdMTZ0xXV0FAyujKm67WtSMgmOnZI5vhlQxe5epxgXPuxSkgWLclUGtajoa9GNY6R3ctGpDRc2TDMESeHsFyE6TEHCxpCd1FVHg/wKhzamIa8TuL2nazwBQZ3zuqgihDGtDvQRwEu4y2OJgc6ccAn6N25Jkv7Xo6IW6kJGAYg0aQM1+J0oPO"
        ],
        "X-MS-TrafficTypeDiagnostic": "CY4PR0701MB3634:",
        "X-Microsoft-Antispam-PRVS": "<CY4PR0701MB3634ABB5BC1AC1C1D0E2BCC4F0400@CY4PR0701MB3634.namprd07.prod.outlook.com>",
        "X-Exchange-Antispam-Report-Test": "UriScan:;",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(3231254)(944501410)(52105095)(3002001)(149027)(150027)(6041310)(20161123562045)(20161123560045)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016);\n\tSRVR:CY4PR0701MB3634; BCL:0; PCL:0; RULEID:; SRVR:CY4PR0701MB3634; ",
        "X-Forefront-PRVS": "0724FCD4CD",
        "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(366004)(396003)(376002)(136003)(39860400002)(346002)(189003)(199004)(106356001)(54906003)(305945005)(316002)(476003)(53416004)(105586002)(2906002)(2361001)(956004)(2616005)(72206003)(446003)(42882007)(11346002)(16586007)(486006)(44832011)(50466002)(6512007)(69596002)(5660300001)(5024004)(7736002)(478600001)(68736007)(6916009)(3846002)(48376002)(6666003)(50226002)(26005)(81156014)(8676002)(8936002)(97736004)(81166006)(36756003)(76176011)(52116002)(186003)(6116002)(53936002)(16526019)(47776003)(14444005)(2351001)(575784001)(55236004)(107886003)(386003)(51416003)(25786009)(6506007)(66066001)(6486002)(4326008);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR0701MB3634;\n\tH:hyd1sverma-dt.caveonetworks.com; FPR:; SPF:None; LANG:en;\n\tPTR:InfoNoRecords; MX:1; A:1; ",
        "Received-SPF": "None (protection.outlook.com: cavium.com does not designate\n\tpermitted sender hosts)",
        "X-Microsoft-Antispam-Message-Info": "Tls2A7irv4ZNfBgI0BggZMEddfv9WNo6VY+83TGOnl3oVM63/Q9tpcOfpEGFk0awhfsx8kFzD5ah4IDzPiQFgRBrTUMgzqQFMwPTXmq7XbMLj9fjbEXaB0ARTEuhKFTinWQ/CuHCjWkm9oeZG031sKrVe/fnAZnhwX8qYyYfTgdi3Yi3pfv8ImjVnvjesTRL8qAbo4wnHzxi+ta9eh2XDgg9FuzjamdZLVLanT3hoOfhOPg9CVrsVw9VQMjdIqb1G37gyH5wj3bRBorrv3hGiH0jufyanvljBZDevk8KD0RTCnRstgpGl3tpDCa+f5Q9sTVi3JTe+V2NSKd3f6u2olBaSLYSIUOszOxnNx1Sxag=",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-OriginatorOrg": "caviumnetworks.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "05 Jul 2018 15:54:49.9107\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "e198d485-60d5-4d63-f967-08d5e28fa4de",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "711e4ccf-2e9b-4bcf-a551-4094005b6194",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CY4PR0701MB3634",
