diff options
author | Kartikey Mahendra Bhatt <kartik_me@hotmail.com> | 2003-12-24 03:39:48 -0800 |
---|---|---|
committer | David S. Miller <davem@nuts.ninka.net> | 2003-12-24 03:39:48 -0800 |
commit | 91f70b006cf2f9a42a0f531876f51af2b4e32987 (patch) | |
tree | 19d32b61ff7554d48854582dd50c93c6fafd8072 /crypto | |
parent | 2b14075e9a9d56cb2d0da6d968e604b370cb11cc (diff) | |
download | history-91f70b006cf2f9a42a0f531876f51af2b4e32987.tar.gz |
[CRYPTO]: Clean up tcrypt module, part 1
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/tcrypt.c | 2602 | ||||
-rw-r--r-- | crypto/tcrypt.h | 2180 |
2 files changed, 1622 insertions, 3160 deletions
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index 338f48c1228f20..fd3fd14c008144 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c @@ -6,13 +6,16 @@ * * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> - * + * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * + * 14 - 09 - 2003 + * Rewritten by Kartikey Mahendra Bhatt */ + #include <linux/init.h> #include <linux/module.h> #include <linux/mm.h> @@ -41,6 +44,16 @@ #define IDX7 27333 #define IDX8 3000 +/* +* Used by test_cipher() +*/ +#define ENCRYPT 1 +#define DECRYPT 0 +#define MODE_ECB 1 +#define MODE_CBC 0 + +static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 }; + static int mode; static char *xbuf; static char *tvmem; @@ -60,2332 +73,344 @@ hexdump(unsigned char *buf, unsigned int len) printk("\n"); } -static void -test_md5(void) +static void +test_hash (char * algo, struct hash_testvec * template, unsigned int tcount) { - char *p; - unsigned int i; - struct scatterlist sg[2]; - char result[128]; - struct crypto_tfm *tfm; - struct md5_testvec *md5_tv; - unsigned int tsize; - - printk("\ntesting md5\n"); - - tsize = sizeof (md5_tv_template); + char *p; + unsigned int i, j, k, temp; + struct scatterlist sg[8]; + char result[64]; + struct crypto_tfm *tfm; + struct hash_testvec *hash_tv; + unsigned int tsize; + + printk("\ntesting %s\n", algo); + + tsize = sizeof (struct hash_testvec); + tsize *= tcount; + if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); + printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE); return; } - memcpy(tvmem, md5_tv_template, tsize); - md5_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("md5", 0); + memcpy(tvmem, template, tsize); + hash_tv = (void *) tvmem; + tfm = crypto_alloc_tfm(algo, 0); if (tfm == NULL) { - printk("failed to load transform for md5\n"); + printk("failed to load transform for %s\n", algo); return; } - for (i = 0; i < MD5_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); + for (i = 0; i < tcount; i++) { + printk ("test %u:\n", i + 1); + memset (result, 0, 64); - p = md5_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(md5_tv[i].plaintext); + p = hash_tv[i].plaintext; + sg[0].page = virt_to_page (p); + sg[0].offset = offset_in_page (p); + sg[0].length = hash_tv[i].psize; - crypto_digest_init(tfm); - crypto_digest_update(tfm, sg, 1); - crypto_digest_final(tfm, result); + crypto_digest_init (tfm); + crypto_digest_update (tfm, sg, 1); + crypto_digest_final (tfm, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); + hexdump (result, crypto_tfm_alg_digestsize (tfm)); printk("%s\n", - memcmp(result, md5_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); + memcmp(result, hash_tv[i].digest, + crypto_tfm_alg_digestsize(tfm)) ? "fail" : + "pass"); } - printk("\ntesting md5 across pages\n"); + printk ("testing %s across pages\n", algo); /* setup the dummy buffer first */ - memset(xbuf, 0, XBUFSIZE); - memcpy(&xbuf[IDX1], "abcdefghijklm", 13); - memcpy(&xbuf[IDX2], "nopqrstuvwxyz", 13); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 13; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 13; - - memset(result, 0, sizeof (result)); - crypto_digest_digest(tfm, sg, 2, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - - printk("%s\n", - memcmp(result, md5_tv[4].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); - crypto_free_tfm(tfm); -} - -#ifdef CONFIG_CRYPTO_HMAC -static void -test_hmac_md5(void) -{ - char *p; - unsigned int i, klen; - struct scatterlist sg[2]; - char result[128]; - struct crypto_tfm *tfm; - struct hmac_md5_testvec *hmac_md5_tv; - unsigned int tsize; - - tfm = crypto_alloc_tfm("md5", 0); - if (tfm == NULL) { - printk("failed to load transform for md5\n"); - return; + memset(xbuf, 0, XBUFSIZE); + + j = 0; + for (i = 0; i < tcount; i++) { + if (hash_tv[i].np) { + j++; + printk ("test %u:\n", j); + memset (result, 0, 64); + + temp = 0; + for (k = 0; k < hash_tv[i].np; k++) { + memcpy (&xbuf[IDX[k]], hash_tv[i].plaintext + temp, + hash_tv[i].tap[k]); + temp += hash_tv[i].tap[k]; + p = &xbuf[IDX[k]]; + sg[k].page = virt_to_page (p); + sg[k].offset = offset_in_page (p); + sg[k].length = hash_tv[i].tap[k]; + } + + crypto_digest_digest (tfm, sg, hash_tv[i].np, result); + + hexdump (result, crypto_tfm_alg_digestsize (tfm)); + printk("%s\n", + memcmp(result, hash_tv[i].digest, + crypto_tfm_alg_digestsize(tfm)) ? "fail" : + "pass"); + } } - - printk("\ntesting hmac_md5\n"); - tsize = sizeof (hmac_md5_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - - memcpy(tvmem, hmac_md5_tv_template, tsize); - hmac_md5_tv = (void *) tvmem; - - for (i = 0; i < HMAC_MD5_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = hmac_md5_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(hmac_md5_tv[i].plaintext); - - klen = strlen(hmac_md5_tv[i].key); - crypto_hmac(tfm, hmac_md5_tv[i].key, &klen, sg, 1, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, hmac_md5_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - printk("\ntesting hmac_md5 across pages\n"); - - memset(xbuf, 0, XBUFSIZE); - - memcpy(&xbuf[IDX1], "what do ya want ", 16); - memcpy(&xbuf[IDX2], "for nothing?", 12); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 16; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 12; + crypto_free_tfm (tfm); +} - memset(result, 0, sizeof (result)); - klen = strlen(hmac_md5_tv[7].key); - crypto_hmac(tfm, hmac_md5_tv[7].key, &klen, sg, 2, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, hmac_md5_tv[7].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); -out: - crypto_free_tfm(tfm); -} +#ifdef CONFIG_CRYPTO_HMAC static void -test_hmac_sha1(void) +test_hmac(char *algo, struct hmac_testvec * template, unsigned int tcount) { char *p; - unsigned int i, klen; + unsigned int i, j, k, temp; + struct scatterlist sg[8]; + char result[64]; struct crypto_tfm *tfm; - struct hmac_sha1_testvec *hmac_sha1_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA1_DIGEST_SIZE]; + struct hmac_testvec *hmac_tv; + unsigned int tsize, klen; - tfm = crypto_alloc_tfm("sha1", 0); + tfm = crypto_alloc_tfm(algo, 0); if (tfm == NULL) { - printk("failed to load transform for sha1\n"); + printk("failed to load transform for %s\n", algo); return; } - printk("\ntesting hmac_sha1\n"); - - tsize = sizeof (hmac_sha1_tv_template); + printk("\ntesting hmac_%s\n", algo); + + tsize = sizeof (struct hmac_testvec); + tsize *= tcount; if (tsize > TVMEMSIZE) { printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE); goto out; } - memcpy(tvmem, hmac_sha1_tv_template, tsize); - hmac_sha1_tv = (void *) tvmem; + memcpy(tvmem, template, tsize); + hmac_tv = (void *) tvmem; - for (i = 0; i < HMAC_SHA1_TEST_VECTORS; i++) { + for (i = 0; i < tcount; i++) { printk("test %u:\n", i + 1); memset(result, 0, sizeof (result)); - p = hmac_sha1_tv[i].plaintext; + p = hmac_tv[i].plaintext; + klen = hmac_tv[i].ksize; sg[0].page = virt_to_page(p); sg[0].offset = offset_in_page(p); - sg[0].length = strlen(hmac_sha1_tv[i].plaintext); + sg[0].length = hmac_tv[i].psize; - klen = strlen(hmac_sha1_tv[i].key); - - crypto_hmac(tfm, hmac_sha1_tv[i].key, &klen, sg, 1, result); + crypto_hmac(tfm, hmac_tv[i].key, &klen, sg, 1, result); - hexdump(result, sizeof (result)); + hexdump(result, crypto_tfm_alg_digestsize(tfm)); printk("%s\n", - memcmp(result, hmac_sha1_tv[i].digest, + memcmp(result, hmac_tv[i].digest, crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); } - printk("\ntesting hmac_sha1 across pages\n"); + printk("\ntesting hmac_%s across pages\n", algo); - /* setup the dummy buffer first */ memset(xbuf, 0, XBUFSIZE); - - memcpy(&xbuf[IDX1], "what do ya want ", 16); - memcpy(&xbuf[IDX2], "for nothing?", 12); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 16; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 12; - - memset(result, 0, sizeof (result)); - klen = strlen(hmac_sha1_tv[7].key); - crypto_hmac(tfm, hmac_sha1_tv[7].key, &klen, sg, 2, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - - printk("%s\n", - memcmp(result, hmac_sha1_tv[7].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); -out: - crypto_free_tfm(tfm); -} - -static void -test_hmac_sha256(void) -{ - char *p; - unsigned int i, klen; - struct crypto_tfm *tfm; - struct hmac_sha256_testvec *hmac_sha256_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA256_DIGEST_SIZE]; - - tfm = crypto_alloc_tfm("sha256", 0); - if (tfm == NULL) { - printk("failed to load transform for sha256\n"); - return; - } - - printk("\ntesting hmac_sha256\n"); - - tsize = sizeof (hmac_sha256_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - - memcpy(tvmem, hmac_sha256_tv_template, tsize); - hmac_sha256_tv = (void *) tvmem; - - for (i = 0; i < HMAC_SHA256_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = hmac_sha256_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(hmac_sha256_tv[i].plaintext); - - klen = strlen(hmac_sha256_tv[i].key); - hexdump(hmac_sha256_tv[i].key, strlen(hmac_sha256_tv[i].key)); - crypto_hmac(tfm, hmac_sha256_tv[i].key, &klen, sg, 1, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, hmac_sha256_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); + j = 0; + for (i = 0; i < tcount; i++) { + if (hmac_tv[i].np) { + j++; + printk ("test %u:\n",j); + memset (result, 0, 64); + + temp = 0; + klen = hmac_tv[i].ksize; + for (k = 0; k < hmac_tv[i].np; k++) { + memcpy (&xbuf[IDX[k]], hmac_tv[i].plaintext + temp, + hmac_tv[i].tap[k]); + temp += hmac_tv[i].tap[k]; + p = &xbuf[IDX[k]]; + sg[k].page = virt_to_page (p); + sg[k].offset = offset_in_page (p); + sg[k].length = hmac_tv[i].tap[k]; + } + + crypto_hmac(tfm, hmac_tv[i].key, &klen, sg, hmac_tv[i].np, + result); + hexdump(result, crypto_tfm_alg_digestsize(tfm)); + + printk("%s\n", + memcmp(result, hmac_tv[i].digest, + crypto_tfm_alg_digestsize(tfm)) ? "fail" : + "pass"); + } } - out: crypto_free_tfm(tfm); } #endif /* CONFIG_CRYPTO_HMAC */ -static void -test_md4(void) -{ - char *p; - unsigned int i; - struct scatterlist sg[1]; - char result[128]; - struct crypto_tfm *tfm; - struct md4_testvec *md4_tv; - unsigned int tsize; - - printk("\ntesting md4\n"); - - tsize = sizeof (md4_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, md4_tv_template, tsize); - md4_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("md4", 0); - if (tfm == NULL) { - printk("failed to load transform for md4\n"); - return; - } - - for (i = 0; i < MD4_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = md4_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(md4_tv[i].plaintext); - - crypto_digest_digest(tfm, sg, 1, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, md4_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - crypto_free_tfm(tfm); -} - -static void -test_sha1(void) -{ - char *p; - unsigned int i; - struct crypto_tfm *tfm; - struct sha1_testvec *sha1_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA1_DIGEST_SIZE]; - - printk("\ntesting sha1\n"); - - tsize = sizeof (sha1_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, sha1_tv_template, tsize); - sha1_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("sha1", 0); - if (tfm == NULL) { - printk("failed to load transform for sha1\n"); - return; - } - - for (i = 0; i < SHA1_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = sha1_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(sha1_tv[i].plaintext); - - crypto_digest_init(tfm); - crypto_digest_update(tfm, sg, 1); - crypto_digest_final(tfm, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha1_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - printk("\ntesting sha1 across pages\n"); - - /* setup the dummy buffer first */ - memset(xbuf, 0, XBUFSIZE); - memcpy(&xbuf[IDX1], "abcdbcdecdefdefgefghfghighij", 28); - memcpy(&xbuf[IDX2], "hijkijkljklmklmnlmnomnopnopq", 28); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 28; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 28; - - memset(result, 0, sizeof (result)); - crypto_digest_digest(tfm, sg, 2, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha1_tv[1].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); - crypto_free_tfm(tfm); -} - -static void -test_sha256(void) -{ - char *p; - unsigned int i; - struct crypto_tfm *tfm; - struct sha256_testvec *sha256_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA256_DIGEST_SIZE]; - - printk("\ntesting sha256\n"); - - tsize = sizeof (sha256_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, sha256_tv_template, tsize); - sha256_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("sha256", 0); - if (tfm == NULL) { - printk("failed to load transform for sha256\n"); - return; - } - - for (i = 0; i < SHA256_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = sha256_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(sha256_tv[i].plaintext); - - crypto_digest_init(tfm); - crypto_digest_update(tfm, sg, 1); - crypto_digest_final(tfm, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha256_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - printk("\ntesting sha256 across pages\n"); - - /* setup the dummy buffer first */ - memset(xbuf, 0, XBUFSIZE); - memcpy(&xbuf[IDX1], "abcdbcdecdefdefgefghfghighij", 28); - memcpy(&xbuf[IDX2], "hijkijkljklmklmnlmnomnopnopq", 28); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 28; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 28; - - memset(result, 0, sizeof (result)); - crypto_digest_digest(tfm, sg, 2, result); - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha256_tv[1].