All of lore.kernel.org
 help / color / mirror / Atom feed
From: Pablo de Lara <pablo.de.lara.guarch@intel.com>
To: declan.doherty@intel.com
Cc: dev@dpdk.org, Pablo de Lara <pablo.de.lara.guarch@intel.com>
Subject: [PATCH 2/2] test/crypto: add AES GCM 192 tests
Date: Fri, 26 May 2017 11:16:06 +0100	[thread overview]
Message-ID: <1495793766-200890-3-git-send-email-pablo.de.lara.guarch@intel.com> (raw)
In-Reply-To: <1495793766-200890-1-git-send-email-pablo.de.lara.guarch@intel.com>

Added AES GCM tests for 192-bit keys, now that AES GCM PMD
supports it.

Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
---
 test/test/test_cryptodev.c                  | 116 +++++++++
 test/test/test_cryptodev_gcm_test_vectors.h | 357 ++++++++++++++++++++++++++++
 2 files changed, 473 insertions(+)

diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c
index 029ce8a..bebedea 100644
--- a/test/test/test_cryptodev.c
+++ b/test/test/test_cryptodev.c
@@ -5158,6 +5158,48 @@ test_mb_AES_GCM_authenticated_encryption_test_case_7(void)
 }
 
 static int
+test_mb_AES_GCM_auth_encryption_test_case_192_1(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_1);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_2(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_2);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_3(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_3);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_4(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_4);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_5(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_5);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_6(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_6);
+}
+
+static int
+test_mb_AES_GCM_auth_encryption_test_case_192_7(void)
+{
+	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_192_7);
+}
+
+static int
 test_mb_AES_GCM_auth_encryption_test_case_256_1(void)
 {
 	return test_mb_AES_GCM_authenticated_encryption(&gcm_test_case_256_1);
@@ -5324,6 +5366,48 @@ test_mb_AES_GCM_authenticated_decryption_test_case_7(void)
 }
 
 static int
+test_mb_AES_GCM_auth_decryption_test_case_192_1(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_1);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_2(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_2);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_3(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_3);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_4(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_4);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_5(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_5);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_6(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_6);
+}
+
+static int
+test_mb_AES_GCM_auth_decryption_test_case_192_7(void)
+{
+	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_192_7);
+}
+
+static int
 test_mb_AES_GCM_auth_decryption_test_case_256_1(void)
 {
 	return test_mb_AES_GCM_authenticated_decryption(&gcm_test_case_256_1);
@@ -8274,6 +8358,38 @@ static struct unit_test_suite cryptodev_aesni_gcm_testsuite  = {
 		TEST_CASE_ST(ut_setup, ut_teardown,
 			test_mb_AES_GCM_authenticated_decryption_test_case_7),
 
+		/** AES GCM Authenticated Encryption 192 bits key */
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_1),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_2),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_3),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_4),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_5),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_6),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_encryption_test_case_192_7),
+
+		/** AES GCM Authenticated Decryption 192 bits key */
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_1),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_2),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_3),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_4),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_5),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_6),
+		TEST_CASE_ST(ut_setup, ut_teardown,
+			test_mb_AES_GCM_auth_decryption_test_case_192_7),
+
 		/** AES GCM Authenticated Encryption 256 bits key */
 		TEST_CASE_ST(ut_setup, ut_teardown,
 			test_mb_AES_GCM_auth_encryption_test_case_256_1),
diff --git a/test/test/test_cryptodev_gcm_test_vectors.h b/test/test/test_cryptodev_gcm_test_vectors.h
index 5764edb..22d6b72 100644
--- a/test/test/test_cryptodev_gcm_test_vectors.h
+++ b/test/test/test_cryptodev_gcm_test_vectors.h
@@ -1002,6 +1002,363 @@ static const struct gcm_test_data gcm_test_case_8 = {
 	}
 };
 