        "Subject": "[dpdk-dev] [PATCH v4 2/2] test/crypto: add dh and dsa test\n\tapplication",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Sunila Sahu <sunila.sahu@caviumnetworks.com>\n\nTest application include test case for :\n- Deiffie-Hellman  key pair generation and shared secret compute\n- DSA sign and verify\n\nTest cases uses predefined test vectors.\n\nSigned-off-by: Sunila Sahu <sunila.sahu@caviumnetworks.com>\nSigned-off-by: Shally Verma <shally.verma@caviumnetworks.com>\nSigned-off-by: Ashish Gupta <ashish.gupta@caviumnetworks.com>\n---\n test/test/test_cryptodev_asym.c             | 582 ++++++++++++++++++++++++++++\n test/test/test_cryptodev_dh_test_vectors.h  |  80 ++++\n test/test/test_cryptodev_dsa_test_vectors.h | 117 ++++++\n 3 files changed, 779 insertions(+)",
    "diff": "diff --git a/test/test/test_cryptodev_asym.c b/test/test/test_cryptodev_asym.c\nindex 9b6ffac..5cf2b6f 100644\n--- a/test/test/test_cryptodev_asym.c\n+++ b/test/test/test_cryptodev_asym.c\n@@ -15,6 +15,8 @@\n #include <rte_crypto.h>\n \n #include \"test_cryptodev.h\"\n+#include \"test_cryptodev_dh_test_vectors.h\"\n+#include \"test_cryptodev_dsa_test_vectors.h\"\n #include \"test_cryptodev_mod_test_vectors.h\"\n #include \"test_cryptodev_rsa_test_vectors.h\"\n #include \"test_cryptodev_asym_util.h\"\n@@ -548,6 +550,400 @@ test_capability(void)\n }\n \n static int\n+test_dh_gen_shared_sec(struct rte_crypto_asym_xform *xfrm)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tstruct rte_cryptodev_asym_session *sess = NULL;\n+\tint status = TEST_SUCCESS;\n+\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n+\tuint8_t output[TEST_DH_MOD_LEN];\n+\tstruct rte_crypto_asym_xform xform = *xfrm;\n+\tuint8_t peer[] = \"01234567890123456789012345678901234567890123456789\";\n+\n+\tsess = rte_cryptodev_asym_session_create(sess_mpool);\n+\tif (sess == NULL) {\n+\t\tsnprintf(test_msg,\n+\t\t\t\tASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\n+\t/* Setup a xform and op to generate private key only */\n+\txform.dh.type = RTE_CRYPTO_ASYM_OP_SHARED_SECRET_COMPUTE;\n+\txform.next = NULL;\n+\tasym_op->dh.priv_key.data = dh_test_params.priv_key.data;\n+\tasym_op->dh.priv_key.length = dh_test_params.priv_key.length;\n+\tasym_op->dh.pub_key.data = (uint8_t *)peer;\n+\tasym_op->dh.pub_key.length = sizeof(peer);\n+\tasym_op->dh.shared_secret.data = output;\n+\tasym_op->dh.shared_secret.length = sizeof(output);\n+\n+\tif (rte_cryptodev_asym_session_init(dev_id, sess, &xform,\n+\t\t\tsess_mpool) < 0) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"unabled to config sym session\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\n+\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\tdebug_hexdump(stdout, \"shared secret:\",\n+\t\t\tasym_op->dh.shared_secret.data,\n+\t\t\tasym_op->dh.shared_secret.length);\n+\n+error_exit:\n+\tif (sess != NULL) {\n+\t\trte_cryptodev_asym_session_clear(dev_id, sess);\n+\t\trte_cryptodev_asym_session_free(sess);\n+\t}\n+\tif (op != NULL) {\n+\t\tif (asym_op->dh.priv_key.data != NULL)\n+\t\t\trte_free(asym_op->dh.priv_key.data);\n+\t\trte_crypto_op_free(op);\n+\t}\n+\treturn status;\n+}\n+\n+static int\n+test_dh_gen_priv_key(struct rte_crypto_asym_xform *xfrm)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tstruct rte_cryptodev_asym_session *sess = NULL;\n+\tint status = TEST_SUCCESS;\n+\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n+\tuint8_t output[TEST_DH_MOD_LEN];\n+\tstruct rte_crypto_asym_xform xform = *xfrm;\n+\n+\tsess = rte_cryptodev_asym_session_create(sess_mpool);\n+\tif (sess == NULL) {\n+\t\tsnprintf(test_msg,\n+\t\t\t\t ASYM_TEST_MSG_LEN,\n+\t\t\t\t \"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\n+\t/* Setup a xform and op to generate private key only */\n+\txform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE;\n+\txform.next = NULL;\n+\tasym_op->dh.priv_key.data = output;\n+\tasym_op->dh.priv_key.length = sizeof(output);\n+\n+\tif (rte_cryptodev_asym_session_init(dev_id, sess, &xform,\n+\t\t\tsess_mpool) < 0) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"unabled to config sym session\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\n+\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\tdebug_hexdump(stdout, \"private key:\",\n+\t\t\tasym_op->dh.priv_key.data,\n+\t\t\tasym_op->dh.priv_key.length);\n+\n+\n+error_exit:\n+\tif (sess != NULL) {\n+\t\trte_cryptodev_asym_session_clear(dev_id, sess);\n+\t\trte_cryptodev_asym_session_free(sess);\n+\t}\n+\tif (op != NULL)\n+\t\trte_crypto_op_free(op);\n+\n+\treturn status;\n+}\n+\n+\n+static int\n+test_dh_gen_pub_key(struct rte_crypto_asym_xform *xfrm)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tstruct rte_cryptodev_asym_session *sess = NULL;\n+\tint status = TEST_SUCCESS;\n+\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n+\tuint8_t output[TEST_DH_MOD_LEN];\n+\tstruct rte_crypto_asym_xform xform = *xfrm;\n+\n+\tsess = rte_cryptodev_asym_session_create(sess_mpool);\n+\tif (sess == NULL) {\n+\t\tsnprintf(test_msg,\n+\t\t\t\t ASYM_TEST_MSG_LEN,\n+\t\t\t\t \"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\t/* Setup a xform chain to generate public key\n+\t * using test private key\n+\t *\n+\t */\n+\txform.dh.type = RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE;\n+\txform.next = NULL;\n+\n+\tasym_op->dh.pub_key.data = output;\n+\tasym_op->dh.pub_key.length = sizeof(output);\n+\t/* load pre-defined private key */\n+\tasym_op->dh.priv_key.data = rte_malloc(NULL,\n+\t\t\t\t\tdh_test_params.priv_key.length,\n+\t\t\t\t\t0);\n+\tasym_op->dh.priv_key = dh_test_params.priv_key;\n+\n+\tif (rte_cryptodev_asym_session_init(dev_id, sess, &xform,\n+\t\t\tsess_mpool) < 0) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"unabled to config sym session\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\n+\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\tdebug_hexdump(stdout, \"pub