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : "pass"); - - crypto_free_tfm(tfm); -} - -static void -test_sha384(void) -{ - char *p; - unsigned int i; - struct crypto_tfm *tfm; - struct sha384_testvec *sha384_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA384_DIGEST_SIZE]; - - printk("\ntesting sha384\n"); - - tsize = sizeof (sha384_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, sha384_tv_template, tsize); - sha384_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("sha384", 0); - if (tfm == NULL) { - printk("failed to load transform for sha384\n"); - return; - } - - for (i = 0; i < SHA384_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = sha384_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(sha384_tv[i].plaintext); - - crypto_digest_init(tfm); - crypto_digest_update(tfm, sg, 1); - crypto_digest_final(tfm, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha384_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - crypto_free_tfm(tfm); -} - -static void -test_sha512(void) -{ - char *p; - unsigned int i; - struct crypto_tfm *tfm; - struct sha512_testvec *sha512_tv; - struct scatterlist sg[2]; - unsigned int tsize; - char result[SHA512_DIGEST_SIZE]; - - printk("\ntesting sha512\n"); - - tsize = sizeof (sha512_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, sha512_tv_template, tsize); - sha512_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("sha512", 0); - if (tfm == NULL) { - printk("failed to load transform for sha512\n"); - return; - } - - for (i = 0; i < SHA512_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - memset(result, 0, sizeof (result)); - - p = sha512_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = strlen(sha512_tv[i].plaintext); - - crypto_digest_init(tfm); - crypto_digest_update(tfm, sg, 1); - crypto_digest_final(tfm, result); - - hexdump(result, crypto_tfm_alg_digestsize(tfm)); - printk("%s\n", - memcmp(result, sha512_tv[i].digest, - crypto_tfm_alg_digestsize(tfm)) ? "fail" : - "pass"); - } - - crypto_free_tfm(tfm); -} - void -test_des(void) +test_cipher(char * algo, int mode, int enc, struct cipher_testvec * template, unsigned int tcount) { - unsigned int ret, i, len; + unsigned int ret, i, j, k, temp; unsigned int tsize; char *p, *q; struct crypto_tfm *tfm; char *key; - char res[8]; - struct des_tv *des_tv; + struct cipher_testvec *cipher_tv; struct scatterlist sg[8]; + char e[11], m[4]; - printk("\ntesting des encryption\n"); - - tsize = sizeof (des_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, des_enc_tv_template, tsize); - des_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("des", 0); - if (tfm == NULL) { - printk("failed to load transform for des (default ecb)\n"); - return; - } - - for (i = 0; i < DES_ENC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - - key = des_tv[i].key; - tfm->crt_flags |= CRYPTO_TFM_REQ_WEAK_KEY; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!des_tv[i].fail) - goto out; - } - - len = des_tv[i].len; - - p = des_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - ret = crypto_cipher_encrypt(tfm, sg, sg, len); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - - } - - printk("\ntesting des ecb encryption across pages\n"); + if (enc == ENCRYPT) + strncpy(e, "encryption", 11); + else + strncpy(e, "decryption", 11); + if (mode == MODE_ECB) + strncpy(m, "ECB", 4); + else + strncpy(m, "CBC", 4); - i = 5; - key = des_tv[i].key; - tfm->crt_flags = 0; - - hexdump(key, 8); - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - memcpy(&xbuf[IDX1], des_tv[i].plaintext, 8); - memcpy(&xbuf[IDX2], des_tv[i].plaintext + 8, 8); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 8; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 8; - - ret = crypto_cipher_encrypt(tfm, sg, sg, 16); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result, 8) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result + 8, 8) ? "fail" : "pass"); - - printk("\ntesting des ecb encryption chunking scenario A\n"); - - /* - * Scenario A: - * - * F1 F2 F3 - * [8 + 6] [2 + 8] [8] - * ^^^^^^ ^ - * a b c - * - * Chunking should begin at a, then end with b, and - * continue encrypting at an offset of 2 until c. - * - */ - i = 7; - - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - - /* Frag 1: 8 + 6 */ - memcpy(&xbuf[IDX3], des_tv[i].plaintext, 14); - - /* Frag 2: 2 + 8 */ - memcpy(&xbuf[IDX4], des_tv[i].plaintext + 14, 10); - - /* Frag 3: 8 */ - memcpy(&xbuf[IDX5], des_tv[i].plaintext + 24, 8); - - p = &xbuf[IDX3]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 14; - - p = &xbuf[IDX4]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 10; - - p = &xbuf[IDX5]; - sg[2].page = virt_to_page(p); - sg[2].offset = offset_in_page(p); - sg[2].length = 8; - - ret = crypto_cipher_encrypt(tfm, sg, sg, 32); - - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 14); - printk("%s\n", memcmp(q, des_tv[i].result, 14) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 10); - printk("%s\n", memcmp(q, des_tv[i].result + 14, 10) ? "fail" : "pass"); - - printk("page 3\n"); - q = kmap(sg[2].page) + sg[2].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result + 24, 8) ? "fail" : "pass"); - - printk("\ntesting des ecb encryption chunking scenario B\n"); - - /* - * Scenario B: - * - * F1 F2 F3 F4 - * [2] [1] [3] [2 + 8 + 8] - */ - i = 7; - - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - - /* Frag 1: 2 */ - memcpy(&xbuf[IDX3], des_tv[i].plaintext, 2); - - /* Frag 2: 1 */ - memcpy(&xbuf[IDX4], des_tv[i].plaintext + 2, 1); - - /* Frag 3: 3 */ - memcpy(&xbuf[IDX5], des_tv[i].plaintext + 3, 3); - - /* Frag 4: 2 + 8 + 8 */ - memcpy(&xbuf[IDX6], des_tv[i].plaintext + 6, 18); - - p = &xbuf[IDX3]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 2; - - p = &xbuf[IDX4]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 1; - - p = &xbuf[IDX5]; - sg[2].page = virt_to_page(p); - sg[2].offset = offset_in_page(p); - sg[2].length = 3; - - p = &xbuf[IDX6]; - sg[3].page = virt_to_page(p); - sg[3].offset = offset_in_page(p); - sg[3].length = 18; - - ret = crypto_cipher_encrypt(tfm, sg, sg, 24); - - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 2); - printk("%s\n", memcmp(q, des_tv[i].result, 2) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 1); - printk("%s\n", memcmp(q, des_tv[i].result + 2, 1) ? "fail" : "pass"); - - printk("page 3\n"); - q = kmap(sg[2].page) + sg[2].offset; - hexdump(q, 3); - printk("%s\n", memcmp(q, des_tv[i].result + 3, 3) ? "fail" : "pass"); - - printk("page 4\n"); - q = kmap(sg[3].page) + sg[3].offset; - hexdump(q, 18); - printk("%s\n", memcmp(q, des_tv[i].result + 6, 18) ? "fail" : "pass"); - - printk("\ntesting des ecb encryption chunking scenario C\n"); - - /* - * Scenario B: - * - * F1 F2 F3 F4 F5 - * [2] [2] [2] [2] [8] - */ - i = 7; - - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - - /* Frag 1: 2 */ - memcpy(&xbuf[IDX3], des_tv[i].plaintext, 2); - - /* Frag 2: 2 */ - memcpy(&xbuf[IDX4], des_tv[i].plaintext + 2, 2); - - /* Frag 3: 2 */ - memcpy(&xbuf[IDX5], des_tv[i].plaintext + 4, 2); - - /* Frag 4: 2 */ - memcpy(&xbuf[IDX6], des_tv[i].plaintext + 6, 2); - - /* Frag 5: 8 */ - memcpy(&xbuf[IDX7], des_tv[i].plaintext + 8, 8); - - p = &xbuf[IDX3]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 2; - - p = &xbuf[IDX4]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 2; - - p = &xbuf[IDX5]; - sg[2].page = virt_to_page(p); - sg[2].offset = offset_in_page(p); - sg[2].length = 2; - - p = &xbuf[IDX6]; - sg[3].page = virt_to_page(p); - sg[3].offset = offset_in_page(p); - sg[3].length = 2; - - p = &xbuf[IDX7]; - sg[4].page = virt_to_page(p); - sg[4].offset = offset_in_page(p); - sg[4].length = 8; - - ret = crypto_cipher_encrypt(tfm, sg, sg, 16); - - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 2); - printk("%s\n", memcmp(q, des_tv[i].result, 2) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 2); - printk("%s\n", memcmp(q, des_tv[i].result + 2, 2) ? "fail" : "pass"); - - printk("page 3\n"); - q = kmap(sg[2].page) + sg[2].offset; - hexdump(q, 2); - printk("%s\n", memcmp(q, des_tv[i].result + 4, 2) ? "fail" : "pass"); - - printk("page 4\n"); - q = kmap(sg[3].page) + sg[3].offset; - hexdump(q, 2); - printk("%s\n", memcmp(q, des_tv[i].result + 6, 2) ? "fail" : "pass"); - - printk("page 5\n"); - q = kmap(sg[4].page) + sg[4].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result + 8, 8) ? "fail" : "pass"); - - printk("\ntesting des ecb encryption chunking scenario D\n"); - - /* - * Scenario D, torture test, one byte per frag. - */ - i = 7; - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, XBUFSIZE); + printk("\ntesting %s %s %s \n", algo, m, e); - xbuf[IDX1] = des_tv[i].plaintext[0]; - xbuf[IDX2] = des_tv[i].plaintext[1]; - xbuf[IDX3] = des_tv[i].plaintext[2]; - xbuf[IDX4] = des_tv[i].plaintext[3]; - xbuf[IDX5] = des_tv[i].plaintext[4]; - xbuf[IDX6] = des_tv[i].plaintext[5]; - xbuf[IDX7] = des_tv[i].plaintext[6]; - xbuf[IDX8] = des_tv[i].plaintext[7]; - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 1; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 1; - - p = &xbuf[IDX3]; - sg[2].page = virt_to_page(p); - sg[2].offset = offset_in_page(p); - sg[2].length = 1; - - p = &xbuf[IDX4]; - sg[3].page = virt_to_page(p); - sg[3].offset = offset_in_page(p); - sg[3].length = 1; - - p = &xbuf[IDX5]; - sg[4].page = virt_to_page(p); - sg[4].offset = offset_in_page(p); - sg[4].length = 1; - - p = &xbuf[IDX6]; - sg[5].page = virt_to_page(p); - sg[5].offset = offset_in_page(p); - sg[5].length = 1; - - p = &xbuf[IDX7]; - sg[6].page = virt_to_page(p); - sg[6].offset = offset_in_page(p); - sg[6].length = 1; - - p = &xbuf[IDX8]; - sg[7].page = virt_to_page(p); - sg[7].offset = offset_in_page(p); - sg[7].length = 1; - - ret = crypto_cipher_encrypt(tfm, sg, sg, 8); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - for (i = 0; i < 8; i++) - res[i] = *(char *) (kmap(sg[i].page) + sg[i].offset); - - hexdump(res, 8); - printk("%s\n", memcmp(res, des_tv[7].result, 8) ? "fail" : "pass"); - - printk("\ntesting des decryption\n"); - - tsize = sizeof (des_dec_tv_template); + tsize = sizeof (struct cipher_testvec); + tsize *= tcount; + if (tsize > TVMEMSIZE) { printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE); return; } - memcpy(tvmem, des_dec_tv_template, tsize); - des_tv = (void *) tvmem; - - for (i = 0; i < DES_DEC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - key = des_tv[i].key; + memcpy(tvmem, template, tsize); + cipher_tv = (void *) tvmem; - tfm->crt_flags = 0; - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - len = des_tv[i].len; - - p = des_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("des_decrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - - } - - printk("\ntesting des ecb decryption across pages\n"); - - i = 6; - - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - memcpy(&xbuf[IDX1], des_tv[i].plaintext, 8); - memcpy(&xbuf[IDX2], des_tv[i].plaintext + 8, 8); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 8; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 8; - - ret = crypto_cipher_decrypt(tfm, sg, sg, 16); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result, 8) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 8); - printk("%s\n", memcmp(q, des_tv[i].result + 8, 8) ? "fail" : "pass"); - - /* - * Scenario E: - * - * F1 F2 F3 - * [3] [5 + 7] [1] - * - */ - printk("\ntesting des ecb decryption chunking scenario E\n"); - i = 2; - - key = des_tv[i].key; - tfm->crt_flags = 0; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - - memcpy(&xbuf[IDX1], des_tv[i].plaintext, 3); - memcpy(&xbuf[IDX2], des_tv[i].plaintext + 3, 12); - memcpy(&xbuf[IDX3], des_tv[i].plaintext + 15, 1); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 3; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 12; - - p = &xbuf[IDX3]; - sg[2].page = virt_to_page(p); - sg[2].offset = offset_in_page(p); - sg[2].length = 1; - - ret = crypto_cipher_decrypt(tfm, sg, sg, 16); - - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 3); - printk("%s\n", memcmp(q, des_tv[i].result, 3) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 12); - printk("%s\n", memcmp(q, des_tv[i].result + 3, 12) ? "fail" : "pass"); - - printk("page 3\n"); - q = kmap(sg[2].page) + sg[2].offset; - hexdump(q, 1); - printk("%s\n", memcmp(q, des_tv[i].result + 15, 1) ? "fail" : "pass"); - - crypto_free_tfm(tfm); - - tfm = crypto_alloc_tfm("des", CRYPTO_TFM_MODE_CBC); + if (mode) + tfm = crypto_alloc_tfm (algo, 0); + else + tfm = crypto_alloc_tfm (algo, CRYPTO_TFM_MODE_CBC); + if (tfm == NULL) { - printk("failed to load transform for des cbc\n"); - return; - } - - printk("\ntesting des cbc encryption\n"); - - tsize = sizeof (des_cbc_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); + printk("failed to load transform for %s %s\n", algo, m); return; } - memcpy(tvmem, des_cbc_enc_tv_template, tsize); - des_tv = (void *) tvmem; - - crypto_cipher_set_iv(tfm, des_tv[i].iv, crypto_tfm_alg_ivsize(tfm)); - crypto_cipher_get_iv(tfm, res, crypto_tfm_alg_ivsize(tfm)); - if (memcmp(res, des_tv[i].iv, sizeof(res))) { - printk("crypto_cipher_[set|get]_iv() failed\n"); - goto out; - } + j = 0; + for (i = 0; i < tcount; i++) { + if (!