get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/111524/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 111524,
    "url": "https://patches.dpdk.org/api/patches/111524/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20220520055445.40063-41-arkadiuszx.kusztal@intel.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220520055445.40063-41-arkadiuszx.kusztal@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220520055445.40063-41-arkadiuszx.kusztal@intel.com",
    "date": "2022-05-20T05:54:45",
    "name": "[40/40] test/crypto: added test for dh priv key generation",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "64c4db2254889e3e1c7d20dbdf61100a15a8ef1d",
    "submitter": {
        "id": 452,
        "url": "https://patches.dpdk.org/api/people/452/?format=api",
        "name": "Arkadiusz Kusztal",
        "email": "arkadiuszx.kusztal@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20220520055445.40063-41-arkadiuszx.kusztal@intel.com/mbox/",
    "series": [
        {
            "id": 23057,
            "url": "https://patches.dpdk.org/api/series/23057/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=23057",
            "date": "2022-05-20T05:54:05",
            "name": "cryptodev: rsa, dh, ecdh changes",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/23057/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/111524/comments/",
    "check": "warning",
    "checks": "https://patches.dpdk.org/api/patches/111524/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 64AA8A0503;\n\tFri, 20 May 2022 09:06:36 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id DAF7242C09;\n\tFri, 20 May 2022 09:04:13 +0200 (CEST)",
            "from mga06.intel.com (mga06b.intel.com [134.134.136.31])\n by mails.dpdk.org (Postfix) with ESMTP id 493B042C08\n for <dev@dpdk.org>; Fri, 20 May 2022 09:04:11 +0200 (CEST)",
            "from orsmga008.jf.intel.com ([10.7.209.65])\n by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 20 May 2022 00:04:10 -0700",
            "from silpixa00399302.ir.intel.com ([10.237.214.136])\n by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:04:09 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1653030251; x=1684566251;\n h=from:to:cc:subject:date:message-id:in-reply-to: references;\n bh=DqOGHprX3BcY6VZxR62pTuJeVgU5qeNIJdlhTUy/MWU=;\n b=XqXMVlKB9UvmyG42Dnnp/56ACpms7x1ZNpYDWnq82p+QMosWzMJM9BSs\n Ei1mxzYJlIly114CbJDgZh2w9dCqDW5Sid0GGkDUB9UjCkR/2hMs+JqvY\n HcuglMvSgX6e65GPAGapi2QM0Sa0Aettrg/2Dc0xoFCx/EFaUw7ntbijv\n k4Z2t3V2/mVZV/PcDcrYYggoggY/80W4J3kgBII6WOlyi2bwmOTPZRR3f\n Y8TCzKz2+LXmz2nqGGi7nh9KZyZIfnwQgsaKn7iYaTzrZExC3KxsI6A6Y\n oIRhdsv+fa9Jv3Ebfp55OkfUxlcBf5ZR5ZSjt+ZO2u2DVXBf+DXSQGDvE w==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6400,9594,10352\"; a=\"333140578\"",
            "E=Sophos;i=\"5.91,238,1647327600\"; d=\"scan'208\";a=\"333140578\"",
            "E=Sophos;i=\"5.91,238,1647327600\"; d=\"scan'208\";a=\"599058717\""
        ],
        "X-ExtLoop1": "1",
        "From": "Arek Kusztal <arkadiuszx.kusztal@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com,\n Arek Kusztal <arkadiuszx.kusztal@intel.com>",
        "Subject": "[PATCH 40/40] test/crypto: added test for dh priv key generation",
        "Date": "Fri, 20 May 2022 06:54:45 +0100",
        "Message-Id": "<20220520055445.40063-41-arkadiuszx.kusztal@intel.com>",
        "X-Mailer": "git-send-email 2.13.6",
        "In-Reply-To": "<20220520055445.40063-1-arkadiuszx.kusztal@intel.com>",
        "References": "<20220520055445.40063-1-arkadiuszx.kusztal@intel.com>",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "- re-added test for dh private gey generation.\nThis time zero length of priv key determines if key is\ngenerated.\n\nSigned-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>\n---\n app/test/test_cryptodev_asym.c | 90 ++++++++++++++++++++++++++++++++++++++++++\n 1 file changed, 90 insertions(+)",
