test/mbuf: add unit test on mbuf flag names
[dpdk.git] / app / test / test_cryptodev_kasumi_test_vectors.h
index 9163d7c..f0a6d55 100644 (file)
@@ -1,33 +1,5 @@
-/*-
- *   BSD LICENSE
- *
- *   Copyright(c) 2016 Intel Corporation. All rights reserved.
- *
- *   Redistribution and use in source and binary forms, with or without
- *   modification, are permitted provided that the following conditions
- *   are met:
- *
- *   * Redistributions of source code must retain the above copyright
- *     notice, this list of conditions and the following disclaimer.
- *   * Redistributions in binary form must reproduce the above copyright
- *     notice, this list of conditions and the following disclaimer in
- *     the documentation and/or other materials provided with the
- *     distribution.
- *   * Neither the name of Intel Corporation nor the names of its
- *     contributors may be used to endorse or promote products derived
- *     from this software without specific prior written permission.
- *
- *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+/* SPDX-License-Identifier: BSD-3-Clause
+ * Copyright(c) 2016-2017 Intel Corporation
  */
 
 #ifndef TEST_CRYPTODEV_KASUMI_TEST_VECTORS_H_
 struct kasumi_test_data {
        struct {
                uint8_t data[64];
-               unsigned len;
+               unsigned int len;
        } key;
 
        struct {
                uint8_t data[64] __rte_aligned(16);
-               unsigned len;
-       } iv;
+               unsigned int len;
+       } cipher_iv;
 
+       /*
+        * Data may include COUNT (4 bytes), FRESH (4 bytes),
+        * DIRECTION (1 bit), plus 1 0*, with enough 0s,
+        * so total length is multiple of 8 or 64 bits
+        */
        struct {
                uint8_t data[1024];
-               unsigned len; /* length must be in Bits */
+               unsigned int len; /* length must be in Bits */
        } plaintext;
 
+       struct {
+               unsigned int len;
+       } validDataLenInBits;
+
        struct {
                uint8_t data[1024];
-               unsigned len; /* length must be in Bits */
+               unsigned int len; /* length must be in Bits */
        } ciphertext;
 
        struct {
-               unsigned len;
+               unsigned int len;
        } validCipherLenInBits;
 
        struct {
-               unsigned len;
-       } validCipherOffsetLenInBits;
+               unsigned int len;
+       } validCipherOffsetInBits;
+
+       /* Actual length of data to be hashed */
+       struct {
+               unsigned int len;
+       } validAuthLenInBits;
+
+       struct {
+               uint8_t data[64];
+               unsigned int len;
+               unsigned int offset_bytes; /* offset must be in Bytes */
+       } digest;
+
 };
 
 struct kasumi_test_data kasumi_test_case_1 = {
@@ -71,7 +64,7 @@ struct kasumi_test_data kasumi_test_case_1 = {
                },
                .len = 16
        },
-       .iv = {
+       .cipher_iv = {
                .data = {
                        0x72, 0xA4, 0xF2, 0x0F, 0x64, 0x00, 0x00, 0x00
                },
@@ -116,9 +109,9 @@ struct kasumi_test_data kasumi_test_case_1 = {
        .validCipherLenInBits = {
                .len = 798
        },
-       .validCipherOffsetLenInBits = {
-               .len = 64
-       },
+       .validCipherOffsetInBits = {
+               .len = 0
+       }
 };
 
 struct kasumi_test_data kasumi_test_case_2 = {
@@ -129,7 +122,7 @@ struct kasumi_test_data kasumi_test_case_2 = {
                },
                .len = 16
        },
-       .iv = {
+       .cipher_iv = {
                .data = {
                        0xE2, 0x8B, 0xCF, 0x7B, 0xC0, 0x00, 0x00, 0x00
                },
@@ -164,8 +157,8 @@ struct kasumi_test_data kasumi_test_case_2 = {
        .validCipherLenInBits = {
                .len = 510
        },
-       .validCipherOffsetLenInBits = {
-               .len = 64
+       .validCipherOffsetInBits = {
+               .len = 0
        }
 };
 
