get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/134698/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 134698,
    "url": "http://patchwork.dpdk.org/api/patches/134698/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/03d11c7c6e1e523784dd2a745169e75e466802c1.1701273963.git.gmuthukrishn@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<03d11c7c6e1e523784dd2a745169e75e466802c1.1701273963.git.gmuthukrishn@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/03d11c7c6e1e523784dd2a745169e75e466802c1.1701273963.git.gmuthukrishn@marvell.com",
    "date": "2023-11-29T16:10:35",
    "name": "[v1,2/3] crypto/openssl: add EDDSA support",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "2cc92d5df28b33a024df8b24a5bd700159156e9a",
    "submitter": {
        "id": 2301,
        "url": "http://patchwork.dpdk.org/api/people/2301/?format=api",
        "name": "Gowrishankar Muthukrishnan",
        "email": "gmuthukrishn@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/03d11c7c6e1e523784dd2a745169e75e466802c1.1701273963.git.gmuthukrishn@marvell.com/mbox/",
    "series": [
        {
            "id": 30413,
            "url": "http://patchwork.dpdk.org/api/series/30413/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=30413",
            "date": "2023-11-29T16:10:34",
            "name": "[v1,1/3] cryptodev: add EDDSA asymmetric crypto algorithm",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/30413/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/134698/comments/",
    "check": "warning",
    "checks": "http://patchwork.dpdk.org/api/patches/134698/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id DDD6943402;\n\tWed, 29 Nov 2023 17:10:54 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id D559242E39;\n\tWed, 29 Nov 2023 17:10:49 +0100 (CET)",
            "from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com\n [67.231.156.173])\n by mails.dpdk.org (Postfix) with ESMTP id 26A5142E4B\n for <dev@dpdk.org>; Wed, 29 Nov 2023 17:10:48 +0100 (CET)",
            "from pps.filterd (m0045851.ppops.net [127.0.0.1])\n by mx0b-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id\n 3ATEsoAp022054; Wed, 29 Nov 2023 08:10:47 -0800",
            "from dc5-exch02.marvell.com ([199.233.59.182])\n by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 3una4dpuh6-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Wed, 29 Nov 2023 08:10:47 -0800",
            "from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH02.marvell.com\n (10.69.176.39) with Microsoft SMTP Server (TLS) id 15.0.1497.48;\n Wed, 29 Nov 2023 08:10:45 -0800",
            "from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.48 via Frontend\n Transport; Wed, 29 Nov 2023 08:10:45 -0800",