    "diff": "diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c\nindex ed86eaf8ba..3a562eb443 100644\n--- a/app/test/test_cryptodev_asym.c\n+++ b/app/test/test_cryptodev_asym.c\n@@ -1290,6 +1290,90 @@ test_dh_gen_pub_key(struct rte_crypto_asym_xform *xfrm)\n }\n \n static int\n+test_dh_gen_kp(struct rte_crypto_asym_xform *xfrm)\n+{\n+\tstruct crypto_testsuite_params_asym *ts_params = &testsuite_params;\n+\tstruct rte_mempool *op_mpool = ts_params->op_mpool;\n+\tstruct rte_mempool *sess_mpool = ts_params->session_mpool;\n+\tuint8_t dev_id = ts_params->valid_devs[0];\n+\tstruct rte_crypto_asym_op *asym_op = NULL;\n+\tstruct rte_crypto_op *op = NULL, *result_op = NULL;\n+\tvoid *sess = NULL;\n+\tint ret, status = TEST_SUCCESS;\n+\tuint8_t out_pub_key[TEST_DH_MOD_LEN];\n+\tuint8_t out_prv_key[TEST_DH_MOD_LEN];\n+\tstruct rte_crypto_asym_xform xform = *xfrm;\n+\n+\t/* set up crypto op data structure */\n+\top = rte_crypto_op_alloc(op_mpool, RTE_CRYPTO_OP_TYPE_ASYMMETRIC);\n+\tif (!op) {\n+\t\tRTE_LOG(ERR, USER1,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to allocate asymmetric crypto \"\n+\t\t\t\"operation struct\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tasym_op = op->asym;\n+\t/* Setup a xform chain to generate\n+\t * private key first followed by\n+\t * public key\n+\t */\n+\n+\tasym_op->dh.op_type = RTE_CRYPTO_ASYM_KE_PUBLIC_KEY_GENERATE;\n+\tasym_op->dh.pub_key.data = out_pub_key;\n+\tasym_op->dh.pub_key.length = sizeof(out_pub_key);\n+\tasym_op->dh.priv_key.data = out_prv_key;\n+\tasym_op->dh.priv_key.length = 0;\n+\n+\tret = rte_cryptodev_asym_session_create(dev_id, &xform, sess_mpool, &sess);\n+\tif (ret < 0) {\n+\t\tRTE_LOG(ERR, USER1,\n+\t\t\t\t\"line %u FAILED: %s\", __LINE__,\n+\t\t\t\t\"Session creation failed\");\n+\t\tstatus = (ret == -ENOTSUP) ? TEST_SKIPPED : TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\t/* attach asymmetric crypto session to crypto operations */\n+\trte_crypto_op_attach_asym_session(op, sess);\n+\n+\tRTE_LOG(DEBUG, USER1, \"Process ASYM operation\");\n+\n+\t/* Process crypto operation */\n+\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n+\t\tRTE_LOG(ERR, USER1,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Error sending packet for operation\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\n+\twhile (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) == 0)\n+\t\trte_pause();\n+\n+\tif (result_op == NULL) {\n+\t\tRTE_LOG(ERR, USER1,\n+\t\t\t\"line %u FAILED: %s\",\n+\t\t\t__LINE__, \"Failed to process asym crypto op\");\n+\t\tstatus = TEST_FAILED;\n+\t\tgoto error_exit;\n+\t}\n+\tdebug_hexdump(stdout, \"priv key:\",\n+\t\t\tout_prv_key, asym_op->dh.priv_key.length);\n+\tdebug_hexdump(stdout, \"pub key:\",\n+\t\t\tout_pub_key, asym_op->dh.pub_key.length);\n+\n+error_exit:\n+\tif (sess != NULL)\n+\t\trte_cryptodev_asym_session_free(dev_id, sess);\n+\tif (op != NULL)\n+\t\trte_crypto_op_free(op);\n+\n+\treturn status;\n+}\n+\n+static int\n test_mod_inv(void)\n {\n \tstruct crypto_testsuite_params_asym *ts_params = &testsuite_params;\n@@ -1525,6 +1609,12 @@ test_dh_keygenration(void)\n \t\t\tdh_test_params.priv_key.length);\n \n \tRTE_LOG(INFO, USER1,\n+\t\t\"Test Public and Private key pair generation\\n\");\n+\n+\tstatus = test_dh_gen_kp(&dh_xform);\n+\tTEST_ASSERT_EQUAL(status, 0, \"Test failed\");\n+\n+\tRTE_LOG(INFO, USER1,\n \t\t\"Test Public Key Generation using pre-defined priv key\\n\");\n \n \tstatus = test_dh_gen_pub_key(&dh_xform);\n",
    "prefixes": [
        "40/40"
    ]
}