@@ -177,7 +170,7 @@ struct kasumi_test_data kasumi_test_case_3 = {
                },
                .len = 16
        },
-       .iv = {
+       .cipher_iv = {
                .data = {
                        0xFA, 0x55, 0x6B, 0x26, 0x1C, 0x00, 0x00, 0x00
                },
@@ -185,23 +178,36 @@ struct kasumi_test_data kasumi_test_case_3 = {
        },
        .plaintext = {
                .data = {
+                       0x38, 0xA6, 0xF0, 0x56, 0x05, 0xD2, 0xEC, 0x49,
                        0xAD, 0x9C, 0x44, 0x1F, 0x89, 0x0B, 0x38, 0xC4,
-                       0x57, 0xA4, 0x9D, 0x42, 0x14, 0x07, 0xE8
+                       0x57, 0xA4, 0x9D, 0x42, 0x14, 0x07, 0xE8, 0xC0
                },
-               .len = 120
+               .len = 192
        },
        .ciphertext = {
                .data = {
+                       0x38, 0xA6, 0xF0, 0x56, 0x05, 0xD2, 0xEC, 0x49,
                        0x9B, 0xC9, 0x2C, 0xA8, 0x03, 0xC6, 0x7B, 0x28,
-                       0xA1, 0x1A, 0x4B, 0xEE, 0x5A, 0x0C, 0x25
+                       0xA1, 0x1A, 0x4B, 0xEE, 0x5A, 0x0C, 0x25, 0xC0
                },
-               .len = 120
+               .len = 192
+       },
+       .validDataLenInBits = {
+               .len = 192
        },
        .validCipherLenInBits = {
                .len = 120
        },
-       .validCipherOffsetLenInBits = {
+       .validAuthLenInBits = {
+               .len = 192
+       },
+       .validCipherOffsetInBits = {
                .len = 64
+       },
+       .digest = {
+               .data = {0x87, 0x5F, 0xE4, 0x89},
+               .len  = 4,
+               .offset_bytes = 0
        }
 };
 
@@ -213,7 +219,7 @@ struct kasumi_test_data kasumi_test_case_4 = {
                },
                .len = 16
        },
-       .iv = {
+       .cipher_iv = {
                .data = {
                        0x39, 0x8A, 0x59, 0xB4, 0x2C, 0x00, 0x00, 0x00,
                },
@@ -240,8 +246,8 @@ struct kasumi_test_data kasumi_test_case_4 = {
        .validCipherLenInBits = {
                .len = 253
        },
-       .validCipherOffsetLenInBits = {
-               .len = 64
+       .validCipherOffsetInBits = {
+               .len = 0
        }
 };
 
@@ -253,7 +259,7 @@ struct kasumi_test_data kasumi_test_case_5 = {
                },
                .len = 16
        },
-       .iv = {
+       .cipher_iv = {
                .data = {
                        0x72, 0xA4, 0xF2, 0x0F, 0x48, 0x00, 0x00, 0x00
                },
@@ -300,9 +306,132 @@ struct kasumi_test_data kasumi_test_case_5 = {
        .validCipherLenInBits = {
                .len = 837
        },
-       .validCipherOffsetLenInBits = {
+       .validCipherOffsetInBits = {
+               .len = 0
+       }
+};
+
+struct kasumi_test_data kasumi_test_case_6 = {
+       .key = {
+               .data = {
+                        0x5A, 0xCB, 0x1D, 0x64, 0x4C, 0x0D, 0x51, 0x20,
+                        0x4E, 0xA5, 0xF1, 0x45, 0x10, 0x10, 0xD8, 0x52
+               },
+               .len = 16
+       },
+       .cipher_iv = {
+               .data = {
+                       0xFA, 0x55, 0x6B, 0x26, 0x1C, 0x00, 0x00, 0x00
+               },
+               .len = 8
+       },
+       .plaintext = {
+               .data = {
+                       0x38, 0xA6, 0xF0, 0x56, 0x05, 0xD2, 0xEC, 0x49,
+                       0xAD, 0x9C, 0x44, 0x1F, 0x89, 0x0B, 0x38, 0xC4,
+                       0x57, 0xA4, 0x9D, 0x42, 0x14, 0x07, 0xE8, 0xC0
+               },
+               .len = 192
+       },
+       .ciphertext = {
+               .data = {
+                       0x38, 0xA6, 0xF0, 0x56, 0x05, 0xD2, 0xEC, 0x49,
+                       0x9B, 0xC9, 0x2C, 0xA8, 0x03, 0xC6, 0x7B, 0x28,
+                       0xA1, 0x1A, 0x4B, 0xEE, 0x5A, 0x0C, 0x25, 0xC0
+               },
+               .len = 192
+       },
+       .validDataLenInBits = {
+               .len = 192
+       },
+       .validCipherLenInBits = {
+               .len = 120
+       },
+       .validCipherOffsetInBits = {
                .len = 64
        },
+       .validAuthLenInBits = {
+               .len = 192
+       },
+       .digest = {
+               .data = {0x0F, 0xD2, 0xAA, 0xB5},
+               .len  = 4,
+               .offset_bytes = 0
+       }
 };
 