key:\",\n+\t\t\tasym_op->dh.pub_key.data, asym_op->dh.pub_key.length);\n+\n+\tdebug_hexdump(stdout, \"priv key:\",\n+\t\t\tasym_op->dh.priv_key.data, asym_op->dh.priv_key.length);\n+\n+error_exit:\n+\tif (sess != NULL) {\n+\t\trte_cryptodev_asym_session_clear(dev_id, sess);\n+\t\trte_cryptodev_asym_session_free(sess);\n+\t}\n+\tif (op != NULL) {\n+\t\tif (asym_op->dh.priv_key.data != NULL)\n+\t\t\trte_free(asym_op->dh.priv_key.data);\n+\t\trte_crypto_op_free(op);\n+\n+\t}\n+\treturn status;\n+}\n+\n+static int\n+test_dh_gen_kp(struct rte_crypto_asym_xform *xfrm)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tstruct rte_cryptodev_asym_session *sess = NULL;\n+\tint status = TEST_SUCCESS;\n+\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n+\tuint8_t out_pub_key[TEST_DH_MOD_LEN];\n+\tuint8_t out_prv_key[TEST_DH_MOD_LEN];\n+\tstruct rte_crypto_asym_xform pub_key_xform;\n+\tstruct rte_crypto_asym_xform xform = *xfrm;\n+\n+\tsess = rte_cryptodev_asym_session_create(sess_mpool);\n+\tif (sess == NULL) {\n+\t\tsnprintf(test_msg,\n+\t\t\t\t ASYM_TEST_MSG_LEN,\n+\t\t\t\t \"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\t/* Setup a xform chain to generate\n+\t * private key first followed by\n+\t * public key\n+\t */xform.dh.type = RTE_CRYPTO_ASYM_OP_PRIVATE_KEY_GENERATE;\n+\tpub_key_xform.xform_type = RTE_CRYPTO_ASYM_XFORM_DH;\n+\tpub_key_xform.dh.type = RTE_CRYPTO_ASYM_OP_PUBLIC_KEY_GENERATE;\n+\txform.next = &pub_key_xform;\n+\n+\tasym_op->dh.pub_key.data = out_pub_key;\n+\tasym_op->dh.pub_key.length = sizeof(out_pub_key);\n+\tasym_op->dh.priv_key.data = out_prv_key;\n+\tasym_op->dh.priv_key.length = sizeof(out_prv_key);\n+\tif (rte_cryptodev_asym_session_init(dev_id, sess, &xform,\n+\t\t\tsess_mpool) < 0) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"unabled to config sym session\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\n+\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tdebug_hexdump(stdout, \"priv key:\",\n+\t\t\tout_prv_key, asym_op->dh.priv_key.length);\n+\tdebug_hexdump(stdout, \"pub key:\",\n+\t\t\tout_pub_key, asym_op->dh.pub_key.length);\n+\n+error_exit:\n+\tif (sess != NULL) {\n+\t\trte_cryptodev_asym_session_clear(dev_id, sess);\n+\t\trte_cryptodev_asym_session_free(sess);\n+\t}\n+\tif (op != NULL)\n+\t\trte_crypto_op_free(op);\n+\n+\treturn status;\n+}\n+\n+static int\n test_mod_inv(void)\n {\n \tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n@@ -802,12 +1198,198 @@ test_mod_exp(void)\n \treturn status;\n }\n \n+static int\n+test_dh_keygenration(void)\n+{\n+\tint status;\n+\n+\tdebug_hexdump(stdout, \"p:\", dh_xform.dh.p.data, dh_xform.dh.p.length);\n+\tdebug_hexdump(stdout, \"g:\", dh_xform.dh.g.data, dh_xform.dh.g.length);\n+\tdebug_hexdump(stdout, \"priv_key:\", dh_test_params.priv_key.data,\n+\t\t\tdh_test_params.priv_key.length);\n+\n+\tRTE_LOG(INFO, USER1,\n+\t\t\"Test