+/** AES-192 Test Vectors */
+static const struct gcm_test_data gcm_test_case_192_1 = {
+	.key = {
+		.data = {
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_zero_text,
+		.len = 0
+	},
+	.plaintext = {
+		.data = { 0x00 },
+		.len = 0
+	},
+	.ciphertext = {
+		.data = { 0x00 },
+		.len = 0
+	},
+	.auth_tag = {
+		.data = {
+			0xCD, 0x33, 0xB2, 0x8A, 0xC7, 0x73, 0xF7, 0x4B,
+			0xA0, 0x0E, 0xD1, 0xF3, 0x12, 0x57, 0x24, 0x35
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_2 = {
+	.key = {
+		.data = {
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_zero_text,
+		.len = 0
+	},
+	.plaintext = {
+		.data = {
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+			0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
+		},
+		.len = 16
+	},
+	.ciphertext = {
+		.data = {
+			0x98, 0xE7, 0x24, 0x7C, 0x07, 0xF0, 0xFE, 0x41,
+			0x1C, 0x26, 0x7E, 0x43, 0x84, 0xB0, 0xF6, 0x00
+		},
+		.len = 16
+	},
+	.auth_tag = {
+		.data = {
+			0x2F, 0xF5, 0x8D, 0x80, 0x03, 0x39, 0x27, 0xAB,
+			0x8E, 0xF4, 0xD4, 0x58, 0x75, 0x14, 0xF0, 0xFB
+
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_3 = {
+	.key = {
+		.data = {
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C,
+			0x6D, 0x6A, 0x8F, 0x94, 0x67, 0x30, 0x83, 0x08,
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0xCA, 0xFE, 0xBA, 0xBE, 0xFA, 0xCE, 0xDB, 0xAD,
+			0xDE, 0xCA, 0xF8, 0x88
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_zero_text,
+		.len = 0
+	},
+	.plaintext = {
+		.data = {
+			0xD9, 0x31, 0x32, 0x25, 0xF8, 0x84, 0x06, 0xE5,
+			0xA5, 0x59, 0x09, 0xC5, 0xAF, 0xF5, 0x26, 0x9A,
+			0x86, 0xA7, 0xA9, 0x53, 0x15, 0x34, 0xF7, 0xDA,
+			0x2E, 0x4C, 0x30, 0x3D, 0x8A, 0x31, 0x8A, 0x72,
+			0x1C, 0x3C, 0x0C, 0x95, 0x95, 0x68, 0x09, 0x53,
+			0x2F, 0xCF, 0x0E, 0x24, 0x49, 0xA6, 0xB5, 0x25,
+			0xB1, 0x6A, 0xED, 0xF5, 0xAA, 0x0D, 0xE6, 0x57,
+			0xBA, 0x63, 0x7B, 0x39, 0x1A, 0xAF, 0xD2, 0x55
+		},
+		.len = 64
+	},
+	.ciphertext = {
+		.data = {
+			0x39, 0x80, 0xCA, 0x0B, 0x3C, 0x00, 0xE8, 0x41,
+			0xEB, 0x06, 0xFA, 0xC4, 0x87, 0x2A, 0x27, 0x57,
+			0x85, 0x9E, 0x1C, 0xEA, 0xA6, 0xEF, 0xD9, 0x84,
+			0x62, 0x85, 0x93, 0xB4, 0x0C, 0xA1, 0xE1, 0x9C,
+			0x7D, 0x77, 0x3D, 0x00, 0xC1, 0x44, 0xC5, 0x25,
+			0xAC, 0x61, 0x9D, 0x18, 0xC8, 0x4A, 0x3F, 0x47,
+			0x18, 0xE2, 0x44, 0x8B, 0x2F, 0xE3, 0x24, 0xD9,
+			0xCC, 0xDA, 0x27, 0x10, 0xAC, 0xAD, 0xE2, 0x56
+		},
+		.len = 64
+	},
+	.auth_tag = {
+		.data = {
+			0x99, 0x24, 0xA7, 0xC8, 0x58, 0x73, 0x36, 0xBF,
+			0xB1, 0x18, 0x02, 0x4D, 0xB8, 0x67, 0x4A, 0x14
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_4 = {
+	.key = {
+		.data = {
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C,
+			0x6D, 0x6A, 0x8F, 0x94, 0x67, 0x30, 0x83, 0x08,
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0xCA, 0xFE, 0xBA, 0xBE, 0xFA, 0xCE, 0xDB, 0xAD,