+struct kasumi_test_data kasumi_auth_cipher_test_case_2 = {
+       .key = {
+               .data = {
+                       0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
+                       0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10
+               },
+               .len = 16
+       },
+       .cipher_iv = {
+               .data = {
+                       0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08
+               },
+               .len = 8
+       },
+       .plaintext = {
+               .data = {
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A,
+                       0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A, 0x5A
+               },
+               .len = 128 << 3
+       },
+       .ciphertext = {
+               .data = {
+                       0x5A, 0x5A, 0xFA, 0xC6, 0xA9, 0x09, 0x91, 0x74,
+                       0x35, 0xAA, 0x85, 0xB0, 0xE0, 0x07, 0x78, 0xDA,
+                       0x05, 0x88, 0x4E, 0x8D, 0xEC, 0x41, 0xF3, 0xBC,
+                       0x0D, 0x9F, 0xE3, 0xEF, 0x8E, 0x33, 0x22, 0xF3,
+                       0x15, 0x4B, 0x12, 0xC2, 0x22, 0x12, 0xD6, 0x46,
+                       0xD7, 0x27, 0x20, 0x1D, 0x50, 0x60, 0x9D, 0x42,
+                       0xF6, 0x73, 0xF5, 0x28, 0x88, 0xBE, 0x60, 0xEC,
+                       0x9C, 0x18, 0x81, 0xC4, 0x0A, 0xF4, 0xD5, 0x7A,
+                       0xB5, 0x3F, 0x1A, 0x79, 0xAB, 0x79, 0xDB, 0x24,
+                       0xF9, 0x6E, 0x86, 0x78, 0x10, 0x19, 0xAE, 0xD8,
+                       0xB2, 0xCA, 0x32, 0x8D, 0xD8, 0x28, 0x8B, 0x2F,
+                       0x5B, 0x3C, 0xE3, 0x7D, 0xD3, 0x70, 0x11, 0xDE,
+                       0x2C, 0xDC, 0xC1, 0xC6, 0xB6, 0xFD, 0xF3, 0x7D,
+                       0x38, 0x97, 0x8B, 0x81, 0x02, 0x88, 0x62, 0x3C,
+                       0x1E, 0x1A, 0x93, 0x21, 0xE3, 0x6D, 0xD7, 0x20,
+                       0x80, 0xA8, 0xDA, 0x18, 0x8F, 0x58, 0x0F, 0x4E
+               },
+               .len = 128 << 3
+       },
+       .validDataLenInBits = {
+               .len = 128 << 3
+       },
+       .validCipherLenInBits = {
+               .len = 126 << 3
+       },
+       .validAuthLenInBits = {
+               .len = 124 << 3
+       },
+       .validCipherOffsetInBits = {
+               .len = 2 << 3
+       },
+       .digest = {
+               .data = {0x8F, 0x58, 0x0F, 0x4E},
+               .len  = 4,
+               .offset_bytes = 124
+       }
+};
 #endif /* TEST_CRYPTODEV_KASUMI_TEST_VECTORS_H_ */