(cipher_tv[i].np)) { + j++; + printk("test %u (%d bit key):\n", + j, cipher_tv[i].klen * 8); + + tfm->crt_flags = 0; + if (cipher_tv[i].wk) + tfm->crt_flags |= CRYPTO_TFM_REQ_WEAK_KEY; + key = cipher_tv[i].key; - for (i = 0; i < DES_CBC_ENC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - - key = des_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - len = des_tv[i].len; - p = des_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - - crypto_cipher_set_iv(tfm, des_tv[i].iv, - crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_encrypt(tfm, sg, sg, len); - if (ret) { - printk("des_cbc_encrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - } - - crypto_free_tfm(tfm); - - /* - * Scenario F: - * - * F1 F2 - * [8 + 5] [3 + 8] - * - */ - printk("\ntesting des cbc encryption chunking scenario F\n"); - i = 4; - - tfm = crypto_alloc_tfm("des", CRYPTO_TFM_MODE_CBC); - if (tfm == NULL) { - printk("failed to load transform for CRYPTO_ALG_DES_CCB\n"); - return; - } - - tfm->crt_flags = 0; - key = des_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - - memcpy(&xbuf[IDX1], des_tv[i].plaintext, 13); - memcpy(&xbuf[IDX2], des_tv[i].plaintext + 13, 11); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 13; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 11; - - crypto_cipher_set_iv(tfm, des_tv[i].iv, crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_encrypt(tfm, sg, sg, 24); - if (ret) { - printk("des_cbc_decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 13); - printk("%s\n", memcmp(q, des_tv[i].result, 13) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 11); - printk("%s\n", memcmp(q, des_tv[i].result + 13, 11) ? "fail" : "pass"); - - tsize = sizeof (des_cbc_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - memcpy(tvmem, des_cbc_dec_tv_template, tsize); - des_tv = (void *) tvmem; - - printk("\ntesting des cbc decryption\n"); - - for (i = 0; i < DES_CBC_DEC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - - tfm->crt_flags = 0; - key = des_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - len = des_tv[i].len; - p = des_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - - crypto_cipher_set_iv(tfm, des_tv[i].iv, - crypto_tfm_alg_blocksize(tfm)); - - ret = crypto_cipher_decrypt(tfm, sg, sg, len); - if (ret) { - printk("des_cbc_decrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - hexdump(tfm->crt_cipher.cit_iv, 8); - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - } - - /* - * Scenario G: - * - * F1 F2 - * [4] [4] - * - */ - printk("\ntesting des cbc decryption chunking scenario G\n"); - i = 3; - - tfm->crt_flags = 0; - key = des_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, 8); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - /* setup the dummy buffer first */ - memset(xbuf, 0, sizeof (xbuf)); - memcpy(&xbuf[IDX1], des_tv[i].plaintext, 4); - memcpy(&xbuf[IDX2], des_tv[i].plaintext + 4, 4); - - p = &xbuf[IDX1]; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = 4; - - p = &xbuf[IDX2]; - sg[1].page = virt_to_page(p); - sg[1].offset = offset_in_page(p); - sg[1].length = 4; - - crypto_cipher_set_iv(tfm, des_tv[i].iv, crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_decrypt(tfm, sg, sg, 8); - if (ret) { - printk("des_cbc_decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - printk("page 1\n"); - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, 4); - printk("%s\n", memcmp(q, des_tv[i].result, 4) ? "fail" : "pass"); - - printk("page 2\n"); - q = kmap(sg[1].page) + sg[1].offset; - hexdump(q, 4); - printk("%s\n", memcmp(q, des_tv[i].result + 4, 4) ? "fail" : "pass"); - - out: - crypto_free_tfm(tfm); -} - -void -test_des3_ede(void) -{ - unsigned int ret, i, len; - unsigned int tsize; - char *p, *q; - struct crypto_tfm *tfm; - char *key; - /*char res[8]; */ - struct des_tv *des_tv; - struct scatterlist sg[8]; - - printk("\ntesting des3 ede encryption\n"); - - tsize = sizeof (des3_ede_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, des3_ede_enc_tv_template, tsize); - des_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("des3_ede", CRYPTO_TFM_MODE_ECB); - if (tfm == NULL) { - printk("failed to load transform for 3des ecb\n"); - return; - } - - for (i = 0; i < DES3_EDE_ENC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - - key = des_tv[i].key; - ret = crypto_cipher_setkey(tfm, key, 24); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!des_tv[i].fail) - goto out; - } - - len = des_tv[i].len; - - p = des_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - ret = crypto_cipher_encrypt(tfm, sg, sg, len); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - } - - printk("\ntesting des3 ede decryption\n"); - - tsize = sizeof (des3_ede_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, des3_ede_dec_tv_template, tsize); - des_tv = (void *) tvmem; - - for (i = 0; i < DES3_EDE_DEC_TEST_VECTORS; i++) { - printk("test %u:\n", i + 1); - - key = des_tv[i].key; - ret = crypto_cipher_setkey(tfm, key, 24); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!des_tv[i].fail) - goto out; - } - - len = des_tv[i].len; - - p = des_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = len; - ret = crypto_cipher_decrypt(tfm, sg, sg, len); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, len); - - printk("%s\n", - memcmp(q, des_tv[i].result, len) ? "fail" : "pass"); - } - - out: - crypto_free_tfm(tfm); -} - -void -test_blowfish(void) -{ - unsigned int ret, i; - unsigned int tsize; - char *p, *q; - struct crypto_tfm *tfm; - char *key; - struct bf_tv *bf_tv; - struct scatterlist sg[1]; - - printk("\ntesting blowfish encryption\n"); - - tsize = sizeof (bf_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, bf_enc_tv_template, tsize); - bf_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("blowfish", 0); - if (tfm == NULL) { - printk("failed to load transform for blowfish (default ecb)\n"); - return; - } - - for (i = 0; i < BF_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, bf_tv[i].keylen * 8); - key = bf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, bf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!bf_tv[i].fail) - goto out; - } - - p = bf_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = bf_tv[i].plen; - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, bf_tv[i].rlen); - - printk("%s\n", memcmp(q, bf_tv[i].result, bf_tv[i].rlen) ? - "fail" : "pass"); - } - - printk("\ntesting blowfish decryption\n"); - - tsize = sizeof (bf_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, bf_dec_tv_template, tsize); - bf_tv = (void *) tvmem; - - for (i = 0; i < BF_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, bf_tv[i].keylen * 8); - key = bf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, bf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!bf_tv[i].fail) - goto out; - } - - p = bf_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = bf_tv[i].plen; - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, bf_tv[i].rlen); - - printk("%s\n", memcmp(q, bf_tv[i].result, bf_tv[i].rlen) ? - "fail" : "pass"); - } + ret = crypto_cipher_setkey(tfm, key, cipher_tv[i].klen); + if (ret) { + printk("setkey() failed flags=%x\n", tfm->crt_flags); - crypto_free_tfm(tfm); + if (!cipher_tv[i].fail) + goto out; + } + + p = cipher_tv[i].input; + sg[0].page = virt_to_page(p); + sg[0].offset = offset_in_page(p); + sg[0].length = cipher_tv[i].ilen; - tfm = crypto_alloc_tfm("blowfish", CRYPTO_TFM_MODE_CBC); - if (tfm == NULL) { - printk("failed to load transform for blowfish cbc\n"); - return; - } - - printk("\ntesting blowfish cbc encryption\n"); - - tsize = sizeof (bf_cbc_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - memcpy(tvmem, bf_cbc_enc_tv_template, tsize); - bf_tv = (void *) tvmem; - - for (i = 0; i < BF_CBC_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, bf_tv[i].keylen * 8); - - key = bf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, bf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - p = bf_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = bf_tv[i].plen; - - crypto_cipher_set_iv(tfm, bf_tv[i].iv, - crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("blowfish_cbc_encrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, bf_tv[i].rlen); - - printk("%s\n", memcmp(q, bf_tv[i].result, bf_tv[i].rlen) - ? "fail" : "pass"); - } - - printk("\ntesting blowfish cbc decryption\n"); - - tsize = sizeof (bf_cbc_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - memcpy(tvmem, bf_cbc_dec_tv_template, tsize); - bf_tv = (void *) tvmem; - - for (i = 0; i < BF_CBC_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, bf_tv[i].keylen * 8); - key = bf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, bf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - p = bf_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = bf_tv[i].plen; - - crypto_cipher_set_iv(tfm, bf_tv[i].iv, - crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("blowfish_cbc_decrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, bf_tv[i].rlen); - - printk("%s\n", memcmp(q, bf_tv[i].result, bf_tv[i].rlen) - ? "fail" : "pass"); - } - -out: - crypto_free_tfm(tfm); -} - - -void -test_twofish(void) -{ - unsigned int ret, i; - unsigned int tsize; - char *p, *q; - struct crypto_tfm *tfm; - char *key; - struct tf_tv *tf_tv; - struct scatterlist sg[1]; - - printk("\ntesting twofish encryption\n"); - - tsize = sizeof (tf_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, tf_enc_tv_template, tsize); - tf_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("twofish", 0); - if (tfm == NULL) { - printk("failed to load transform for blowfish (default ecb)\n"); - return; - } - - for (i = 0; i < TF_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, tf_tv[i].keylen * 8); - key = tf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, tf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!tf_tv[i].fail) - goto out; - } - - p = tf_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = tf_tv[i].plen; - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, tf_tv[i].rlen); - - printk("%s\n", memcmp(q, tf_tv[i].result, tf_tv[i].rlen) ? - "fail" : "pass"); - } - - printk("\ntesting twofish decryption\n"); - - tsize = sizeof (tf_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, tf_dec_tv_template, tsize); - tf_tv = (void *) tvmem; - - for (i = 0; i < TF_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, tf_tv[i].keylen * 8); - key = tf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, tf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!tf_tv[i].fail) + if (!mode) { + crypto_cipher_set_iv(tfm, cipher_tv[i].iv, + crypto_tfm_alg_ivsize (tfm)); + } + + if (enc) + ret = crypto_cipher_encrypt(tfm, sg, sg, cipher_tv[i].ilen); + else + ret = crypto_cipher_decrypt(tfm, sg, sg, cipher_tv[i].ilen); + + + if (ret) { + printk("%s () failed flags=%x\n", e, tfm->crt_flags); goto out; - } - - p = tf_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = tf_tv[i].plen; - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, tf_tv[i].rlen); - - printk("%s\n", memcmp(q, tf_tv[i].result, tf_tv[i].rlen) ? - "fail" : "pass"); - } - - crypto_free_tfm(tfm); + } - tfm = crypto_alloc_tfm("twofish", CRYPTO_TFM_MODE_CBC); - if (tfm == NULL) { - printk("failed to load transform for twofish cbc\n"); - return; - } - - printk("\ntesting twofish cbc encryption\n"); - - tsize = sizeof (tf_cbc_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - memcpy(tvmem, tf_cbc_enc_tv_template, tsize); - tf_tv = (void *) tvmem; - - for (i = 0; i < TF_CBC_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, tf_tv[i].keylen * 8); - - key = tf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, tf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - p = tf_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = tf_tv[i].plen; - - crypto_cipher_set_iv(tfm, tf_tv[i].iv, - crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("blowfish_cbc_encrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, tf_tv[i].rlen); - - printk("%s\n", memcmp(q, tf_tv[i].result, tf_tv[i].rlen) - ? "fail" : "pass"); - } - - printk("\ntesting twofish cbc decryption\n"); - - tsize = sizeof (tf_cbc_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - goto out; - } - memcpy(tvmem, tf_cbc_dec_tv_template, tsize); - tf_tv = (void *) tvmem; - - for (i = 0; i < TF_CBC_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, tf_tv[i].keylen * 8); - - key = tf_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, tf_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - p = tf_tv[i].plaintext; - - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = tf_tv[i].plen; - - crypto_cipher_set_iv(tfm, tf_tv[i].iv, - crypto_tfm_alg_ivsize(tfm)); - - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("blowfish_cbc_decrypt() failed flags=%x\n", - tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, tf_tv[i].rlen); - - printk("%s\n", memcmp(q, tf_tv[i].result, tf_tv[i].rlen) - ? "fail" : "pass"); - } - -out: - crypto_free_tfm(tfm); -} - -void -test_serpent(void) -{ - unsigned int ret, i, tsize; - u8 *p, *q, *key; - struct crypto_tfm *tfm; - struct serpent_tv *serp_tv; - struct scatterlist sg[1]; - - printk("\ntesting serpent encryption\n"); - - tfm = crypto_alloc_tfm("serpent", 0); - if (tfm == NULL) { - printk("failed to load transform for serpent (default ecb)\n"); - return; - } - - tsize = sizeof (serpent_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, serpent_enc_tv_template, tsize); - serp_tv = (void *) tvmem; - for (i = 0; i < SERPENT_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, serp_tv[i].keylen * 8); - key = serp_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, serp_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!serp_tv[i].fail) - goto out; - } - - p = serp_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = sizeof(serp_tv[i].plaintext); - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(serp_tv[i].result)); - - printk("%s\n", memcmp(q, serp_tv[i].result, - sizeof(serp_tv[i].result)) ? "fail" : "pass"); - } - - printk("\ntesting serpent decryption\n"); - - tsize = sizeof (serpent_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, serpent_dec_tv_template, tsize); - serp_tv = (void *) tvmem; - for (i = 0; i < SERPENT_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, serp_tv[i].keylen * 8); - key = serp_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, serp_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!serp_tv[i].fail) - goto out; - } - - p = serp_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = sizeof(serp_tv[i].plaintext); - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(serp_tv[i].result)); - - printk("%s\n", memcmp(q, serp_tv[i].result, - sizeof(serp_tv[i].result)) ? "fail" : "pass"); - } - -out: - crypto_free_tfm(tfm); -} - -static void -test_cast6(void) -{ - unsigned int ret, i, tsize; - u8 *p, *q, *key; - struct crypto_tfm *tfm; - struct cast6_tv *cast_tv; - struct scatterlist sg[1]; - - printk("\ntesting cast6 encryption\n"); - - tfm = crypto_alloc_tfm("cast6", 0); - if (tfm == NULL) { - printk("failed to load transform for cast6 (default ecb)\n"); - return; - } - - tsize = sizeof (cast6_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, cast6_enc_tv_template, tsize); - cast_tv = (void *) tvmem; - for (i = 0; i < CAST6_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, cast_tv[i].keylen * 8); - key = cast_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, cast_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!cast_tv[i].fail) - goto out; - } - - p = cast_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = ((long) p & ~PAGE_MASK); - sg[0].length = sizeof(cast_tv[i].plaintext); - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(cast_tv[i].result)); - - printk("%s\n", memcmp(q, cast_tv[i].result, - sizeof(cast_tv[i].result)) ? "fail" : "pass"); - } - - printk("\ntesting cast6 decryption\n"); - - tsize = sizeof (cast6_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, cast6_dec_tv_template, tsize); - cast_tv = (void *) tvmem; - for (i = 0; i < CAST6_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, cast_tv[i].keylen * 8); - key = cast_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, cast_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!cast_tv[i].fail) - goto out; - } - - p = cast_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = ((long) p & ~PAGE_MASK); - sg[0].length = sizeof(cast_tv[i].plaintext); - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(cast_tv[i].result)); - - printk("%s\n", memcmp(q, cast_tv[i].result, - sizeof(cast_tv[i].result)) ? "fail" : "pass"); - } - -out: - crypto_free_tfm(tfm); -} - -void -test_aes(void) -{ - unsigned int ret, i; - unsigned int tsize; - char *p, *q; - struct crypto_tfm *tfm; - char *key; - struct aes_tv *aes_tv; - struct scatterlist sg[1]; - - printk("\ntesting aes encryption\n"); - - tsize = sizeof (aes_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, aes_enc_tv_template, tsize); - aes_tv = (void *) tvmem; - - tfm = crypto_alloc_tfm("aes", 0); - if (tfm == NULL) { - printk("failed to load transform for aes (default ecb)\n"); - return; - } - - for (i = 0; i < AES_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, aes_tv[i].keylen * 8); - key = aes_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, aes_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!aes_tv[i].fail) - goto out; - } - - p = aes_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = aes_tv[i].plen; - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; + q = kmap(sg[0].page) + sg[0].offset; + hexdump(q, cipher_tv[i].rlen); + + printk("%s\n", + memcmp(q, cipher_tv[i].result, cipher_tv[i].rlen) ? "fail" : + "pass"); } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, aes_tv[i].rlen); - - printk("%s\n", memcmp(q, aes_tv[i].result, aes_tv[i].rlen) ? - "fail" : "pass"); } - printk("\ntesting aes decryption\n"); - - tsize = sizeof (aes_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, aes_dec_tv_template, tsize); - aes_tv = (void *) tvmem; - - for (i = 0; i < AES_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", - i + 1, aes_tv[i].keylen * 8); - key = aes_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, aes_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!aes_tv[i].fail) + printk("\ntesting %s %s %s across pages (chunking) \n", algo, m, e); + memset(xbuf, 0, XBUFSIZE); + + j = 0; + for (i = 0; i < tcount; i++) { + if (cipher_tv[i].np) { + j++; + printk("test %u (%d bit key):\n", + j, cipher_tv[i].klen * 8); + + tfm->crt_flags = 0; + if (cipher_tv[i].wk) + tfm->crt_flags |= CRYPTO_TFM_REQ_WEAK_KEY; + key = cipher_tv[i].key; + + ret = crypto_cipher_setkey(tfm, key, cipher_tv[i].klen); + if (ret) { + printk("setkey() failed flags=%x\n", tfm->crt_flags); + + if (!cipher_tv[i].fail) + goto out; + } + + temp = 0; + for (k = 0; k < cipher_tv[i].np; k++) { + memcpy (&xbuf[IDX[k]], cipher_tv[i].input + temp, + cipher_tv[i].tap[k]); + temp += cipher_tv[i].tap[k]; + p = &xbuf[IDX[k]]; + sg[k].page = virt_to_page (p); + sg[k].offset = offset_in_page (p); + sg[k].length = cipher_tv[i].tap[k]; + } + + if (!mode) { + crypto_cipher_set_iv(tfm, cipher_tv[i].iv, + crypto_tfm_alg_ivsize (tfm)); + } + + if (enc) + ret = crypto_cipher_encrypt(tfm, sg, sg, cipher_tv[i].ilen); + else + ret = crypto_cipher_decrypt(tfm, sg, sg, cipher_tv[i].ilen); + + if (ret) { + printk("%s () failed flags=%x\n", e, tfm->crt_flags); goto out; - } + } - p = aes_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = offset_in_page(p); - sg[0].length = aes_tv[i].plen; - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; + temp = 0; + for (k = 0; k < cipher_tv[i].np; k++) { + printk("page %u\n", k); + q = kmap(sg[k].page) + sg[k].offset; + hexdump(q, cipher_tv[i].tap[k]); + printk("%s\n", + memcmp(q, cipher_tv[i].result + temp, + cipher_tv[i].tap[k]) ? "fail" : + "pass"); + temp += cipher_tv[i].tap[k]; + } } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, aes_tv[i].rlen); - - printk("%s\n", memcmp(q, aes_tv[i].result, aes_tv[i].rlen) ? - "fail" : "pass"); } out: crypto_free_tfm(tfm); } -void -test_cast5(void) -{ - unsigned int ret, i, tsize; - u8 *p, *q, *key; - struct crypto_tfm *tfm; - struct cast5_tv *c5_tv; - struct scatterlist sg[1]; - - printk("\ntesting cast5 encryption\n"); - - tfm = crypto_alloc_tfm("cast5", 0); - if (tfm == NULL) { - printk("failed to load transform for cast5 (default ecb)\n"); - return; - } - - tsize = sizeof (cast5_enc_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, cast5_enc_tv_template, tsize); - c5_tv = (void *) tvmem; - for (i = 0; i < CAST5_ENC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, c5_tv[i].keylen * 8); - key = c5_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, c5_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!c5_tv[i].fail) - goto out; - } - - p = c5_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = ((long) p & ~PAGE_MASK); - sg[0].length = sizeof(c5_tv[i].plaintext); - ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("encrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(c5_tv[i].ciphertext)); - - printk("%s\n", memcmp(q, c5_tv[i].ciphertext, - sizeof(c5_tv[i].ciphertext)) ? "fail" : "pass"); - } - - tsize = sizeof (cast5_dec_tv_template); - if (tsize > TVMEMSIZE) { - printk("template (%u) too big for tvmem (%u)\n", tsize, - TVMEMSIZE); - return; - } - - memcpy(tvmem, cast5_dec_tv_template, tsize); - c5_tv = (void *) tvmem; - for (i = 0; i < CAST5_DEC_TEST_VECTORS; i++) { - printk("test %u (%d bit key):\n", i + 1, c5_tv[i].keylen * 8); - key = c5_tv[i].key; - - ret = crypto_cipher_setkey(tfm, key, c5_tv[i].keylen); - if (ret) { - printk("setkey() failed flags=%x\n", tfm->crt_flags); - - if (!c5_tv[i].fail) - goto out; - } - - p = c5_tv[i].plaintext; - sg[0].page = virt_to_page(p); - sg[0].offset = ((long) p & ~PAGE_MASK); - sg[0].length = sizeof(c5_tv[i].plaintext); - ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); - if (ret) { - printk("decrypt() failed flags=%x\n", tfm->crt_flags); - goto out; - } - - q = kmap(sg[0].page) + sg[0].offset; - hexdump(q, sizeof(c5_tv[i].ciphertext)); - - printk("%s\n", memcmp(q, c5_tv[i].ciphertext, - sizeof(c5_tv[i].ciphertext)) ? "fail" : "pass"); - } -out: - crypto_free_tfm (tfm); -} - static void test_deflate(void) { @@ -2485,75 +510,118 @@ do_test(void) switch (mode) { case 0: - test_md5(); - test_sha1(); - test_des(); - test_des3_ede(); - test_md4(); - test_sha256(); - test_blowfish(); - test_twofish(); - test_serpent(); - test_cast6(); - test_aes(); - test_sha384(); - test_sha512(); - test_deflate(); - test_cast5(); - test_cast6(); + test_hash("md5", md5_tv_template, MD5_TEST_VECTORS); + + test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS); + + //DES + test_cipher ("des", MODE_ECB, ENCRYPT, des_enc_tv_template, DES_ENC_TEST_VECTORS); + test_cipher ("des", MODE_ECB, DECRYPT, des_dec_tv_template, DES_DEC_TEST_VECTORS); + test_cipher ("des", MODE_CBC, ENCRYPT, des_cbc_enc_tv_template, DES_CBC_ENC_TEST_VECTORS); + test_cipher ("des", MODE_CBC, DECRYPT, des_cbc_dec_tv_template, DES_CBC_DEC_TEST_VECTORS); + + //DES3_EDE + test_cipher ("des3_ede", MODE_ECB, ENCRYPT, des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS); + test_cipher ("des3_ede", MODE_ECB, DECRYPT, des3_ede_dec_tv_template, DES3_EDE_DEC_TEST_VECTORS); + + test_hash("md4", md4_tv_template, MD4_TEST_VECTORS); + + test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS); + + //BLOWFISH + test_cipher ("blowfish", MODE_ECB, ENCRYPT, bf_enc_tv_template, BF_ENC_TEST_VECTORS); + test_cipher ("blowfish", MODE_ECB, DECRYPT, bf_dec_tv_template, BF_DEC_TEST_VECTORS); + test_cipher ("blowfish", MODE_CBC, ENCRYPT, bf_cbc_enc_tv_template, BF_CBC_ENC_TEST_VECTORS); + test_cipher ("blowfish", MODE_CBC, DECRYPT, bf_cbc_dec_tv_template, BF_CBC_DEC_TEST_VECTORS); + + //TWOFISH + test_cipher ("twofish", MODE_ECB, ENCRYPT, tf_enc_tv_template, TF_ENC_TEST_VECTORS); + test_cipher ("twofish", MODE_ECB, DECRYPT, tf_dec_tv_template, TF_DEC_TEST_VECTORS); + test_cipher ("twofish", MODE_CBC, ENCRYPT, tf_cbc_enc_tv_template, TF_CBC_ENC_TEST_VECTORS); + test_cipher ("twofish", MODE_CBC, DECRYPT, tf_cbc_dec_tv_template, TF_CBC_DEC_TEST_VECTORS); + + //SERPENT + test_cipher ("serpent", MODE_ECB, ENCRYPT, serpent_enc_tv_template, SERPENT_ENC_TEST_VECTORS); + test_cipher ("serpent", MODE_ECB, DECRYPT, serpent_dec_tv_template, SERPENT_DEC_TEST_VECTORS); + + //AES + test_cipher ("aes", MODE_ECB, ENCRYPT, aes_enc_tv_template, AES_ENC_TEST_VECTORS); + test_cipher ("aes", MODE_ECB, DECRYPT, aes_dec_tv_template, AES_DEC_TEST_VECTORS); + + //CAST5 + test_cipher ("cast5", MODE_ECB, ENCRYPT, cast5_enc_tv_template, CAST5_ENC_TEST_VECTORS); + test_cipher ("cast5", MODE_ECB, DECRYPT, cast5_dec_tv_template, CAST5_DEC_TEST_VECTORS); + + //CAST6 + test_cipher ("cast6", MODE_ECB, ENCRYPT, cast6_enc_tv_template, CAST6_ENC_TEST_VECTORS); + test_cipher ("cast6", MODE_ECB, DECRYPT, cast6_dec_tv_template, CAST6_DEC_TEST_VECTORS); + + test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); + test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); + test_deflate(); #ifdef CONFIG_CRYPTO_HMAC - test_hmac_md5(); - test_hmac_sha1(); - test_hmac_sha256(); + test_hmac("md5", hmac_md5_tv_template, HMAC_MD5_TEST_VECTORS); + test_hmac("sha1", hmac_sha1_tv_template, HMAC_SHA1_TEST_VECTORS); + test_hmac("sha256", hmac_sha256_tv_template, HMAC_SHA256_TEST_VECTORS); #endif break; case 1: - test_md5(); + test_hash("md5", md5_tv_template, MD5_TEST_VECTORS); break; case 2: - test_sha1(); + test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS); break; case 3: - test_des(); + test_cipher ("des", MODE_ECB, ENCRYPT, des_enc_tv_template, DES_ENC_TEST_VECTORS); + test_cipher ("des", MODE_ECB, DECRYPT, des_dec_tv_template, DES_DEC_TEST_VECTORS); + test_cipher ("des", MODE_CBC, ENCRYPT, des_cbc_enc_tv_template, DES_CBC_ENC_TEST_VECTORS); + test_cipher ("des", MODE_CBC, DECRYPT, des_cbc_dec_tv_template, DES_CBC_DEC_TEST_VECTORS); break; case 4: - test_des3_ede(); + test_cipher ("des3_ede", MODE_ECB, ENCRYPT, des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS); + test_cipher ("des3_ede", MODE_ECB, DECRYPT, des3_ede_dec_tv_template, DES3_EDE_DEC_TEST_VECTORS); break; case 5: - test_md4(); + test_hash("md4", md4_tv_template, MD4_TEST_VECTORS); break; case 6: - test_sha256(); + test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS); break; case 7: - test_blowfish(); + test_cipher ("blowfish", MODE_ECB, ENCRYPT, bf_enc_tv_template, BF_ENC_TEST_VECTORS); + test_cipher ("blowfish", MODE_ECB, DECRYPT, bf_dec_tv_template, BF_DEC_TEST_VECTORS); + test_cipher ("blowfish", MODE_CBC, ENCRYPT, bf_cbc_enc_tv_template, BF_CBC_ENC_TEST_VECTORS); + test_cipher ("blowfish", MODE_CBC, DECRYPT, bf_cbc_dec_tv_template, BF_CBC_DEC_TEST_VECTORS); break; case 8: - test_twofish(); + test_cipher ("twofish", MODE_ECB, ENCRYPT, tf_enc_tv_template, TF_ENC_TEST_VECTORS); + test_cipher ("twofish", MODE_ECB, DECRYPT, tf_dec_tv_template, TF_DEC_TEST_VECTORS); + test_cipher ("twofish", MODE_CBC, ENCRYPT, tf_cbc_enc_tv_template, TF_CBC_ENC_TEST_VECTORS); + test_cipher ("twofish", MODE_CBC, DECRYPT, tf_cbc_dec_tv_template, TF_CBC_DEC_TEST_VECTORS); break; - + case 9: - test_serpent(); break; case 10: - test_aes(); + test_cipher ("aes", MODE_ECB, ENCRYPT, aes_enc_tv_template, AES_ENC_TEST_VECTORS); + test_cipher ("aes", MODE_ECB, DECRYPT, aes_dec_tv_template, AES_DEC_TEST_VECTORS); break; case 11: - test_sha384(); + test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); break; case 12: - test_sha512(); + test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); break; case 13: @@ -2561,24 +629,26 @@ do_test(void) break; case 14: - test_cast5(); + test_cipher ("cast5", MODE_ECB, ENCRYPT, cast5_enc_tv_template, CAST5_ENC_TEST_VECTORS); + test_cipher ("cast5", MODE_ECB, DECRYPT, cast5_dec_tv_template, CAST5_DEC_TEST_VECTORS); break; case 15: - test_cast6(); + test_cipher ("cast6", MODE_ECB, ENCRYPT, cast6_enc_tv_template, CAST6_ENC_TEST_VECTORS); + test_cipher ("cast6", MODE_ECB, DECRYPT, cast6_dec_tv_template, CAST6_DEC_TEST_VECTORS); break; #ifdef CONFIG_CRYPTO_HMAC case 100: - test_hmac_md5(); + test_hmac("md5", hmac_md5_tv_template, HMAC_MD5_TEST_VECTORS); break; case 101: - test_hmac_sha1(); + test_hmac("sha1", hmac_sha1_tv_template, HMAC_SHA1_TEST_VECTORS); break; case 102: - test_hmac_sha256(); + test_hmac("sha256", hmac_sha256_tv_template, HMAC_SHA256_TEST_VECTORS); break; #endif diff --git a/crypto/tcrypt.h b/crypto/tcrypt.h index d6ef8e717c8a20..8be603f1f72b09 100644 --- a/crypto/tcrypt.h +++ b/crypto/tcrypt.h @@ -1,4 +1,4 @@ -/* +/* * Quick & dirty crypto testing module. * * This will only exist until we have a better testing mechanism @@ -6,66 +6,118 @@ * * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> - * + * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * + * 14 - 09 - 2003 Changes by Kartikey Mahendra Bhatt + * */ #ifndef _CRYPTO_TCRYPT_H #define _CRYPTO_TCRYPT_H -#define MD5_DIGEST_SIZE 16 -#define MD4_DIGEST_SIZE 16 -#define SHA1_DIGEST_SIZE 20 -#define SHA256_DIGEST_SIZE 32 -#define SHA384_DIGEST_SIZE 48 -#define SHA512_DIGEST_SIZE 64 +#define MAX_DIGEST_SIZE 64 +#define MAX_TAP 8 + +#define MAX_KEYLEN 56 +#define MAX_IVLEN 32 + +struct hash_testvec { + char plaintext[128]; + unsigned char psize; + char digest[MAX_DIGEST_SIZE]; + unsigned char np; + unsigned char tap[MAX_TAP]; +}; + +struct hmac_testvec { + char key[128]; + unsigned char ksize; + char plaintext[128]; + unsigned char psize; + char digest[MAX_DIGEST_SIZE]; + unsigned char np; + unsigned char tap[MAX_TAP]; +}; + +struct cipher_testvec { + unsigned char fail; + unsigned char wk; /* weak key flag */ + char key[MAX_KEYLEN]; + unsigned char klen; + char iv[MAX_IVLEN]; + char input[48]; + unsigned char ilen; + char result[48]; + unsigned char rlen; + int np; + unsigned char tap[MAX_TAP]; +}; /* * MD4 test vectors from RFC1320 */ #define MD4_TEST_VECTORS 7 -struct md4_testvec { - char plaintext[128]; - char digest[MD4_DIGEST_SIZE]; -} md4_tv_template[] = { - { "", +struct hash_testvec md4_tv_template [] = { + { + "", + 0, { 0x31, 0xd6, 0xcf, 0xe0, 0xd1, 0x6a, 0xe9, 0x31, - 0xb7, 0x3c, 0x59, 0xd7, 0xe0, 0xc0, 0x89, 0xc0 } - }, - - { "a", + 0xb7, 0x3c, 0x59, 0xd7, 0xe0, 0xc0, 0x89, 0xc0 }, + 0, + {} + }, + { + "a", + 1, { 0xbd, 0xe5, 0x2c, 0xb3, 0x1d, 0xe3, 0x3e, 0x46, - 0x24, 0x5e, 0x05, 0xfb, 0xdb, 0xd6, 0xfb, 0x24 } + 0x24, 0x5e, 0x05, 0xfb, 0xdb, 0xd6, 0xfb, 0x24 }, + 0, + {} }, - - { "abc", + { + "abc", + 3, { 0xa4, 0x48, 0x01, 0x7a, 0xaf, 0x21, 0xd8, 0x52, - 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d } - }, - - { "message digest", + 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d }, + 0, + {} + }, + { + "message digest", + 14, { 0xd9, 0x13, 0x0a, 0x81, 0x64, 0x54, 0x9f, 0xe8, - 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b } - }, - - { "abcdefghijklmnopqrstuvwxyz", + 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b }, + 0, + {} + }, + { + "abcdefghijklmnopqrstuvwxyz", + 26, { 0xd7, 0x9e, 0x1c, 0x30, 0x8a, 0xa5, 0xbb, 0xcd, - 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9 } - }, - - { "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", + 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9 }, + 2, + { 13, 13 }, + }, + { + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", + 62, { 0x04, 0x3f, 0x85, 0x82, 0xf2, 0x41, 0xdb, 0x35, - 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4 } - }, - - { "123456789012345678901234567890123456789012345678901234567890123" + 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4 }, + 0, + {} + }, + { + "123456789012345678901234567890123456789012345678901234567890123" "45678901234567890", + 80, { 0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, - 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36 } + 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36 }, + 0, + {} }, }; @@ -74,40 +126,244 @@ struct md4_testvec { */ #define MD5_TEST_VECTORS 7 -struct md5_testvec { - char plaintext[128]; - char digest[MD5_DIGEST_SIZE]; -} md5_tv_template[] = { - { "", +struct hash_testvec md5_tv_template[] = { + { + "", + 0, { 0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04, - 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e } }, - - { "a", + 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e }, + 0, + {} + }, + { + "a", + 1, { 0x0c, 0xc1, 0x75, 0xb9, 0xc0, 0xf1, 0xb6, 0xa8, - 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61 } }, - - { "abc", + 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61 }, + 0, + {} + }, + { + "abc", + 3, { 0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0, - 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72 } }, - - { "message digest", + 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72 }, + 0, + {} + }, + { + "message digest", + 14, { 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, - 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 } }, - - { "abcdefghijklmnopqrstuvwxyz", + 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }, + 0, + {} + }, + { + "abcdefghijklmnopqrstuvwxyz", + 26, { 0xc3, 0xfc, 0xd3, 0xd7, 0x61, 0x92, 0xe4, 0x00, - 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b } }, - - { "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", + 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b }, + 2, + {13, 13} + }, + { + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", + 62, { 0xd1, 0x74, 0xab, 0x98, 0xd2, 0x77, 0xd9, 0xf5, - 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f } }, - - { "12345678901234567890123456789012345678901234567890123456789012" - "345678901234567890", + 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f }, + 0, + {} + }, + { + "12345678901234567890123456789012345678901234567890123456789012" + "345678901234567890", + 80, { 0x57, 0xed, 0xf4, 0xa2, 0x2b, 0xe3, 0xc9, 0x55, - 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a } } + 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a }, + 0, + {} + } +}; + +/* + * SHA1 test vectors from from FIPS PUB 180-1 + */ +#define SHA1_TEST_VECTORS 2 + +struct hash_testvec sha1_tv_template[] = { + { + "abc", + 3, + { 0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A, 0xBA, 0x3E, + 0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C ,0x9C, 0xD0, 0xD8, 0x9D }, + 0, + {} + }, + { + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 56, + { 0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E ,0xBA, 0xAE, + 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5, 0xE5, 0x46, 0x70, 0xF1 }, + 2, + { 28, 28 } + } +}; + +/* + * SHA256 test vectors from from NIST + */ +#define SHA256_TEST_VECTORS 2 + +struct hash_testvec sha256_tv_template[] = { + { + "abc", + 3, + { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, + 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, + 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, + 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad }, + 0, + {} + }, + { + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 56, + { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, + 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, + 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, + 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 }, + 2, + { 28, 28 } + }, }; +/* + * SHA384 test vectors from from NIST and kerneli + */ +#define SHA384_TEST_VECTORS 4 + +struct hash_testvec sha384_tv_template[] = { + { + "abc", + 3, + { 0xcb, 0x00, 0x75, 0x3f, 0x45, 0xa3, 0x5e, 0x8b, + 0xb5, 0xa0, 0x3d, 0x69, 0x9a, 0xc6, 0x50, 0x07, + 0x27, 0x2c, 0x32, 0xab, 0x0e, 0xde, 0xd1, 0x63, + 0x1a, 0x8b, 0x60, 0x5a, 0x43, 0xff, 0x5b, 0xed, + 0x80, 0x86, 0x07, 0x2b, 0xa1, 0xe7, 0xcc, 0x23, + 0x58, 0xba, 0xec, 0xa1, 0x34, 0xc8, 0x25, 0xa7 }, + 0, + {} + }, + { + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 56, + { 0x33, 0x91, 0xfd, 0xdd, 0xfc, 0x8d, 0xc7, 0x39, + 0x37, 0x07, 0xa6, 0x5b, 0x1b, 0x47, 0x09, 0x39, + 0x7c, 0xf8, 0xb1, 0xd1, 0x62, 0xaf, 0x05, 0xab, + 0xfe, 0x8f, 0x45, 0x0d, 0xe5, 0xf3, 0x6b, 0xc6, + 0xb0, 0x45, 0x5a, 0x85, 0x20, 0xbc, 0x4e, 0x6f, + 0x5f, 0xe9, 0x5b, 0x1f, 0xe3, 0xc8, 0x45, 0x2b}, + 0, + {} + }, + { + "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" + "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", + 112, + { 0x09, 0x33, 0x0c, 0x33, 0xf7, 0x11, 0x47, 0xe8, + 0x3d, 0x19, 0x2f, 0xc7, 0x82, 0xcd, 0x1b, 0x47, + 0x53, 0x11, 0x1b, 0x17, 0x3b, 0x3b, 0x05, 0xd2, + 0x2f, 0xa0, 0x80, 0x86, 0xe3, 0xb0, 0xf7, 0x12, + 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9, + 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 }, + 0, + {} + }, + + { + "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" + "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", + 104, + { 0x3d, 0x20, 0x89, 0x73, 0xab, 0x35, 0x08, 0xdb, + 0xbd, 0x7e, 0x2c, 0x28, 0x62, 0xba, 0x29, 0x0a, + 0xd3, 0x01, 0x0e, 0x49, 0x78, 0xc1, 0x98, 0xdc, + 0x4d, 0x8f, 0xd0, 0x14, 0xe5, 0x82, 0x82, 0x3a, + 0x89, 0xe1, 0x6f, 0x9b, 0x2a, 0x7b, 0xbc, 0x1a, + 0xc9, 0x38, 0xe2, 0xd1, 0x99, 0xe8, 0xbe, 0xa4 }, + 4, + { 26, 26, 26, 26 } + }, +}; + +/* + * SHA512 test vectors from from NIST and kerneli + */ +#define SHA512_TEST_VECTORS 4 + +struct hash_testvec sha512_tv_template[] = { + { + "abc", + 3, + { 0xdd, 0xaf, 0x35, 0xa1, 0x93, 0x61, 0x7a, 0xba, + 0xcc, 0x41, 0x73, 0x49, 0xae, 0x20, 0x41, 0x31, + 0x12, 0xe6, 0xfa, 0x4e, 0x89, 0xa9, 0x7e, 0xa2, + 0x0a, 0x9e, 0xee, 0xe6, 0x4b, 0x55, 0xd3, 0x9a, + 0x21, 0x92, 0x99, 0x2a, 0x27, 0x4f, 0xc1, 0xa8, + 0x36, 0xba, 0x3c, 0x23, 0xa3, 0xfe, 0xeb, 0xbd, + 0x45, 0x4d, 0x44, 0x23, 0x64, 0x3c, 0xe8, 0x0e, + 0x2a, 0x9a, 0xc9, 0x4f, 0xa5, 0x4c, 0xa4, 0x9f }, + 0, + {} + }, + { + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 56, + { 0x20, 0x4a, 0x8f, 0xc6, 0xdd, 0xa8, 0x2f, 0x0a, + 0x0c, 0xed, 0x7b, 0xeb, 0x8e, 0x08, 0xa4, 0x16, + 0x57, 0xc1, 0x6e, 0xf4, 0x68, 0xb2, 0x28, 0xa8, + 0x27, 0x9b, 0xe3, 0x31, 0xa7, 0x03, 0xc3, 0x35, + 0x96, 0xfd, 0x15, 0xc1, 0x3b, 0x1b, 0x07, 0xf9, + 0xaa, 0x1d, 0x3b, 0xea, 0x57, 0x78, 0x9c, 0xa0, + 0x31, 0xad, 0x85, 0xc7, 0xa7, 0x1d, 0xd7, 0x03, + 0x54, 0xec, 0x63, 0x12, 0x38, 0xca, 0x34, 0x45 }, + 0, + {} + }, + { + "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" + "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", + 112, + { 0x8e, 0x95, 0x9b, 0x75, 0xda, 0xe3, 0x13, 0xda, + 0x8c, 0xf4, 0xf7, 0x28, 0x14, 0xfc, 0x14, 0x3f, + 0x8f, 0x77, 0x79, 0xc6, 0xeb, 0x9f, 0x7f, 0xa1, + 0x72, 0x99, 0xae, 0xad, 0xb6, 0x88, 0x90, 0x18, + 0x50, 0x1d, 0x28, 0x9e, 0x49, 0x00, 0xf7, 0xe4, + 0x33, 0x1b, 0x99, 0xde, 0xc4, 0xb5, 0x43, 0x3a, + 0xc7, 0xd3, 0x29, 0xee, 0xb6, 0xdd, 0x26, 0x54, + 0x5e, 0x96, 0xe5, 0x5b, 0x87, 0x4b, 0xe9, 0x09 }, + 0, + {} + }, + { + "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" + "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", + 104, + { 0x93, 0x0d, 0x0c, 0xef, 0xcb, 0x30, 0xff, 0x11, + 0x33, 0xb6, 0x89, 0x81, 0x21, 0xf1, 0xcf, 0x3d, + 0x27, 0x57, 0x8a, 0xfc, 0xaf, 0xe8, 0x67, 0x7c, + 0x52, 0x57, 0xcf, 0x06, 0x99, 0x11, 0xf7, 0x5d, + 0x8f, 0x58, 0x31, 0xb5, 0x6e, 0xbf, 0xda, 0x67, + 0xb2, 0x78, 0xe6, 0x6d, 0xff, 0x8b, 0x84, 0xfe, + 0x2b, 0x28, 0x70, 0xf7, 0x42, 0xa5, 0x80, 0xd8, + 0xed, 0xb4, 0x19, 0x87, 0x23, 0x28, 0x50, 0xc9 }, + 4, + { 26, 26, 26, 26 } + }, +}; + + #ifdef CONFIG_CRYPTO_HMAC /* * HMAC-MD5 test vectors from RFC2202 @@ -115,76 +371,71 @@ struct md5_testvec { */ #define HMAC_MD5_TEST_VECTORS 7 -struct hmac_md5_testvec { - char key[128]; - char plaintext[128]; - char digest[MD5_DIGEST_SIZE]; -}; - -struct hmac_md5_testvec hmac_md5_tv_template[] = -{ - +struct hmac_testvec hmac_md5_tv_template[] = +{ { { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, - 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x00}, - + 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }, + 