Public and Private key pair generation\\n\");\n+\n+\tstatus = test_dh_gen_kp(&dh_xform);\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\tRTE_LOG(INFO, USER1,\n+\t\t\"Test Public Key Generation using pre-defined priv key\\n\");\n+\n+\tstatus = test_dh_gen_pub_key(&dh_xform);\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\tRTE_LOG(INFO, USER1,\n+\t\t\"Test Private Key Generation only\\n\");\n+\n+\tstatus = test_dh_gen_priv_key(&dh_xform);\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\tRTE_LOG(INFO, USER1,\n+\t\t\"Test shared secret compute\\n\");\n+\n+\tstatus = test_dh_gen_shared_sec(&dh_xform);\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\treturn status;\n+}\n+\n+static int\n+test_dsa_sign(void)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tstruct rte_cryptodev_asym_session *sess = NULL;\n+\tint status = TEST_SUCCESS;\n+\tchar test_msg[ASYM_TEST_MSG_LEN + 1];\n+\tuint8_t r[TEST_DH_MOD_LEN];\n+\tuint8_t s[TEST_DH_MOD_LEN];\n+\tuint8_t dgst[] = \"35d81554afaad2cf18f3a1770d5fedc4ea5be344\";\n+\n+\tsess = rte_cryptodev_asym_session_create(sess_mpool);\n+\tif (sess == NULL) {\n+\t\tsnprintf(test_msg,\n+\t\t\t\t ASYM_TEST_MSG_LEN,\n+\t\t\t\t \"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\n+\tdebug_hexdump(stdout, \"p: \", dsa_xform.dsa.p.data,\n+\t\t\tdsa_xform.dsa.p.length);\n+\tdebug_hexdump(stdout, \"q: \", dsa_xform.dsa.q.data,\n+\t\t\tdsa_xform.dsa.q.length);\n+\tdebug_hexdump(stdout, \"g: \", dsa_xform.dsa.g.data,\n+\t\t\tdsa_xform.dsa.g.length);\n+\tdebug_hexdump(stdout, \"priv_key: \", dsa_xform.dsa.x.data,\n+\t\t\tdsa_xform.dsa.x.length);\n+\n+\tif (rte_cryptodev_asym_session_init(dev_id, sess, &dsa_xform,\n+\t\t\t\tsess_mpool) < 0) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"unabled to config sym session\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\tasym_op->dsa.op_type = RTE_CRYPTO_ASYM_OP_SIGN;\n+\tasym_op->dsa.message.data = dgst;\n+\tasym_op->dsa.message.length = sizeof(dgst);\n+\tasym_op->dsa.r.length = sizeof(r);\n+\tasym_op->dsa.r.data = r;\n+\tasym_op->dsa.s.length = sizeof(s);\n+\tasym_op->dsa.s.data = s;\n+\n+\tsnprintf(test_msg, ASYM_TEST_MSG_LEN, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\tasym_op = result_op->asym;\n+\n+\tdebug_hexdump(stdout, \"r:\",\n+\t\t\tasym_op->dsa.r.data, asym_op->dsa.r.length);\n+\tdebug_hexdump(stdout, \"s:\",\n+\t\t\tasym_op->dsa.s.data, asym_op->dsa.s.length);\n+\n+\t/* Test PMD DSA sign verification using signer public key */\n+\tasym_op->dsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY;\n+\n+\t/* copy signer public key */\n+\tasym_op->dsa.y.data = dsa_test_params.y.data;\n+\tasym_op->dsa.y.length = dsa_test_params.y.length;\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\tif (result_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {\n+\t\tsnprintf(test_msg, ASYM_TEST_MSG_LEN,\n+\t\t\t\t\"line %u FAILED: %s\",\n+\t\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t}\n+error_exit:\n+\tif (sess != NULL) {\n+\t\trte_cryptodev_asym_session_clear(dev_id, sess);\n+\t\trte_cryptodev_asym_session_free(sess);\n+\t}\n+\tif (op != NULL)\n+\t\trte_crypto_op_free(op);\n+\treturn status;\n+}\n+\n+static int\n+test_dsa(void)\n+{\n+\tint status;\n+\tstatus = test_dsa_sign();\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\treturn status;\n+}\n+\n+\n static struct unit_test_suite cryptodev_openssl_asym_testsuite  = {\n \t.suite_name = \"Crypto Device OPENSSL ASYM Unit Test Suite\",\n \t.setup = testsuite_setup,\n \t.teardown = testsuite_teardown,\n \t.unit_test_cases = {\n \t\tTEST_CASE_ST(ut_setup, ut_teardown, test_capability),\n+\t\tTEST_CASE_ST(ut_setup, ut_teardown, test_dsa),\n+\t\tTEST_CASE_ST(ut_setup, ut_teardown, test_dh_keygenration),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown, test_rsa_enc_dec),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown, test_rsa_sign_verify),\n \t\tTEST_CASE_ST(ut_setup, ut_teardown, test_mod_inv),\ndiff --git a/test/test/test_cryptodev_dh_test_vectors.h b/test/test/test_cryptodev_dh_test_vectors.h\nnew file mode 100644\nindex 0000000..fe7510d\n--- /dev/null\n+++ b/test/test/test_cryptodev_dh_test_vectors.h\n@@ -0,0 +1,80 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright(c) 2018 Cavium Networks\n+ */\n+\n+#ifndef TEST_CRYPTODEV_DH_TEST_VECTORS_H_\n+#define TEST_CRYPTODEV_DH_TEST_VECTORS_H_\n+\n+#include \"rte_crypto_asym.h\"\n+\n+#define TEST_DATA_SIZE 4096\n+#define TEST_DH_MOD_LEN 1024\n+\n+\n+struct dh_test_param {\n+\trte_crypto_param priv_key;\n+};\n+\n+uint8_t dh_priv[] = {\n+\t0x46, 0x3c, 0x7b, 0x43, 0xd1, 0xb8, 0xd4, 0x7a,\n+\t0x56, 0x28, 0x85, 0x79, 0xcc, 0xd8, 0x90, 0x03,\n+\t0x0c, 0x4b, 0xc6, 0xd3, 0x7f, 0xb3, 0x19, 0x84,\n+\t0x8a, 0xc6, 0x0d, 0x24, 0x5e, 0xaa, 0x7e, 0x7a,\n+\t0x73, 0x88, 0xa6, 0x47, 0x7c, 0x42, 0x78, 0x63,\n+\t0x11, 0x12, 0xd3, 0xa0, 0xc5, 0xfe, 0xfd, 0xf2,\n+\t0x9e, 0x17, 0x90, 0xe5, 0x6d, 0xcc, 0x20, 0x6f,\n+\t0xe8, 0x82, 0x28, 0xbf, 0x5c, 0xe6, 0xd4, 0x86,\n+\t0x5c, 0x35, 0x32, 0x97, 0xc2, 0x86, 0x1b, 0xc5,\n+\t0x59, 0x1c, 0x0b, 0x1b, 0xec, 0x60, 0x3c, 0x1d,\n+\t0x8d, 0x7f, 0xf0, 0xc7, 0x48, 0x3a, 0x51, 0x09,\n+\t0xf2, 0x3e, 0x9e, 0x35, 0x74, 0x98, 0x4d, 0xad,\n+\t0x39, 0xa7, 0xf2, 0xd2, 0xb4, 0x32, 0xd3, 0xc8,\n+\t0xe9, 0x45, 0xbe, 0x56, 0xe7, 0x87, 0xe0, 0xa0,\n+\t0x97, 0x6b, 0x5f, 0x99, 0x5e, 0x41, 0x59, 0x33,\n+\t0x95, 0x64, 0x0d, 0xe9, 0x58, 0x5b, 0xa6, 0x38\n+};\n+\n+uint8_t dh_p[] = {\n+\t0xef, 0xee, 0x8c, 0x8b, 0x3f, 0x85, 0x95, 0xcd,\n+\t0x4d, 0x68, 0x5d, 0x4a, 0x5d, 0x1f, 0x2a, 0x2e,\n+\t0xdd, 0xcf, 