            "from BG-LT91401.marvell.com (BG-LT91401.marvell.com [10.28.168.34])\n by maili.marvell.com (Postfix) with ESMTP id AD0C53F7059;\n Wed, 29 Nov 2023 08:10:42 -0800 (PST)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=HCB1q7ogwg7ZFf1cZ4WUAy15zyWNnq5Fyg/W1mQ8apY=;\n b=K3YPSlkBQ0RoWGnjY2uAWHoGADMwQDOB7+XlzfGFvddCMvZDnKECHBDDmPkL98o+srER\n oU7qmCvACFFiU9eKlgJXVpnT2nb7mZPuznls/gKS3SHUNC/HdVaKO/nez54FxcDDYNGh\n MEEZ8KpdDN8myQSGL2ST6kwZXlTrugR8fInAqecpBCOFeNCaV98F4nwomT2GH7UdSbOI\n Bp8V3TzKco6XqlqYT5sp0neWOQTAb5BbxK0xjrmUQB+cHxQNQ/6di+mTJJ/1arrhSmDy\n tWZ3bGVF85Us64WL/blKkLGZOj4jb6MvZSOZe/iULBGqCE/0yyl9a92qtLWf9YQv+Tm6 Vw==",
        "From": "Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<anoobj@marvell.com>, Akhil Goyal <gakhil@marvell.com>, Fan Zhang\n <fanzhang.oss@gmail.com>, Kai Ji <kai.ji@intel.com>, \"Gowrishankar\n Muthukrishnan\" <gmuthukrishn@marvell.com>",
        "Subject": "[PATCH v1 2/3] crypto/openssl: add EDDSA support",
        "Date": "Wed, 29 Nov 2023 21:40:35 +0530",
        "Message-ID": "\n <03d11c7c6e1e523784dd2a745169e75e466802c1.1701273963.git.gmuthukrishn@marvell.com>",
        "X-Mailer": "git-send-email 2.21.0",
        "In-Reply-To": "\n <0ae6a1afadac64050d80b0fd7712c4a6a8599e2c.1701273963.git.gmuthukrishn@marvell.com>",
        "References": "\n <0ae6a1afadac64050d80b0fd7712c4a6a8599e2c.1701273963.git.gmuthukrishn@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-GUID": "uPmVLNbrg2uJilPam67wutUVL3dZT99u",
        "X-Proofpoint-ORIG-GUID": "uPmVLNbrg2uJilPam67wutUVL3dZT99u",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26\n definitions=2023-11-29_14,2023-11-29_01,2023-05-22_02",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Add EDDSA support in OpenSSL PMD.\n\nSigned-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com>\n---\nFor openssl library support, refer:\nhttps://github.com/openssl/openssl/commit/4f8b7c2319523f8e83b8b2fa31127832fa092552\n---\n drivers/crypto/openssl/openssl_pmd_private.h |   6 +\n drivers/crypto/openssl/rte_openssl_pmd.c     | 165 +++++++++++++++++++\n drivers/crypto/openssl/rte_openssl_pmd_ops.c |  80 +++++++++\n 3 files changed, 251 insertions(+)",
    "diff": "diff --git a/drivers/crypto/openssl/openssl_pmd_private.h b/drivers/crypto/openssl/openssl_pmd_private.h\nindex 334912d335..7061a1b85b 100644\n--- a/drivers/crypto/openssl/openssl_pmd_private.h\n+++ b/drivers/crypto/openssl/openssl_pmd_private.h\n@@ -212,6 +212,12 @@ struct openssl_asym_session {\n \t\t\tOSSL_PARAM * params;\n #endif\n \t\t} sm2;\n+\t\tstruct {\n+\t\t\tuint8_t curve_id;\n+#if (OPENSSL_VERSION_NUMBER >= 0x30000000L)\n+\t\t\tOSSL_PARAM *params;\n+#endif\n+\t\t} eddsa;\n \t} u;\n } __rte_cache_aligned;\n /** Set and validate OPENSSL crypto session parameters */\ndiff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers/crypto/openssl/rte_openssl_pmd.c\nindex e8cb09defc..61c1f95202 100644\n--- a/drivers/crypto/openssl/rte_openssl_pmd.c\n+++ b/drivers/crypto/openssl/rte_openssl_pmd.c\n@@ -2890,6 +2890,155 @@ process_openssl_sm2_op_evp(struct rte_crypto_op *cop,\n \treturn ret;\n }\n \n+static int\n+process_openssl_eddsa_op_evp(struct rte_crypto_op *cop,\n+\t\tstruct openssl_asym_session *sess)\n+{\n+\tstatic const char * const instance[] = {\"Ed25519\", \"Ed25519ctx\", \"Ed25519ph\",\n+\t\t\t\t\t\t\"Ed448\", \"Ed448ph\"};\n+\tEVP_PKEY_CTX *kctx = NULL, *sctx = NULL, *cctx = NULL;\n+\tconst uint8_t curve_id = sess->u.eddsa.curve_id;\n+\tstruct rte_crypto_asym_op *op = cop->asym;\n+\tOSSL_PARAM *params = sess->u.eddsa.params;\n+\tOSSL_PARAM_BLD *iparam_bld = NULL;\n+\tOSSL_PARAM *iparams = NULL;\n+\tuint8_t signbuf[128] = {0};\n+\tEVP_MD_CTX *md_ctx = NULL;\n+\tEVP_PKEY *pkey = NULL;\n+\tsize_t signlen;\n+\tint ret = -1;\n+\n+\tcop->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\n+\tiparam_bld = OSSL_PARAM_BLD_new();\n+\tif (!iparam_bld)\n+\t\tgoto err_eddsa;\n+\n+\tOSSL_PARAM_BLD_push_octet_string(iparam_bld, \"context-string\",\n+\t\top->eddsa.context.data, op->eddsa.context.length);\n+\n+\tOSSL_PARAM_BLD_push_utf8_string(iparam_bld, \"instance\",\n+\t\tinstance[op->eddsa.instance], strlen(instance[op->eddsa.instance]));\n+\n+\tiparams = OSSL_PARAM_BLD_to_param(iparam_bld);\n+\tif (!iparams)\n+\t\tgoto err_eddsa;\n+\n+\tswitch (op->eddsa.op_type) {\n+\tcase RTE_CRYPTO_ASYM_OP_SIGN:\n+\t\t{\n+\t\t\tif (curve_id == RTE_CRYPTO_EC_GROUP_ED25519)\n+\t\t\t\tkctx = EVP_PKEY_CTX_new_from_name(NULL, \"ED25519\", NULL);\n+\t\t\telse\n+\t\t\t\tkctx = EVP_PKEY_CTX_new_from_name(NULL, \"ED448\", NULL);\n+\n+\t\t\tif (kctx == NULL || EVP_PKEY_fromdata_init(kctx) <= 0 ||\n+\t\t\t\tEVP_PKEY_fromdata(kctx, &pkey, EVP_PKEY_KEYPAIR, params) <= 0)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tmd_ctx = EVP_MD_CTX_new();\n+\t\t\tif (!md_ctx)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tsctx = EVP_PKEY_CTX_new_from_pkey(NULL, pkey, NULL);\n+\t\t\tif (!sctx)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tEVP_MD_CTX_set_pkey_ctx(md_ctx, sctx);\n+\n+#if (OPENSSL_VERSION_NUMBER >= 0x30300000L)\n+\t\t\tif (!EVP_DigestSignInit_ex(md_ctx, NULL, NULL, NULL, NULL, pkey, iparams))\n+\t\t\t\tgoto err_eddsa;\n+#else\n+\t\t\tif (op->eddsa.instance == RTE_CRYPTO_EDCURVE_25519 ||\n+\t\t\t\top->eddsa.instance == RTE_CRYPTO_EDCURVE_448) {\n+\t\t\t\tif (!EVP_DigestSignInit(md_ctx, NULL, NULL, NULL, pkey))\n+\t\t\t\t\tgoto err_eddsa;\n+\t\t\t} else\n+\t\t\t\tgoto err_eddsa;\n+#endif\n+\n+\t\t\tif (!EVP_DigestSign(md_ctx, NULL, &signlen, op->eddsa.message.data,\n+\t\t\t\t\top->eddsa.message.length))\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tif (signlen > RTE_DIM(signbuf))\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tif (!EVP_DigestSign(md_ctx, signbuf, &signlen, op->eddsa.message.data,\n+\t\t\t\t\top->eddsa.message.length))\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tmemcpy(op->eddsa.sign.data, &signbuf[0], signlen);\n+\t\t\top->eddsa.sign.length = signlen;\n+\t\t}\n+\t\tbreak;\n+\tcase RTE_CRYPTO_ASYM_OP_VERIFY:\n+\t\t{\n+\t\t\tif (curve_id == RTE_CRYPTO_EC_GROUP_ED25519)\n+\t\t\t\tkctx = EVP_PKEY_CTX_new_from_name(NULL, \"ED25519\", NULL);\n+\t\t\telse\n+\t\t\t\tkctx = EVP_PKEY_CTX_new_from_name(NULL, \"ED448\", NULL);\n+\n+\t\t\tif (kctx == NULL || EVP_PKEY_fromdata_init(kctx) <= 0 ||\n+\t\t\t\tEVP_PKEY_fromdata(kctx, &pkey, EVP_PKEY_PUBLIC_KEY, params) <= 0)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tmd_ctx = EVP_MD_CTX_new();\n+\t\t\tif (!md_ctx)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tsctx = EVP_PKEY_CTX_new_from_pkey(NULL, pkey, NULL);\n+\t\t\tif (!sctx)\n+\t\t\t\tgoto err_eddsa;\n+\n+\t\t\tEVP_MD_CTX_set_pkey_ctx(md_ctx, sctx);\n+\n+#if (OPENSSL_VERSION_NUMBER >= 0x30300000L)\n+\t\t\tif (!EVP_DigestVerifyInit_ex(md_ctx, NULL, NULL, NULL, NULL, pkey, iparams))\n+\t\t\t\tgoto err_eddsa;\n+#else\n+\t\t\tif (op->eddsa.instance == RTE_CRYPTO_EDCURVE_25519 ||\n+\t\t\t\top->eddsa.instance == RTE_CRYPTO_EDCURVE_448) {\n+\t\t\t\tif (!EVP_DigestVerifyInit(md_ctx, NULL, NULL, NULL, pkey))\n+\t\t\t\t\tgoto err_eddsa;\n+\t\t\t} else\n+\t\t\t\tgoto err_eddsa;\n+#endif\n+\n+\t\t\tsignlen = op->eddsa.sign.length;\n+\t\t\tmemcpy(&signbuf[0], op->eddsa.sign.data, op->eddsa.sign.length);\n+\n+\t\t\tret = EVP_DigestVerify(md_ctx, signbuf, signlen, op->eddsa.message.data,\n+\t\t\t\t\top->eddsa.message.length);\n+\t\t\tif (ret == 0)\n+\t\t\t\tgoto err_eddsa;\n+\t\t}\n+\t\tbreak;\n+\tdefault:\n+\t\t/* allow ops with invalid args to be pushed to\n+\t\t * completion queue\n+\t\t */\n+\t\tcop->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS;\n+\t\tgoto err_eddsa;\n+\t}\n+\n+\tret = 0;\n+\tcop->status = RTE_CRYPTO_OP_STATUS_SUCCESS;\n+err_eddsa:\n+\tOSSL_PARAM_BLD_free(iparam_bld);\n+\n+\tif (sctx)\n+\t\tEVP_PKEY_CTX_free(sctx);\n+\n+\tif (cctx)\n+\t\tEVP_PKEY_CTX_free(cctx);\n+\n+\tif (pkey)\n+\t\tEVP_PKEY_free(pkey);\n+\n+\treturn ret;\n+}\n #else\n static int\n process_openssl_rsa_op(struct rte_crypto_op *cop,\n@@ -2998,6 +3147,15 @@ process_openssl_sm2_op(struct rte_crypto_op *cop,\n \tRTE_SET_USED(sess);\n \treturn -ENOTSUP;\n }\n+\n+static int\n+process_openssl_eddsa_op(struct rte_crypto_op *cop,\n+\t\tstruct openssl_asym_session *sess)\n+{\n+\tRTE_SET_USED(cop);\n+\tRTE_SET_USED(sess);\n+\treturn -ENOTSUP;\n+}\n #endif\n \n static int\n@@ -3053,6 +3211,13 @@ process_asym_op(struct openssl_qp *qp, struct rte_crypto_op *op,\n \t\tretval = process_openssl_sm2_op_evp(op, sess);\n #else\n \t\tretval = process_openssl_sm2_op(op, sess);\n+#endif\n+\t\tbreak;\n+\tcase RTE_CRYPTO_ASYM_XFORM_EDDSA:\n+#if (OPENSSL_VERSION_NUMBER >= 0x30000000L)\n+\t\tretval = process_openssl_eddsa_op_evp(op, sess);\n+#else\n+\t\tretval = process_openssl_eddsa_op(op, sess);\n #endif\n \t\tbreak;\n \tdefault:\ndiff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c b/drivers/crypto/openssl/rte_openssl_pmd_ops.c\nindex b16baaa08f..36c4c68da9 100644\n--- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c\n+++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c\n@@ -610,6 +610,20 @@ static const struct rte_cryptodev_capabilities