16, "Hi There", - + 8, { 0x92, 0x94, 0x72, 0x7a, 0x36, 0x38, 0xbb, 0x1c, - 0x13, 0xf4, 0x8e, 0xf8, 0x15, 0x8b, 0xfc, 0x9d } - }, - + 0x13, 0xf4, 0x8e, 0xf8, 0x15, 0x8b, 0xfc, 0x9d }, + 0, + {} + }, { - { 'J', 'e', 'f', 'e', 0 }, - + { 'J', 'e', 'f', 'e' }, + 4, "what do ya want for nothing?", - + 28, { 0x75, 0x0c, 0x78, 0x3e, 0x6a, 0xb0, 0xb5, 0x03, - 0xea, 0xa8, 0x6e, 0x31, 0x0a, 0x5d, 0xb7, 0x38 } - }, - + 0xea, 0xa8, 0x6e, 0x31, 0x0a, 0x5d, 0xb7, 0x38 }, + 2, + {14, 14} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 16, { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, - 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, - 0x00 }, - + 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, }, + 50, { 0x56, 0xbe, 0x34, 0x52, 0x1d, 0x14, 0x4c, 0x88, - 0xdb, 0xb8, 0xc7, 0x33, 0xf0, 0xe8, 0xb3, 0xf6 } - }, - + 0xdb, 0xb8, 0xc7, 0x33, 0xf0, 0xe8, 0xb3, 0xf6 }, + 0, + {} + }, { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, - 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x00 }, - - { + 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, }, + 25, + { 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0x00 }, - + 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, }, + 50, { 0x69, 0x7e, 0xaf, 0x0a, 0xca, 0x3a, 0x3a, 0xea, - 0x3a, 0x75, 0x16, 0x47, 0x46, 0xff, 0xaa, 0x79 } - }, - + 0x3a, 0x75, 0x16, 0x47, 0x46, 0xff, 0xaa, 0x79 }, + 0, + {} + }, { { 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, - 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x00 }, - + 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c }, + 16, "Test With Truncation", - + 20, { 0x56, 0x46, 0x1e, 0xf2, 0x34, 0x2e, 0xdc, 0x00, - 0xf9, 0xba, 0xb9, 0x95, 0x69, 0x0e, 0xfd, 0x4c } - }, - + 0xf9, 0xba, 0xb9, 0x95, 0x69, 0x0e, 0xfd, 0x4c }, + 0, + {} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -193,15 +444,15 @@ struct hmac_md5_testvec hmac_md5_tv_template[] = 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, }, + 80, "Test Using Larger Than Block-Size Key - Hash Key First", - + 54, { 0x6b, 0x1a, 0xb7, 0xfe, 0x4b, 0xd7, 0xbf, 0x8f, - 0x0b, 0x62, 0xe6, 0xce, 0x61, 0xb9, 0xd0, 0xcd } - }, - + 0x0b, 0x62, 0xe6, 0xce, 0x61, 0xb9, 0xd0, 0xcd }, + 0, + {} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -210,27 +461,16 @@ struct hmac_md5_testvec hmac_md5_tv_template[] = 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 80, "Test Using Larger Than Block-Size Key and Larger Than One " "Block-Size Data", - + 73, { 0x6f, 0x63, 0x0f, 0xad, 0x67, 0xcd, 0xa0, 0xee, - 0x1f, 0xb1, 0xf5, 0x62, 0xdb, 0x3a, 0xa5, 0x3e } - }, - - /* cross page test, need to retain key */ - - { - { 'J', 'e', 'f', 'e', 0 }, - - "what do ya want for nothing?", - - { 0x75, 0x0c, 0x78, 0x3e, 0x6a, 0xb0, 0xb5, 0x03, - 0xea, 0xa8, 0x6e, 0x31, 0x0a, 0x5d, 0xb7, 0x38 } - }, - + 0x1f, 0xb1, 0xf5, 0x62, 0xdb, 0x3a, 0xa5, 0x3e }, + 0, + {} + }, }; @@ -240,82 +480,71 @@ struct hmac_md5_testvec hmac_md5_tv_template[] = #define HMAC_SHA1_TEST_VECTORS 7 -struct hmac_sha1_testvec { - char key[128]; - char plaintext[128]; - char digest[SHA1_DIGEST_SIZE]; -} hmac_sha1_tv_template[] = { - +struct hmac_testvec hmac_sha1_tv_template[] = { { { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, - 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, - 0x00}, - + 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }, + 20, "Hi There", - + 8, { 0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64, 0xe2, 0x8b, 0xc0, 0xb6, 0xfb ,0x37, 0x8c, 0x8e, 0xf1, - 0x46, 0xbe, 0x00 } - }, - + 0x46, 0xbe }, + 0, + {} + }, { - { 'J', 'e', 'f', 'e', 0 }, - + { 'J', 'e', 'f', 'e' }, + 4, "what do ya want for nothing?", - + 28, { 0xef, 0xfc, 0xdf, 0x6a, 0xe5, 0xeb, 0x2f, 0xa2, 0xd2, 0x74, - 0x16, 0xd5, 0xf1, 0x84, 0xdf, 0x9c, 0x25, 0x9a, 0x7c, 0x79 } - - }, - + 0x16, 0xd5, 0xf1, 0x84, 0xdf, 0x9c, 0x25, 0x9a, 0x7c, 0x79 }, + 2, + { 14, 14 } + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0x00}, - - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 20, { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, - 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, - 0x00 }, - + 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, }, + 50, { 0x12, 0x5d, 0x73, 0x42, 0xb9, 0xac, 0x11, 0xcd, 0x91, 0xa3, - 0x9a, 0xf4, 0x8a, 0xa1, 0x7b, 0x4f, 0x63, 0xf1, 0x75, 0xd3 } - - }, - + 0x9a, 0xf4, 0x8a, 0xa1, 0x7b, 0x4f, 0x63, 0xf1, 0x75, 0xd3 }, + 0, + {} + }, { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, - 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x00 }, - - { - 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, + 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19 }, + 25, + { 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0x00 }, - + 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd }, + 50, { 0x4c, 0x90, 0x07, 0xf4, 0x02, 0x62, 0x50, 0xc6, 0xbc, 0x84, - 0x14, 0xf9, 0xbf, 0x50, 0xc8, 0x6c, 0x2d, 0x72, 0x35, 0xda } - - }, - + 0x14, 0xf9, 0xbf, 0x50, 0xc8, 0x6c, 0x2d, 0x72, 0x35, 0xda }, + 0, + {} + }, { { 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, - 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, - 0x00 }, - + 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c }, + 20, "Test With Truncation", - + 20, { 0x4c, 0x1a, 0x03, 0x42, 0x4b, 0x55, 0xe0, 0x7f, 0xe7, 0xf2, - 0x7b, 0xe1, 0xd5, 0x8b, 0xb9, 0x32, 0x4a, 0x9a, 0x5a, 0x04 } - - }, - + 0x7b, 0xe1, 0xd5, 0x8b, 0xb9, 0x32, 0x4a, 0x9a, 0x5a, 0x04 }, + 0, + {} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -324,16 +553,15 @@ struct hmac_sha1_testvec { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 80, "Test Using Larger Than Block-Size Key - Hash Key First", - + 54, { 0xaa, 0x4a, 0xe5, 0xe1, 0x52, 0x72, 0xd0, 0x0e, 0x95, 0x70, - 0x56, 0x37, 0xce, 0x8a, 0x3b, 0x55, 0xed, 0x40, 0x21, 0x12 } - - }, - + 0x56, 0x37, 0xce, 0x8a, 0x3b, 0x55, 0xed, 0x40, 0x21, 0x12 }, + 0, + {} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -342,27 +570,16 @@ struct hmac_sha1_testvec { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 80, "Test Using Larger Than Block-Size Key and Larger Than One " "Block-Size Data", - + 73, { 0xe8, 0xe9, 0x9d, 0x0f, 0x45, 0x23, 0x7d, 0x78, 0x6d, 0x6b, - 0xba, 0xa7, 0x96, 0x5c, 0x78, 0x08, 0xbb, 0xff, 0x1a, 0x91 } - }, - - /* cross page test */ - { - { 'J', 'e', 'f', 'e', 0 }, - - "what do ya want for nothing?", - - { 0xef, 0xfc, 0xdf, 0x6a, 0xe5, 0xeb, 0x2f, 0xa2, 0xd2, 0x74, - 0x16, 0xd5, 0xf1, 0x84, 0xdf, 0x9c, 0x25, 0x9a, 0x7c, 0x79 } - + 0xba, 0xa7, 0x96, 0x5c, 0x78, 0x08, 0xbb, 0xff, 0x1a, 0x91 }, + 0, + {} }, - }; /* @@ -371,137 +588,139 @@ struct hmac_sha1_testvec { */ #define HMAC_SHA256_TEST_VECTORS 10 -struct hmac_sha256_testvec { - char key[128]; - char plaintext[128]; - char digest[SHA256_DIGEST_SIZE]; -} hmac_sha256_tv_template[] = { +struct hmac_testvec hmac_sha256_tv_template[] = { { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, - 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x00 }, - - - { "abc" }, - + 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20}, + 32, + "abc", + 3, { 0xa2, 0x1b, 0x1f, 0x5d, 0x4c, 0xf4, 0xf7, 0x3a, 0x4d, 0xd9, 0x39, 0x75, 0x0f, 0x7a, 0x06, 0x6a, 0x7f, 0x98, 0xcc, 0x13, 0x1c, 0xb1, 0x6a, 0x66, 0x92, 0x75, 0x90, 0x21, 0xcf, 0xab, 0x81, 0x81 }, - - }, - + 0, + {} + }, { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, - 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x00 }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" }, - + 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }, + 32, + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 56, { 0x10, 0x4f, 0xdc, 0x12, 0x57, 0x32, 0x8f, 0x08, 0x18, 0x4b, 0xa7, 0x31, 0x31, 0xc5, 0x3c, 0xae, 0xe6, 0x98, 0xe3, 0x61, 0x19, 0x42, 0x11, 0x49, - 0xea, 0x8c, 0x71, 0x24, 0x56, 0x69, 0x7d, 0x30 } + 0xea, 0x8c, 0x71, 0x24, 0x56, 0x69, 0x7d, 0x30 }, + 0, + {} }, - { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, - 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x00 }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" - "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" }, - + 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }, + 32, + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" + "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", + 112, { 0x47, 0x03, 0x05, 0xfc, 0x7e, 0x40, 0xfe, 0x34, 0xd3, 0xee, 0xb3, 0xe7, 0x73, 0xd9, 0x5a, 0xab, 0x73, 0xac, 0xf0, 0xfd, 0x06, 0x04, 0x47, 0xa5, - 0xeb, 0x45, 0x95, 0xbf, 0x33, 0xa9, 0xd1, 0xa3 } + 0xeb, 0x45, 0x95, 0xbf, 0x33, 0xa9, 0xd1, 0xa3 }, + 0, + {} }, - { { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, - 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x00 }, - - { "Hi There" }, - + 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }, + 32, + "Hi There", + 8, { 0x19, 0x8a, 0x60, 0x7e, 0xb4, 0x4b, 0xfb, 0xc6, 0x99, 0x03, 0xa0, 0xf1, 0xcf, 0x2b, 0xbd, 0xc5, 0xba, 0x0a, 0xa3, 0xf3, 0xd9, 0xae, 0x3c, 0x1c, - 0x7a, 0x3b, 0x16, 0x96, 0xa0, 0xb6, 0x8c, 0xf7 } + 0x7a, 0x3b, 0x16, 0x96, 0xa0, 0xb6, 0x8c, 0xf7 }, + 0, + {} }, - { - { "Jefe" }, - - { "what do ya want for nothing?" }, - + "Jefe", + 4, + "what do ya want for nothing?", + 28, { 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e, 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7, 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83, - 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43 } + 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43 }, + 2, + { 14, 14 } }, - { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x00 }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 32, { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, - 0xdd, 0xdd, 0x00 }, - + 0xdd, 0xdd }, + 50, { 0xcd, 0xcb, 0x12, 0x20, 0xd1, 0xec, 0xcc, 0xea, 0x91, 0xe5, 0x3a, 0xba, 0x30, 0x92, 0xf9, 0x62, 0xe5, 0x49, 0xfe, 0x6c, 0xe9, 0xed, 0x7f, 0xdc, - 0x43, 0x19, 0x1f, 0xbd, 0xe4, 0x5c, 0x30, 0xb0 } + 0x43, 0x19, 0x1f, 0xbd, 0xe4, 0x5c, 0x30, 0xb0 }, + 0, + {} }, - { { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, - 0x21, 0x22, 0x23, 0x24, 0x25, 0x00 }, - + 0x21, 0x22, 0x23, 0x24, 0x25 }, + 37, { 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, - 0xcd, 0xcd, 0x00 }, - + 0xcd, 0xcd }, + 50, { 0xd4, 0x63, 0x3c, 0x17, 0xf6, 0xfb, 0x8d, 0x74, 0x4c, 0x66, 0xde, 0xe0, 0xf8, 0xf0, 0x74, 0x55, 0x6e, 0xc4, 0xaf, 0x55, 0xef, 0x07, 0x99, 0x85, - 0x41, 0x46, 0x8e, 0xb4, 0x9b, 0xd2, 0xe9, 0x17 } + 0x41, 0x46, 0x8e, 0xb4, 0x9b, 0xd2, 0xe9, 0x17 }, + 0, + {} }, - { { 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, - 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x00 }, - - { "Test With Truncation" }, - + 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c }, + 32, + "Test With Truncation", + 20, { 0x75, 0x46, 0xaf, 0x01, 0x84, 0x1f, 0xc0, 0x9b, 0x1a, 0xb9, 0xc3, 0x74, 0x9a, 0x5f, 0x1c, 0x17, 0xd4, 0xf5, 0x89, 0x66, 0x8a, 0x58, 0x7b, 0x27, - 0x00, 0xa9, 0xc9, 0x7c, 0x11, 0x93, 0xcf, 0x42 } - }, - + 0x00, 0xa9, 0xc9, 0x7c, 0x11, 0x93, 0xcf, 0x42 }, + 0, + {} + }, { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -512,16 +731,17 @@ struct hmac_sha256_testvec { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x00 }, - - { "Test Using Larger Than Block-Size Key - Hash Key First" }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 80, + "Test Using Larger Than Block-Size Key - Hash Key First", + 54, { 0x69, 0x53, 0x02, 0x5e, 0xd9, 0x6f, 0x0c, 0x09, 0xf8, 0x0a, 0x96, 0xf7, 0x8e, 0x65, 0x38, 0xdb, 0xe2, 0xe7, 0xb8, 0x20, 0xe3, 0xdd, 0x97, 0x0e, - 0x7d, 0xdd, 0x39, 0x09, 0x1b, 0x32, 0x35, 0x2f } + 0x7d, 0xdd, 0x39, 0x09, 0x1b, 0x32, 0x35, 0x2f }, + 0, + {} }, - { { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, @@ -532,15 +752,17 @@ struct hmac_sha256_testvec { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, - 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x00 }, - - { "Test Using Larger Than Block-Size Key and Larger Than " - "One Block-Size Data" }, - + 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa }, + 80, + "Test Using Larger Than Block-Size Key and Larger Than " + "One Block-Size Data", + 73, { 0x63, 0x55, 0xac, 0x22, 0xe8, 0x90, 0xd0, 0xa3, 0xc8, 0x48, 0x1a, 0x5c, 0xa4, 0x82, 0x5b, 0xc8, 0x84, 0xd3, 0xe7, 0xa1, 0xff, 0x98, 0xa2, 0xfc, - 0x2a, 0xc7, 0xd8, 0xe0, 0x64, 0xc3, 0xb2, 0xe6 } + 0x2a, 0xc7, 0xd8, 0xe0, 0x64, 0xc3, 0xb2, 0xe6 }, + 0, + {} }, }; @@ -548,537 +770,473 @@ struct hmac_sha256_testvec { #endif /* CONFIG_CRYPTO_HMAC */ /* - * SHA1 test vectors from from FIPS PUB 180-1 - */ -#define SHA1_TEST_VECTORS 2 - -struct sha1_testvec { - char plaintext[128]; - char digest[SHA1_DIGEST_SIZE]; -} sha1_tv_template[] = { - { "abc", - { 0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A, 0xBA, 0x3E, - 0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C ,0x9C, 0xD0, 0xD8, 0x9D } - }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", - - { 0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E ,0xBA, 0xAE, - 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5, 0xE5, 0x46, 0x70, 0xF1 } - } -}; - -/* - * SHA256 test vectors from from NIST - */ -#define SHA256_TEST_VECTORS 2 - -struct sha256_testvec { - char plaintext[128]; - char digest[SHA256_DIGEST_SIZE]; -} sha256_tv_template[] = { - { "abc", - { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, - 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, - 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, - 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad } - }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", - { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, - 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, - 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, - 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 } - }, -}; - -/* - * SHA384 test vectors from from NIST and kerneli - */ -#define SHA384_TEST_VECTORS 4 - -struct sha384_testvec { - char plaintext[128]; - char digest[SHA384_DIGEST_SIZE]; -} sha384_tv_template[] = { - - { "abc", - { 0xcb, 0x00, 0x75, 0x3f, 0x45, 0xa3, 0x5e, 0x8b, - 0xb5, 0xa0, 0x3d, 0x69, 0x9a, 0xc6, 0x50, 0x07, - 0x27, 0x2c, 0x32, 0xab, 0x0e, 0xde, 0xd1, 0x63, - 0x1a, 0x8b, 0x60, 0x5a, 0x43, 0xff, 0x5b, 0xed, - 0x80, 0x86, 0x07, 0x2b, 0xa1, 0xe7, 0xcc, 0x23, - 0x58, 0xba, 0xec, 0xa1, 0x34, 0xc8, 0x25, 0xa7 } - }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", - { 0x33, 0x91, 0xfd, 0xdd, 0xfc, 0x8d, 0xc7, 0x39, - 0x37, 0x07, 0xa6, 0x5b, 0x1b, 0x47, 0x09, 0x39, - 0x7c, 0xf8, 0xb1, 0xd1, 0x62, 0xaf, 0x05, 0xab, - 0xfe, 0x8f, 0x45, 0x0d, 0xe5, 0xf3, 0x6b, 0xc6, - 0xb0, 0x45, 0x5a, 0x85, 0x20, 0xbc, 0x4e, 0x6f, - 0x5f, 0xe9, 0x5b, 0x1f, 0xe3, 0xc8, 0x45, 0x2b } - }, - - { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" - "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", - { 0x09, 0x33, 0x0c, 0x33, 0xf7, 0x11, 0x47, 0xe8, - 0x3d, 0x19, 0x2f, 0xc7, 0x82, 0xcd, 0x1b, 0x47, - 0x53, 0x11, 0x1b, 0x17, 0x3b, 0x3b, 0x05, 0xd2, - 0x2f, 0xa0, 0x80, 0x86, 0xe3, 0xb0, 0xf7, 0x12, - 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9, - 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 } - }, - - { "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" - "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", - { 0x3d, 0x20, 0x89, 0x73, 0xab, 0x35, 0x08, 0xdb, - 0xbd, 0x7e, 0x2c, 0x28, 0x62, 0xba, 0x29, 0x0a, - 0xd3, 0x01, 0x0e, 0x49, 0x78, 0xc1, 0x98, 0xdc, - 0x4d, 0x8f, 0xd0, 0x14, 0xe5, 0x82, 0x82, 0x3a, - 0x89, 0xe1, 0x6f, 0x9b, 0x2a, 0x7b, 0xbc, 0x1a, - 0xc9, 0x38, 0xe2, 0xd1, 0x99, 0xe8, 0xbe, 0xa4 } - }, -}; - -/* - * SHA512 test vectors from from NIST and kerneli - */ -#define SHA512_TEST_VECTORS 4 - -struct sha512_testvec { - char plaintext[128]; - char digest[SHA512_DIGEST_SIZE]; -} sha512_tv_template[] = { - - { "abc", - { 0xdd, 0xaf, 0x35, 0xa1, 0x93, 0x61, 0x7a, 0xba, - 0xcc, 0x41, 0x73, 0x49, 0xae, 0x20, 0x41, 0x31, - 0x12, 0xe6, 0xfa, 0x4e, 0x89, 0xa9, 0x7e, 0xa2, - 0x0a, 0x9e, 0xee, 0xe6, 0x4b, 0x55, 0xd3, 0x9a, - 0x21, 0x92, 0x99, 0x2a, 0x27, 0x4f, 0xc1, 0xa8, - 0x36, 0xba, 0x3c, 0x23, 0xa3, 0xfe, 0xeb, 0xbd, - 0x45, 0x4d, 0x44, 0x23, 0x64, 0x3c, 0xe8, 0x0e, - 0x2a, 0x9a, 0xc9, 0x4f, 0xa5, 0x4c, 0xa4, 0x9f } - }, - - { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", - { 0x20, 0x4a, 0x8f, 0xc6, 0xdd, 0xa8, 0x2f, 0x0a, - 0x0c, 0xed, 0x7b, 0xeb, 0x8e, 0x08, 0xa4, 0x16, - 0x57, 0xc1, 0x6e, 0xf4, 0x68, 0xb2, 0x28, 0xa8, - 0x27, 0x9b, 0xe3, 0x31, 0xa7, 0x03, 0xc3, 0x35, - 0x96, 0xfd, 0x15, 0xc1, 0x3b, 0x1b, 0x07, 0xf9, - 0xaa, 0x1d, 0x3b, 0xea, 0x57, 0x78, 0x9c, 0xa0, - 0x31, 0xad, 0x85, 0xc7, 0xa7, 0x1d, 0xd7, 0x03, - 0x54, 0xec, 0x63, 0x12, 0x38, 0xca, 0x34, 0x45 } - }, - - { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" - "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", - { 0x8e, 0x95, 0x9b, 0x75, 0xda, 0xe3, 0x13, 0xda, - 0x8c, 0xf4, 0xf7, 0x28, 0x14, 0xfc, 0x14, 0x3f, - 0x8f, 0x77, 0x79, 0xc6, 0xeb, 0x9f, 0x7f, 0xa1, - 0x72, 0x99, 0xae, 0xad, 0xb6, 0x88, 0x90, 0x18, - 0x50, 0x1d, 0x28, 0x9e, 0x49, 0x00, 0xf7, 0xe4, - 0x33, 0x1b, 0x99, 0xde, 0xc4, 0xb5, 0x43, 0x3a, - 0xc7, 0xd3, 0x29, 0xee, 0xb6, 0xdd, 0x26, 0x54, - 0x5e, 0x96, 0xe5, 0x5b, 0x87, 0x4b, 0xe9, 0x09 } - }, - - { "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" - "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", - { 0x93, 0x0d, 0x0c, 0xef, 0xcb, 0x30, 0xff, 0x11, - 0x33, 0xb6, 0x89, 0x81, 0x21, 0xf1, 0xcf, 0x3d, - 0x27, 0x57, 0x8a, 0xfc, 0xaf, 0xe8, 0x67, 0x7c, - 0x52, 0x57, 0xcf, 0x06, 0x99, 0x11, 0xf7, 0x5d, - 0x8f, 0x58, 0x31, 0xb5, 0x6e, 0xbf, 0xda, 0x67, - 0xb2, 0x78, 0xe6, 0x6d, 0xff, 0x8b, 0x84, 0xfe, - 0x2b, 0x28, 0x70, 0xf7, 0x42, 0xa5, 0x80, 0xd8, - 0xed, 0xb4, 0x19, 0x87, 0x23, 0x28, 0x50, 0xc9 - } - }, -}; - -/* * DES test vectors. */ -#define DES_ENC_TEST_VECTORS 5 -#define DES_DEC_TEST_VECTORS 2 -#define DES_CBC_ENC_TEST_VECTORS 4 -#define DES_CBC_DEC_TEST_VECTORS 3 +#define DES_ENC_TEST_VECTORS 10 +#define DES_DEC_TEST_VECTORS 4 +#define DES_CBC_ENC_TEST_VECTORS 5 +#define DES_CBC_DEC_TEST_VECTORS 4 #define DES3_EDE_ENC_TEST_VECTORS 3 #define DES3_EDE_DEC_TEST_VECTORS 3 -struct des_tv { - unsigned int len; - int fail; - char key[24]; - char iv[8]; - char plaintext[128]; - char result[128]; -}; - -struct des_tv des_enc_tv_template[] = { - +struct cipher_testvec des_enc_tv_template[] = { /* From Applied Cryptography */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0 }, + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, - { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d } + 8, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, + 8, + 0, + {} }, - /* Same key, different plaintext block */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0 }, + 8, + {}, { 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, - { 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b } - }, - + 8, + { 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, + 8, + 0, + {} + }, /* Sbox test from NBS */ { - 8, 0, - + 0, + 0, { 0x7C, 0xA1, 0x10, 0x45, 0x4A, 0x1A, 0x6E, 0x57 }, - { 0 }, + 8, + {}, { 0x01, 0xA1, 0xD6, 0xD0, 0x39, 0x77, 0x67, 0x42 }, - { 0x69, 0x0F, 0x5B, 0x0D, 0x9A, 0x26, 0x93, 0x9B } - }, - + 8, + { 0x69, 0x0F, 0x5B, 0x0D, 0x9A, 0x26, 0x93, 0x9B }, + 8, + 0, + {} + }, /* Three blocks */ { - 24, 0, - - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - - { 0 }, - + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef }, - + 24, { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, - 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90 }, - }, - + 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90 }, + 24, + 0, + {} + }, /* Weak key */ { - 8, 1, - + 1, + 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 }, - { 0 }, + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, - { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d } - }, - + 8, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, + 8, + 0, + {} + }, /* Two blocks -- for testing encryption across pages */ { - 16, 0, - - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - - { 0 }, - + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, - - { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, - 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b } - }, - - /* Two blocks -- for testing decryption across pages */ - { - 16, 0, - - - { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - - { 0 }, - + 16, { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, - - { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, - 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, + 16, + 2, + { 8, 8 } }, - /* Four blocks -- for testing encryption with chunking */ { - 24, 0, - - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - - { 0 }, - + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, - + 32, { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90, 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, + 32, + 3, + { 14, 10, 8 } + }, + { + 0, + 0, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + {}, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, + 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, + 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef }, + 24, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, + 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, + 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90 }, + 24, + 4, + { 2, 1, 3, 18 } + }, + { + 0, + 0, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + {}, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, + 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, + 16, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, + 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, + 16, + 5, + { 2, 2, 2, 2, 8 } + }, + { + 0, + 0, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + {}, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, + 8, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, + 8, + 8, + { 1, 1, 1, 1, 1, 1, 1, 1 } }, }; -struct des_tv des_dec_tv_template[] = { - +struct cipher_testvec des_dec_tv_template[] = { /* From Applied Cryptography */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0 }, + 8, + {}, { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, + 8, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, - }, - + 8, + 0, + {} + }, /* Sbox test from NBS */ { - 8, 0, - - { 0x7C, 0xA1, 0x10, 0x45, 0x4A, 0x1A, 0x6E, 0x57 }, - { 0 }, + 0, + 0, + { 0x7C, 0xA1, 0x10, 0x45, 0x4A, 0x1A, 0x6E, 0x57 }, + 8, + {}, { 0x69, 0x0F, 0x5B, 0x0D, 0x9A, 0x26, 0x93, 0x9B }, - { 0x01, 0xA1, 0xD6, 0xD0, 0x39, 0x77, 0x67, 0x42 } - }, - + 8, + { 0x01, 0xA1, 0xD6, 0xD0, 0x39, 0x77, 0x67, 0x42 }, + 8, + 0, + {} + }, /* Two blocks, for chunking test */ { - 16, 0, - + 0, + 0, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + {}, + { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, + 0x69, 0x0F, 0x5B, 0x0D, 0x9A, 0x26, 0x93, 0x9B }, + 16, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, + 0xa3, 0x99, 0x7b, 0xca, 0xaf, 0x69, 0xa0, 0xf5 }, + 16, + 2, + { 8, 8 } + }, + { + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0 }, - + 8, + {}, { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, 0x69, 0x0F, 0x5B, 0x0D, 0x9A, 0x26, 0x93, 0x9B }, - + 16, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, - 0xa3, 0x99, 0x7b, 0xca, 0xaf, 0x69, 0xa0, 0xf5 } + 0xa3, 0x99, 0x7b, 0xca, 0xaf, 0x69, 0xa0, 0xf5 }, + 16, + 3, + { 3, 12, 1 } }, + }; -struct des_tv des_cbc_enc_tv_template[] = { +struct cipher_testvec des_cbc_enc_tv_template[] = { /* From OpenSSL */ { - 24, 0, - + 0, + 0, {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}, - {0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, - + 8, + {0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, 0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, - 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20, - 0x66, 0x6F, 0x72, 0x20, 0x00, 0x31, 0x00, 0x00 }, - + 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20 }, + 24, { 0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4, 0xac, 0xd8, 0xae, 0xfd, 0xdf, 0xd8, 0xa1, 0xeb, - 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68, - 0x1d, 0x26, 0x93, 0x97, 0xf7, 0xfe, 0x62, 0xb4 } + 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68 }, + 24, + 0, + {} }, - /* FIPS Pub 81 */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef }, + 8, + { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef }, { 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74 }, + 8, { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, - - }, - + 8, + 0, + {} + }, { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, { 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, + 8, { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, - }, - + 8, + 0, + {} + }, { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, + 8, { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, - }, - - /* Copy of openssl vector for chunk testing */ - + 8, + 0, + {} + }, + /* Copy of openssl vector for chunk testing */ /* From OpenSSL */ { - 24, 0, - + 0, + 0, {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}, - {0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, - + 8, + {0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, 0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, - 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20, - 0x66, 0x6F, 0x72, 0x20, 0x00, 0x31, 0x00, 0x00 }, - + 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20 }, + 24, { 0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4, 0xac, 0xd8, 0xae, 0xfd, 0xdf, 0xd8, 0xa1, 0xeb, - 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68, - 0x1d, 0x26, 0x93, 0x97, 0xf7, 0xfe, 0x62, 0xb4 } - }, - - + 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68 }, + 24, + 2, + { 13, 11 } + }, }; -struct des_tv des_cbc_dec_tv_template[] = { - +struct cipher_testvec des_cbc_dec_tv_template[] = { /* FIPS Pub 81 */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef }, { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, + 8, { 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74 }, - }, - + 8, + 0, + {} + }, { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, + 8, + { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, + 8, { 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, - }, - + 8, + 0, + {} + }, { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, + 8, { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, - }, - - /* Copy of above, for chunk testing */ - + 8, + 0, + {} + }, + /* Copy of above, for chunk testing */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, + 8, { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, + 8, + 2, + { 4, 4 } }, }; /* * We really need some more test vectors, especially for DES3 CBC. */ -struct des_tv des3_ede_enc_tv_template[] = { - +struct cipher_testvec des3_ede_enc_tv_template[] = { /* These are from openssl */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10}, - - { 0 }, - - { 0x73, 0x6F, 0x6D, 