0xef, 0x1b, 0x3b, 0xe9, 0x7b, 0x0c,\n+\t0x13, 0xee, 0x76, 0xd5, 0x93, 0xca, 0x8b, 0xc8,\n+\t0x0b, 0x97, 0x00, 0xec, 0x1f, 0x34, 0xa2, 0xce,\n+\t0x83, 0x8d, 0x80, 0xea, 0xfe, 0x11, 0xed, 0x28,\n+\t0xdd, 0x32, 0x22, 0x77, 0x96, 0x4e, 0xc5, 0xed,\n+\t0xc8, 0x7a, 0x52, 0x10, 0x22, 0xcc, 0xb2, 0x4d,\n+\t0xd3, 0xda, 0x03, 0xf5, 0x1e, 0xa8, 0x79, 0x23,\n+\t0x8b, 0xe1, 0x78, 0x47, 0x07, 0x5b, 0x26, 0xbb,\n+\t0x53, 0x46, 0x0b, 0x18, 0x5c, 0x07, 0x4e, 0xb6,\n+\t0x76, 0xc9, 0xa8, 0xd5, 0x30, 0xa3, 0xbe, 0x8d,\n+\t0xae, 0xcd, 0x34, 0x68, 0x62, 0x5f, 0xb9, 0x5c,\n+\t0x34, 0x90, 0xf0, 0xda, 0x47, 0x86, 0x36, 0x04,\n+\t0x28, 0xbc, 0x7d, 0xae, 0x9d, 0x4e, 0x61, 0x28,\n+\t0x70, 0xdb, 0xa6, 0x55, 0x04, 0x46, 0x27, 0xe3\n+};\n+\n+uint8_t dh_g[] = {0x02};\n+\n+struct dh_test_param dh_test_params = {\n+\t.priv_key = {\n+\t\t.data = dh_priv,\n+\t\t.length = sizeof(dh_priv)\n+\t}\n+};\n+\n+struct rte_crypto_asym_xform dh_xform = {\n+\t.next = NULL,\n+\t.xform_type = RTE_CRYPTO_ASYM_XFORM_DH,\n+\t.dh = {\n+\t\t.p = {\n+\t\t\t.data = dh_p,\n+\t\t\t.length = sizeof(dh_p)\n+\t\t},\n+\t\t.g = {\n+\t\t\t.data = dh_g,\n+\t\t\t.length = sizeof(dh_g)\n+\t\t},\n+\t}\n+};\n+\n+#endif /* TEST_CRYPTODEV_DH_TEST_VECTORS_H__ */\ndiff --git a/test/test/test_cryptodev_dsa_test_vectors.h b/test/test/test_cryptodev_dsa_test_vectors.h\nnew file mode 100644\nindex 0000000..bbcb0d7\n--- /dev/null\n+++ b/test/test/test_cryptodev_dsa_test_vectors.h\n@@ -0,0 +1,117 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright(c) 2018 Cavium Networks\n+ */\n+\n+#ifndef TEST_CRYPTODEV_DSA_TEST_VECTORS_H_\n+#define TEST_CRYPTODEV_DSA_TEST_VECTORS_H_\n+\n+#include \"rte_crypto_asym.h\"\n+\n+#define TEST_DATA_SIZE 4096\n+\n+\n+struct dsa_test_param {\n+\trte_crypto_param y;\n+};\n+\n+static unsigned char dsa_x[] = {\n+\t0xc5, 0x3e, 0xae, 0x6d, 0x45, 0x32, 0x31, 0x64,\n+\t0xc7, 0xd0, 0x7a, 0xf5, 0x71, 0x57, 0x03, 0x74,\n+\t0x4a, 0x63, 0xfc, 0x3a\n+};\n+\n+uint8_t dsa_y[] = {\n+\t0x31, 0x3f, 0xd9, 0xeb, 0xca, 0x91, 0x57, 0x4e,\n+\t0x1c, 0x2e, 0xeb, 0xe1, 0x51, 0x7c, 0x57, 0xe0,\n+\t0xc2, 0x1b, 0x02, 0x09, 0x87, 0x21, 0x40, 0xc5,\n+\t0x32, 0x87, 0x61, 0xbb, 0xb2, 0x45, 0x0b, 0x33,\n+\t0xf1, 0xb1, 0x8b, 0x40, 0x9c, 0xe9, 0xab, 0x7c,\n+\t0x4c, 0xd8, 0xfd, 0xa3, 0x39, 0x1e, 0x8e, 0x34,\n+\t0x86, 0x83, 0x57, 0xc1, 0x99, 0xe1, 0x6a, 0x6b,\n+\t0x2e, 0xba, 0x06, 0xd6, 0x74, 0x9d, 0xef, 0x79,\n+\t0x1d, 0x79, 0xe9, 0x5d, 0x3a, 0x4d, 0x09, 0xb2,\n+\t0x4c, 0x39, 0x2a, 0xd8, 0x9d, 0xbf, 0x10, 0x09,\n+\t0x95, 0xae, 0x19, 0xc0, 0x10, 0x62, 0x05, 0x6b,\n+\t0xb1, 0x4b, 0xce, 0x00, 0x5e, 0x87, 0x31, 0xef,\n+\t0xde, 0x17, 0x5f, 0x95, 0xb9, 0x75, 0x08, 0x9b,\n+\t0xdc, 0xda, 0xea, 0x56, 0x2b, 0x32, 0x78, 0x6d,\n+\t0x96, 0xf5, 0xa3, 0x1a, 0xed, 0xf7, 0x53, 0x64,\n+\t0x00, 0x8a, 0xd4, 0xff, 0xfe, 0xbb, 0x97, 0x0b\n+};\n+\n+static unsigned char