+			0xDE, 0xCA, 0xF8, 0x88
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_zero_text,
+		.len = 8
+	},
+	.plaintext = {
+		.data = {
+			0xD9, 0x31, 0x32, 0x25, 0xF8, 0x84, 0x06, 0xE5,
+			0xA5, 0x59, 0x09, 0xC5, 0xAF, 0xF5, 0x26, 0x9A,
+			0x86, 0xA7, 0xA9, 0x53, 0x15, 0x34, 0xF7, 0xDA,
+			0x2E, 0x4C, 0x30, 0x3D, 0x8A, 0x31, 0x8A, 0x72,
+			0x1C, 0x3C, 0x0C, 0x95, 0x95, 0x68, 0x09, 0x53,
+			0x2F, 0xCF, 0x0E, 0x24, 0x49, 0xA6, 0xB5, 0x25,
+			0xB1, 0x6A, 0xED, 0xF5, 0xAA, 0x0D, 0xE6, 0x57,
+			0xBA, 0x63, 0x7B, 0x39
+		},
+		.len = 60
+	},
+	.ciphertext = {
+		.data = {
+			0x39, 0x80, 0xCA, 0x0B, 0x3C, 0x00, 0xE8, 0x41,
+			0xEB, 0x06, 0xFA, 0xC4, 0x87, 0x2A, 0x27, 0x57,
+			0x85, 0x9E, 0x1C, 0xEA, 0xA6, 0xEF, 0xD9, 0x84,
+			0x62, 0x85, 0x93, 0xB4, 0x0C, 0xA1, 0xE1, 0x9C,
+			0x7D, 0x77, 0x3D, 0x00, 0xC1, 0x44, 0xC5, 0x25,
+			0xAC, 0x61, 0x9D, 0x18, 0xC8, 0x4A, 0x3F, 0x47,
+			0x18, 0xE2, 0x44, 0x8B, 0x2F, 0xE3, 0x24, 0xD9,
+			0xCC, 0xDA, 0x27, 0x10
+		},
+		.len = 60
+	},
+	.auth_tag = {
+		.data = {
+			0x57, 0x5F, 0x03, 0xA0, 0x8D, 0x8F, 0x40, 0x26,
+			0xE5, 0x64, 0x1F, 0x5B, 0x5C, 0xC2, 0xFD, 0x4B
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_5 = {
+	.key = {
+		.data = {
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C,
+			0x6D, 0x6A, 0x8F, 0x94, 0x67, 0x30, 0x83, 0x08,
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0xCA, 0xFE, 0xBA, 0xBE, 0xFA, 0xCE, 0xDB, 0xAD,
+			0xDE, 0xCA, 0xF8, 0x88
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_text,
+		.len = 8
+	},
+	.plaintext = {
+		.data = {
+			0xD9, 0x31, 0x32, 0x25, 0xF8, 0x84, 0x06, 0xE5,
+			0xA5, 0x59, 0x09, 0xC5, 0xAF, 0xF5, 0x26, 0x9A,
+			0x86, 0xA7, 0xA9, 0x53, 0x15, 0x34, 0xF7, 0xDA,
+			0x2E, 0x4C, 0x30, 0x3D, 0x8A, 0x31, 0x8A, 0x72,
+			0x1C, 0x3C, 0x0C, 0x95, 0x95, 0x68, 0x09, 0x53,
+			0x2F, 0xCF, 0x0E, 0x24, 0x49, 0xA6, 0xB5, 0x25,
+			0xB1, 0x6A, 0xED, 0xF5, 0xAA, 0x0D, 0xE6, 0x57,
+			0xBA, 0x63, 0x7B, 0x39
+		},
+		.len = 60
+	},
+	.ciphertext = {
+		.data = {
+			0x39, 0x80, 0xCA, 0x0B, 0x3C, 0x00, 0xE8, 0x41,
+			0xEB, 0x06, 0xFA, 0xC4, 0x87, 0x2A, 0x27, 0x57,
+			0x85, 0x9E, 0x1C, 0xEA, 0xA6, 0xEF, 0xD9, 0x84,
+			0x62, 0x85, 0x93, 0xB4, 0x0C, 0xA1, 0xE1, 0x9C,
+			0x7D, 0x77, 0x3D, 0x00, 0xC1, 0x44, 0xC5, 0x25,
+			0xAC, 0x61, 0x9D, 0x18, 0xC8, 0x4A, 0x3F, 0x47,
+			0x18, 0xE2, 0x44, 0x8B, 0x2F, 0xE3, 0x24, 0xD9,
+			0xCC, 0xDA, 0x27, 0x10
+		},
+		.len = 60
+	},
+	.auth_tag = {
+		.data = {
+			0xB6, 0x35, 0x56, 0xE7, 0xBA, 0x46, 0xA3, 0x38,
+			0xED, 0xAD, 0x79, 0x9F, 0xB3, 0x5B, 0x34, 0xA8
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_6 = {
+	.key = {
+		.data = {
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C,
+			0x6D, 0x6A, 0x8F, 0x94, 0x67, 0x30, 0x83, 0x08,
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0xCA, 0xFE, 0xBA, 0xBE, 0xFA, 0xCE, 0xDB, 0xAD,