openssl_pmd_capabilities[] = {\n \t\t}\n \t\t}\n \t},\n+\t{\t/* EDDSA */\n+\t\t.op = RTE_CRYPTO_OP_TYPE_ASYMMETRIC,\n+\t\t{.asym = {\n+\t\t\t.xform_capa = {\n+\t\t\t\t.xform_type = RTE_CRYPTO_ASYM_XFORM_EDDSA,\n+\t\t\t\t.hash_algos = (1 << RTE_CRYPTO_AUTH_SHA512 |\n+\t\t\t\t\t       1 << RTE_CRYPTO_AUTH_SHAKE_256),\n+\t\t\t\t.op_types =\n+\t\t\t\t((1<<RTE_CRYPTO_ASYM_OP_SIGN) |\n+\t\t\t\t (1 << RTE_CRYPTO_ASYM_OP_VERIFY)),\n+\t\t\t}\n+\t\t}\n+\t\t}\n+\t},\n \n \tRTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()\n };\n@@ -1413,6 +1427,66 @@ static int openssl_set_asym_session_parameters(\n #else\n \t\tOPENSSL_LOG(WARNING, \"SM2 unsupported for OpenSSL Version < 3.0\");\n \t\treturn -ENOTSUP;\n+#endif\n+\t}\n+\tcase RTE_CRYPTO_ASYM_XFORM_EDDSA:\n+\t{\n+#if (OPENSSL_VERSION_NUMBER >= 0x30000000L)\n+\t\tOSSL_PARAM_BLD *param_bld = NULL;\n+\t\tOSSL_PARAM *params = NULL;\n+\t\tint ret = -1;\n+\n+\t\tasym_session->u.eddsa.curve_id = xform->ec.curve_id;\n+\n+\t\tparam_bld = OSSL_PARAM_BLD_new();\n+\t\tif (!param_bld) {\n+\t\t\tOPENSSL_LOG(ERR, \"failed to allocate params\\n\");\n+\t\t\tgoto err_eddsa;\n+\t\t}\n+\n+\t\tret = OSSL_PARAM_BLD_push_utf8_string(param_bld,\n+\t\t\t  OSSL_PKEY_PARAM_GROUP_NAME, \"ED25519\", sizeof(\"ED25519\"));\n+\t\tif (!ret) {\n+\t\t\tOPENSSL_LOG(ERR, \"failed to push params\\n\");\n+\t\t\tgoto err_eddsa;\n+\t\t}\n+\n+\t\tret = OSSL_PARAM_BLD_push_octet_string(param_bld, OSSL_PKEY_PARAM_PRIV_KEY,\n+\t\t\t\txform->ec.pkey.data, xform->ec.pkey.length);\n+\t\tif (!ret) {\n+\t\t\tOPENSSL_LOG(ERR, \"failed to push params\\n\");\n+\t\t\tgoto err_eddsa;\n+\t\t}\n+\n+\t\tret = OSSL_PARAM_BLD_push_octet_string(param_bld, OSSL_PKEY_PARAM_PUB_KEY,\n+\t\t\t\txform->ec.qcomp.data, xform->ec.qcomp.length);\n+\t\tif (!ret) {\n+\t\t\tOPENSSL_LOG(ERR, \"failed to push params\\n\");\n+\t\t\tgoto err_eddsa;\n+\t\t}\n+\n+\t\tparams = OSSL_PARAM_BLD_to_param(param_bld);\n+\t\tif (!params) {\n+\t\t\tOPENSSL_LOG(ERR, \"failed to push params\\n\");\n+\t\t\tgoto err_eddsa;\n+\t\t}\n+\n+\t\tasym_session->u.eddsa.params = params;\n+\t\tOSSL_PARAM_BLD_free(param_bld);\n+\n+\t\tasym_session->xfrm_type = RTE_CRYPTO_ASYM_XFORM_EDDSA;\n+\t\tbreak;\n+err_eddsa:\n+\t\tif (param_bld)\n+\t\t\tOSSL_PARAM_BLD_free(param_bld);\n+\n+\t\tif (asym_session->u.eddsa.params)\n+\t\t\tOSSL_PARAM_free(asym_session->u.eddsa.params);\n+\n+\t\treturn -1;\n+#else\n+\t\tOPENSSL_LOG(WARNING, \"EDDSA unsupported for OpenSSL Version < 3.0\");\n+\t\treturn -ENOTSUP;\n #endif\n \t}\n \tdefault:\n@@ -1511,6 +1585,12 @@ static void openssl_reset_asym_session(struct openssl_asym_session *sess)\n #if (OPENSSL_VERSION_NUMBER >= 0x30000000L)\n \t\tOSSL_PARAM_free(sess->u.sm2.params);\n #endif\n+\t\tbreak;\n+\tcase RTE_CRYPTO_ASYM_XFORM_EDDSA:\n+#if (OPENSSL_VERSION_NUMBER >= 0x30000000L)\n+\t\tOSSL_PARAM_free(sess->u.eddsa.params);\n+#endif\n+\t\tbreak;\n \tdefault:\n \t\tbreak;\n \t}\n",
    "prefixes": [
        "v1",
        "2/3"
    ]
}