dsa_p[] = {\n+\t0xa8,  0xf9,  0xcd,  0x20,  0x1e,  0x5e,  0x35,  0xd8,\n+\t0x92,  0xf8,  0x5f,  0x80,  0xe4,  0xdb,  0x25,  0x99,\n+\t0xa5,  0x67,  0x6a,  0x3b,  0x1d,  0x4f,  0x19,  0x03,\n+\t0x30,  0xed,  0x32,  0x56,  0xb2,  0x6d,  0x0e,  0x80,\n+\t0xa0,  0xe4,  0x9a,  0x8f,  0xff,  0xaa,  0xad,  0x2a,\n+\t0x24,  0xf4,  0x72,  0xd2,  0x57,  0x32,  0x41,  0xd4,\n+\t0xd6,  0xd6,  0xc7,  0x48,  0x0c,  0x80,  0xb4,  0xc6,\n+\t0x7b,  0xb4,  0x47,  0x9c,  0x15,  0xad,  0xa7,  0xea,\n+\t0x84,  0x24,  0xd2,  0x50,  0x2f,  0xa0,  0x14,  0x72,\n+\t0xe7,  0x60,  0x24,  0x17,  0x13,  0xda,  0xb0,  0x25,\n+\t0xae,  0x1b,  0x02,  0xe1,  0x70,  0x3a,  0x14,  0x35,\n+\t0xf6,  0x2d,  0xdf,  0x4e,  0xe4,  0xc1,  0xb6,  0x64,\n+\t0x06,  0x6e,  0xb2,  0x2f,  0x2e,  0x3b,  0xf2,  0x8b,\n+\t0xb7,  0x0a,  0x2a,  0x76,  0xe4,  0xfd,  0x5e,  0xbe,\n+\t0x2d,  0x12,  0x29,  0x68,  0x1b,  0x5b,  0x06,  0x43,\n+\t0x9a,  0xc9,  0xc7,  0xe9,  0xd8,  0xbd,  0xe2,  0x83\n+};\n+\n+static unsigned char dsa_q[] = {\n+\t0xf8,  0x5f,  0x0f,  0x83,  0xac,  0x4d,  0xf7,  0xea,\n+\t0x0c,  0xdf,  0x8f,  0x46,  0x9b,  0xfe,  0xea,  0xea,\n+\t0x14,  0x15,  0x64,  0x95\n+};\n+\n+static unsigned char dsa_g[] = {\n+\t0x2b,  0x31,  0x52,  0xff,  0x6c,  0x62,  0xf1,  0x46,\n+\t0x22,  0xb8,  0xf4,  0x8e,  0x59,  0xf8,  0xaf,  0x46,\n+\t0x88,  0x3b,  0x38,  0xe7,  0x9b,  0x8c,  0x74,  0xde,\n+\t0xea,  0xe9,  0xdf,  0x13,  0x1f,  0x8b,  0x85,  0x6e,\n+\t0x3a,  0xd6,  0xc8,  0x45,  0x5d,  0xab,  0x87,  0xcc,\n+\t0x0d,  0xa8,  0xac,  0x97,  0x34,  0x17,  0xce,  0x4f,\n+\t0x78,  0x78,  0x55,  0x7d,  0x6c,  0xdf,  0x40,  0xb3,\n+\t0x5b,  0x4a,  0x0c,  0xa3,  0xeb,  0x31,  0x0c,  0x6a,\n+\t0x95,  0xd6,  0x8c,  0xe2,  0x84,  0xad,  0x4e,  0x25,\n+\t0xea,  0x28,  0x59,  0x16,  0x11,  0xee,  0x08,  0xb8,\n+\t0x44,  0x4b,  0xd6,  0x4b,  0x25,  0xf3,  0xf7,  0xc5,\n+\t0x72,  0x41,  0x0d,  0xdf,  0xb3,  0x9c,  0xc7,  0x28,\n+\t0xb9,  0xc9,  0x36,  0xf8,  0x5f,  0x41,  0x91,  0x29,\n+\t0x86,  0x99,  0x29,  0xcd,  0xb9,  0x09,  0xa6,  0xa3,\n+\t0xa9,  0x9b,  0xbe,  0x08,  0x92,  0x16,  0x36,  0x81,\n+\t0x71,  0xbd,  0x0b,  0xa8,  0x1d,  0xe4,  0xfe,  0x33\n+};\n+\n+struct dsa_test_param dsa_test_params = {\n+\t.y = {\n+\t\t.data = dsa_y,\n+\t\t.length = sizeof(dsa_y)\n+\t}\n+};\n+\n+struct rte_crypto_asym_xform dsa_xform = {\n+\t.next = NULL,\n+\t.xform_type = RTE_CRYPTO_ASYM_XFORM_DSA,\n+\t.dsa = {\n+\t\t.p = {\n+\t\t\t.data = dsa_p,\n+\t\t\t.length = sizeof(dsa_p)\n+\t\t},\n+\t\t.q = {\n+\t\t\t.data = dsa_q,\n+\t\t\t.length = sizeof(dsa_q)\n+\t\t},\n+\t\t.g = {\n+\t\t\t.data = dsa_g,\n+\t\t\t.length = sizeof(dsa_g)\n+\t\t},\n+\t\t.x = {\n+\t\t\t.data = dsa_x,\n+\t\t\t.length = sizeof(dsa_x)\n+\t\t}\n+\n+\t}\n+};\n+\n+#endif /* TEST_CRYPTODEV_DSA_TEST_VECTORS_H__ */\n",
    "prefixes": [
        "v4",
        "2/2"
    ]
}