+			0xDE, 0xCA, 0xF8, 0x88
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_zero_text,
+		.len = 12
+	},
+	.plaintext = {
+		.data = {
+			0xD9, 0x31, 0x32, 0x25, 0xF8, 0x84, 0x06, 0xE5,
+			0xA5, 0x59, 0x09, 0xC5, 0xAF, 0xF5, 0x26, 0x9A,
+			0x86, 0xA7, 0xA9, 0x53, 0x15, 0x34, 0xF7, 0xDA,
+			0x2E, 0x4C, 0x30, 0x3D, 0x8A, 0x31, 0x8A, 0x72,
+			0x1C, 0x3C, 0x0C, 0x95, 0x95, 0x68, 0x09, 0x53,
+			0x2F, 0xCF, 0x0E, 0x24, 0x49, 0xA6, 0xB5, 0x25,
+			0xB1, 0x6A, 0xED, 0xF5, 0xAA, 0x0D, 0xE6, 0x57,
+			0xBA, 0x63, 0x7B, 0x39
+		},
+		.len = 60
+	},
+	.ciphertext = {
+		.data = {
+			0x39, 0x80, 0xCA, 0x0B, 0x3C, 0x00, 0xE8, 0x41,
+			0xEB, 0x06, 0xFA, 0xC4, 0x87, 0x2A, 0x27, 0x57,
+			0x85, 0x9E, 0x1C, 0xEA, 0xA6, 0xEF, 0xD9, 0x84,
+			0x62, 0x85, 0x93, 0xB4, 0x0C, 0xA1, 0xE1, 0x9C,
+			0x7D, 0x77, 0x3D, 0x00, 0xC1, 0x44, 0xC5, 0x25,
+			0xAC, 0x61, 0x9D, 0x18, 0xC8, 0x4A, 0x3F, 0x47,
+			0x18, 0xE2, 0x44, 0x8B, 0x2F, 0xE3, 0x24, 0xD9,
+			0xCC, 0xDA, 0x27, 0x10
+		},
+		.len = 60
+	},
+	.auth_tag = {
+		.data = {
+			0xCA, 0x8A, 0x8A, 0x91, 0x5A, 0xF9, 0x76, 0xE3,
+			0xFF, 0x2C, 0xE4, 0x7D, 0xE5, 0x62, 0x75, 0x18
+		},
+		.len = 16
+	}
+};
+
+static const struct gcm_test_data gcm_test_case_192_7 = {
+	.key = {
+		.data = {
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C,
+			0x6D, 0x6A, 0x8F, 0x94, 0x67, 0x30, 0x83, 0x08,
+			0xFE, 0xFF, 0xE9, 0x92, 0x86, 0x65, 0x73, 0x1C
+		},
+		.len = 24
+	},
+	.iv = {
+		.data = {
+			0xCA, 0xFE, 0xBA, 0xBE, 0xFA, 0xCE, 0xDB, 0xAD,
+			0xDE, 0xCA, 0xF8, 0x88
+		},
+		.len = 12
+	},
+	.aad = {
+		.data = gcm_aad_text,
+		.len = 12
+	},
+	.plaintext = {
+		.data = {
+			0xD9, 0x31, 0x32, 0x25, 0xF8, 0x84, 0x06, 0xE5,
+			0xA5, 0x59, 0x09, 0xC5, 0xAF, 0xF5, 0x26, 0x9A,
+			0x86, 0xA7, 0xA9, 0x53, 0x15, 0x34, 0xF7, 0xDA,
+			0x2E, 0x4C, 0x30, 0x3D, 0x8A, 0x31, 0x8A, 0x72,
+			0x1C, 0x3C, 0x0C, 0x95, 0x95, 0x68, 0x09, 0x53,
+			0x2F, 0xCF, 0x0E, 0x24, 0x49, 0xA6, 0xB5, 0x25,
+			0xB1, 0x6A, 0xED, 0xF5, 0xAA, 0x0D, 0xE6, 0x57,
+			0xBA, 0x63, 0x7B, 0x39
+		},
+		.len = 60
+	},
+	.ciphertext = {
+		.data = {
+			0x39, 0x80, 0xCA, 0x0B, 0x3C, 0x00, 0xE8, 0x41,
+			0xEB, 0x06, 0xFA, 0xC4, 0x87, 0x2A, 0x27, 0x57,
+			0x85, 0x9E, 0x1C, 0xEA, 0xA6, 0xEF, 0xD9, 0x84,
+			0x62, 0x85, 0x93, 0xB4, 0x0C, 0xA1, 0xE1, 0x9C,
+			0x7D, 0x77, 0x3D, 0x00, 0xC1, 0x44, 0xC5, 0x25,
+			0xAC, 0x61, 0x9D, 0x18, 0xC8, 0x4A, 0x3F, 0x47,
+			0x18, 0xE2, 0x44, 0x8B, 0x2F, 0xE3, 0x24, 0xD9,
+			0xCC, 0xDA, 0x27, 0x10
+		},
+		.len = 60
+	},
+	.auth_tag = {
+		.data = {
+			0xC2, 0xD8, 0x4C, 0x6B, 0xA8, 0x3B, 0xA5, 0x6B,
+			0x18, 0x9F, 0xE6, 0xEF, 0x66, 0x24, 0xDD, 0xDA
+		},
+		.len = 16
+	}
+};
+
 /** AES-256 Test Vectors */
 static const struct gcm_test_data gcm_test_case_256_1 = {
 	.key = {
-- 
2.7.4

  parent reply	other threads:[~2017-05-26 10:15 UTC|newest]

Thread overview: 17+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-05-26 10:16 [PATCH 0/2] AESNI GCM PMD: Migration from ISA-L to Multi-buffer library Pablo de Lara
2017-05-26 10:16 ` [PATCH 1/2] crypto/aesni_gcm: migrate " Pablo de Lara
2017-05-26 10:16 ` Pablo de Lara [this message]
2017-06-28 11:32 ` [PATCH v2 0/4] AESNI GCM PMD: Migration from ISA-L " Pablo de Lara
2017-06-28 11:32   ` [PATCH v2 1/4] crypto/aesni_gcm: migrate " Pablo de Lara
2017-06-28 11:32   ` [PATCH v2 2/4] test/crypto: rename some tests Pablo de Lara
2017-06-28 11:32   ` [PATCH v2 3/4] test/crypto: add AES GCM 192 tests Pablo de Lara
2017-06-28 11:32   ` [PATCH v2 4/4] test/crypto: extend AES-GCM 192/256 to other PMDs Pablo de Lara
2017-06-30 14:16   ` [PATCH v2 0/4] AESNI GCM PMD: Migration from ISA-L to Multi-buffer library Sergio Gonzalez Monroy
2017-07-04 10:11     ` De Lara Guarch, Pablo
2017-07-04  0:12   ` [PATCH v3 " Pablo de Lara
2017-07-04  0:12     ` [PATCH v3 1/4] crypto/aesni_gcm: migrate " Pablo de Lara
2017-07-04  9:43       ` Declan Doherty
2017-07-04 10:17         ` De Lara Guarch, Pablo
2017-07-04  0:12     ` [PATCH v3 2/4] test/crypto: rename some tests Pablo de Lara
2017-07-04  0:12     ` [PATCH v3 3/4] test/crypto: add AES GCM 192 tests Pablo de Lara
2017-07-04  0:12     ` [PATCH v3 4/4] test/crypto: extend AES-GCM 192/256 to other PMDs Pablo de Lara

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1495793766-200890-3-git-send-email-pablo.de.lara.guarch@intel.com \
    --to=pablo.de.lara.guarch@intel.com \
    --cc=declan.doherty@intel.com \
    --cc=dev@dpdk.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.