0x65, 0x64, 0x61, 0x74, 0x61 }, - + 24, + {}, + { 0x73, 0x6F, 0x6D, 0x65, 0x64, 0x61, 0x74, 0x61 }, + 8, { 0x18, 0xd7, 0x48, 0xe5, 0x63, 0x62, 0x05, 0x72 }, + 8, + 0, + {} }, - { - 8, 0, - + 0, + 0, { 0x03,0x52,0x02,0x07,0x67,0x20,0x82,0x17, 0x86,0x02,0x87,0x66,0x59,0x08,0x21,0x98, - 0x64,0x05,0x6A,0xBD,0xFE,0xA9,0x34,0x57 }, - - { 0 }, - - { 0x73,0x71,0x75,0x69,0x67,0x67,0x6C,0x65 }, - - { 0xc0,0x7d,0x2a,0x0f,0xa5,0x66,0xfa,0x30 } + 0x64,0x05,0x6A,0xBD,0xFE,0xA9,0x34,0x57 }, + 24, + {}, + { 0x73,0x71,0x75,0x69,0x67,0x67,0x6C,0x65 }, + 8, + { 0xc0,0x7d,0x2a,0x0f,0xa5,0x66,0xfa,0x30 }, + 8, + 0, + {} }, - - { - 8, 0, - + 0, + 0, { 0x10,0x46,0x10,0x34,0x89,0x98,0x80,0x20, 0x91,0x07,0xD0,0x15,0x89,0x19,0x01,0x01, - 0x19,0x07,0x92,0x10,0x98,0x1A,0x01,0x01 }, - - { 0 }, - - { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }, - - { 0xe1,0xef,0x62,0xc3,0x32,0xfe,0x82,0x5b } + 0x19,0x07,0x92,0x10,0x98,0x1A,0x01,0x01 }, + 24, + {}, + { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }, + 8, + { 0xe1,0xef,0x62,0xc3,0x32,0xfe,0x82,0x5b }, + 8, + 0, + {} }, }; -struct des_tv des3_ede_dec_tv_template[] = { - +struct cipher_testvec des3_ede_dec_tv_template[] = { /* These are from openssl */ { - 8, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10}, - - { 0 }, - - + 24, + {}, { 0x18, 0xd7, 0x48, 0xe5, 0x63, 0x62, 0x05, 0x72 }, - - { 0x73, 0x6F, 0x6D, 0x65, 0x64, 0x61, 0x74, 0x61 }, - }, - + 8, + { 0x73, 0x6F, 0x6D, 0x65, 0x64, 0x61, 0x74, 0x61 }, + 8, + 0, + {} + }, { - 8, 0, - + 0, + 0, { 0x03,0x52,0x02,0x07,0x67,0x20,0x82,0x17, 0x86,0x02,0x87,0x66,0x59,0x08,0x21,0x98, - 0x64,0x05,0x6A,0xBD,0xFE,0xA9,0x34,0x57 }, - - { 0 }, - - { 0xc0,0x7d,0x2a,0x0f,0xa5,0x66,0xfa,0x30 }, - - { 0x73,0x71,0x75,0x69,0x67,0x67,0x6C,0x65 }, - + 0x64,0x05,0x6A,0xBD,0xFE,0xA9,0x34,0x57 }, + 24, + {}, + { 0xc0,0x7d,0x2a,0x0f,0xa5,0x66,0xfa,0x30 }, + 8, + { 0x73,0x71,0x75,0x69,0x67,0x67,0x6C,0x65 }, + 8, + 0, + {} }, - - { - 8, 0, - + 0, + 0, { 0x10,0x46,0x10,0x34,0x89,0x98,0x80,0x20, 0x91,0x07,0xD0,0x15,0x89,0x19,0x01,0x01, - 0x19,0x07,0x92,0x10,0x98,0x1A,0x01,0x01 }, - - { 0 }, - - { 0xe1,0xef,0x62,0xc3,0x32,0xfe,0x82,0x5b }, - - { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }, + 0x19,0x07,0x92,0x10,0x98,0x1A,0x01,0x01 }, + 24, + {}, + { 0xe1,0xef,0x62,0xc3,0x32,0xfe,0x82,0x5b }, + 8, + { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 }, + 8, + 0, + {} }, }; @@ -1090,68 +1248,81 @@ struct des_tv des3_ede_dec_tv_template[] = { #define BF_CBC_ENC_TEST_VECTORS 1 #define BF_CBC_DEC_TEST_VECTORS 1 -struct bf_tv { - unsigned int keylen; - unsigned int plen; - unsigned int rlen; - int fail; - char key[56]; - char iv[8]; - char plaintext[32]; - char result[32]; -}; - -struct bf_tv bf_enc_tv_template[] = { - +struct cipher_testvec bf_enc_tv_template[] = { /* DES test vectors from OpenSSL */ { - 8, 8, 8, 0, + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }, - { 0 }, + 8, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 8, { 0x4E, 0xF9, 0x97, 0x45, 0x61, 0x98, 0xDD, 0x78 }, - }, - + 8, + 0, + {} + }, { - 8, 8, 8, 0, - { 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E, }, - { 0 }, + 0, + 0, + { 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E }, + 8, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }, + 8, { 0xA7, 0x90, 0x79, 0x51, 0x08, 0xEA, 0x3C, 0xAE }, - }, - + 8, + 0, + {} + }, { - 8, 8, 8, 0, - { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, }, - { 0 }, + 0, + 0, + { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87 }, + 8, + {}, { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - { 0xE8, 0x7A, 0x24, 0x4E, 0x2C, 0xC8, 0x5E, 0x82 } - }, - - /* Vary the keylength... */ - + 8, + { 0xE8, 0x7A, 0x24, 0x4E, 0x2C, 0xC8, 0x5E, 0x82 }, + 8, + 0, + {} + }, + /* Vary the keylength... */ { - 16, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F }, - { 0 }, + 16, + {}, { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - { 0x93, 0x14, 0x28, 0x87, 0xEE, 0x3B, 0xE1, 0x5C } - }, - + 8, + { 0x93, 0x14, 0x28, 0x87, 0xEE, 0x3B, 0xE1, 0x5C }, + 8, + 0, + {} + }, { - 21, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44 }, - { 0 }, + 21, + {}, { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - { 0xE6, 0xF5, 0x1E, 0xD7, 0x9B, 0x9D, 0xB2, 0x1F } - }, - + 8, + { 0xE6, 0xF5, 0x1E, 0xD7, 0x9B, 0x9D, 0xB2, 0x1F }, + 8, + 0, + {} + }, /* Generated with bf488 */ { - 56, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, @@ -1159,64 +1330,92 @@ struct bf_tv bf_enc_tv_template[] = { 0x58, 0x40, 0x23, 0x64, 0x1A, 0xBA, 0x61, 0x76, 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, - { 0 }, - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - { 0xc0, 0x45, 0x04, 0x01, 0x2e, 0x4e, 0x1f, 0x53 } - } - + 56, + {}, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, + 8, + { 0xc0, 0x45, 0x04, 0x01, 0x2e, 0x4e, 0x1f, 0x53 }, + 8, + 0, + {} + } }; -struct bf_tv bf_dec_tv_template[] = { - +struct cipher_testvec bf_dec_tv_template[] = { /* DES test vectors from OpenSSL */ { - 8, 8, 8, 0, - { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }, - { 0 }, + 0, + 0, + { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 8, + {}, { 0x4E, 0xF9, 0x97, 0x45, 0x61, 0x98, 0xDD, 0x78 }, - { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } - }, - + 8, + { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 8, + 0, + {} + }, { - 8, 8, 8, 0, - { 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E, }, - { 0 }, + 0, + 0, + { 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E }, + 8, + {}, { 0xA7, 0x90, 0x79, 0x51, 0x08, 0xEA, 0x3C, 0xAE }, - { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF } - }, - + 8, + { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }, + 8, + 0, + {} + }, { - 8, 8, 8, 0, - { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, }, - { 0 }, + 0, + 0, + { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87 }, + 8, + {}, { 0xE8, 0x7A, 0x24, 0x4E, 0x2C, 0xC8, 0x5E, 0x82 }, - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 } - }, - - /* Vary the keylength... */ - + 8, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, + 8, + 0, + {} + }, + /* Vary the keylength... */ { - 16, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F }, - { 0 }, + 16, + {}, { 0x93, 0x14, 0x28, 0x87, 0xEE, 0x3B, 0xE1, 0x5C }, - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 } - }, - + 8, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, + 8, + 0, + {} + }, { - 21, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44 }, - { 0 }, + 21, + {}, { 0xE6, 0xF5, 0x1E, 0xD7, 0x9B, 0x9D, 0xB2, 0x1F }, - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 } - }, - + 8, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, + 8, + 0, + {} + }, /* Generated with bf488, using OpenSSL, Libgcrypt and Nettle */ { - 56, 8, 8, 0, + 0, + 0, { 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A, 0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, @@ -1224,56 +1423,64 @@ struct bf_tv bf_dec_tv_template[] = { 0x58, 0x40, 0x23, 0x64, 0x1A, 0xBA, 0x61, 0x76, 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }, - { 0 }, + 56, + {}, { 0xc0, 0x45, 0x04, 0x01, 0x2e, 0x4e, 0x1f, 0x53 }, - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 } - } -}; + 8, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, + 8, + 0, + {} + }, -struct bf_tv bf_cbc_enc_tv_template[] = { +}; +struct cipher_testvec bf_cbc_enc_tv_template[] = { /* From OpenSSL */ { - 16, 32, 32, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87 }, - - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - + 16, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, 0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20, 0x66, 0x6F, 0x72, 0x20, 0x00, 0x00, 0x00, 0x00 }, - + 32, { 0x6B, 0x77, 0xB4, 0xD6, 0x30, 0x06, 0xDE, 0xE6, 0x05, 0xB1, 0x56, 0xE2, 0x74, 0x03, 0x97, 0x93, 0x58, 0xDE, 0xB9, 0xE7, 0x15, 0x46, 0x16, 0xD9, - 0x59, 0xF1, 0x65, 0x2B, 0xD5, 0xFF, 0x92, 0xCC } - }, + 0x59, 0xF1, 0x65, 0x2B, 0xD5, 0xFF, 0x92, 0xCC }, + 32, + 0, + {} + } }; -struct bf_tv bf_cbc_dec_tv_template[] = { - +struct cipher_testvec bf_cbc_dec_tv_template[] = { /* From OpenSSL */ { - 16, 32, 32, 0, - + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87 }, - - { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, - + 16, + { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }, { 0x6B, 0x77, 0xB4, 0xD6, 0x30, 0x06, 0xDE, 0xE6, 0x05, 0xB1, 0x56, 0xE2, 0x74, 0x03, 0x97, 0x93, 0x58, 0xDE, 0xB9, 0xE7, 0x15, 0x46, 0x16, 0xD9, 0x59, 0xF1, 0x65, 0x2B, 0xD5, 0xFF, 0x92, 0xCC }, - + 32, { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, 0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20, - 0x66, 0x6F, 0x72, 0x20, 0x00, 0x00, 0x00, 0x00 } - }, + 0x66, 0x6F, 0x72, 0x20, 0x00, 0x00, 0x00, 0x00 }, + 32, + 0, + {} + } }; /* @@ -1284,135 +1491,173 @@ struct bf_tv bf_cbc_dec_tv_template[] = { #define TF_CBC_ENC_TEST_VECTORS 4 #define TF_CBC_DEC_TEST_VECTORS 4 -struct tf_tv { - unsigned int keylen; - unsigned int plen; - unsigned int rlen; - int fail; - char key[32]; - char iv[16]; - char plaintext[48]; - char result[48]; -}; - -struct tf_tv tf_enc_tv_template[] = { +struct cipher_testvec tf_enc_tv_template[] = { { - 16, 16, 16, 0, + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, - { 0 }, + 16, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x9F, 0x58, 0x9F, 0x5C, 0xF6, 0x12, 0x2C, 0x32, - 0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A } + 0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A }, + 16, + 0, + {} }, { - 24, 16, 16, 0, + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, - { 0 }, + 24, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xCF, 0xD1, 0xD2, 0xE5, 0xA9, 0xBE, 0x9C, 0xDF, - 0x50, 0x1F, 0x13, 0xB8, 0x92, 0xBD, 0x22, 0x48 } + 0x50, 0x1F, 0x13, 0xB8, 0x92, 0xBD, 0x22, 0x48 }, + 16, + 0, + {} }, { - 32, 16, 16, 0, + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF }, - { 0 }, + 32, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x37, 0x52, 0x7B, 0xE0, 0x05, 0x23, 0x34, 0xB8, - 0x9F, 0x0C, 0xFC, 0xCA, 0xE8, 0x7C, 0xFA, 0x20 } + 0x9F, 0x0C, 0xFC, 0xCA, 0xE8, 0x7C, 0xFA, 0x20 }, + 16, + 0, + {} }, }; -struct tf_tv tf_dec_tv_template[] = { +struct cipher_testvec tf_dec_tv_template[] = { { - 16, 16, 16, 0, + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, - { 0 }, + 16, + {}, { 0x9F, 0x58, 0x9F, 0x5C, 0xF6, 0x12, 0x2C, 0x32, 0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} }, { - 24, 16, 16, 0, + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, - { 0 }, + 24, + {}, { 0xCF, 0xD1, 0xD2, 0xE5, 0xA9, 0xBE, 0x9C, 0xDF, 0x50, 0x1F, 0x13, 0xB8, 0x92, 0xBD, 0x22, 0x48 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} }, { - 32, 16, 16, 0, + 0, + 0, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF }, - { 0 }, + 32, + {}, { 0x37, 0x52, 0x7B, 0xE0, 0x05, 0x23, 0x34, 0xB8, 0x9F, 0x0C, 0xFC, 0xCA, 0xE8, 0x7C, 0xFA, 0x20 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} }, }; -struct tf_tv tf_cbc_enc_tv_template[] = { +struct cipher_testvec tf_cbc_enc_tv_template[] = { /* Generated with Nettle */ { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, - }, - + 16, + 0, + {} + }, { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, - 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, + 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, - }, - + 16, + 0, + {} + }, { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, - }, - + 16, + 0, + {} + }, { - 16, 48, 48, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, @@ -1421,61 +1666,78 @@ struct tf_tv tf_cbc_enc_tv_template[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 48, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a, 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19, 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, + 48, + 0, + {} }, }; -struct tf_tv tf_cbc_dec_tv_template[] = { +struct cipher_testvec tf_cbc_dec_tv_template[] = { /* Reverse of the first four above */ { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, - }, - + 16, + 0, + {} + }, { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, - }, - + 16, + 0, + {} + }, { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, { 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, - }, - + 16, + 0, + {} + }, { - 16, 48, 48, 0, - + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, @@ -1484,12 +1746,16 @@ struct tf_tv tf_cbc_dec_tv_template[] = { 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19, 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, + 48, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 48, + 0, + {} }, }; @@ -1500,92 +1766,141 @@ struct tf_tv tf_cbc_dec_tv_template[] = { #define SERPENT_ENC_TEST_VECTORS 4 #define SERPENT_DEC_TEST_VECTORS 4 -struct serpent_tv { - unsigned int keylen, fail; - u8 key[32], plaintext[16], result[16]; -}; - -struct serpent_tv serpent_enc_tv_template[] = +struct cipher_testvec serpent_enc_tv_template[] = { { - 0, 0, - { 0 }, + 0, + 0, + {}, + 0, + {}, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, { 0x12, 0x07, 0xfc, 0xce, 0x9b, 0xd0, 0xd6, 0x47, - 0x6a, 0xe9, 0x8f, 0xbe, 0xd1, 0x43, 0xa0, 0xe2 } + 0x6a, 0xe9, 0x8f, 0xbe, 0xd1, 0x43, 0xa0, 0xe2 }, + 16, + 0, + {} }, { - 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, + {}, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, { 0x4c, 0x7d, 0x8a, 0x32, 0x80, 0x72, 0xa2, 0x2c, - 0x82, 0x3e, 0x4a, 0x1f, 0x3a, 0xcd, 0xa1, 0x6d } + 0x82, 0x3e, 0x4a, 0x1f, 0x3a, 0xcd, 0xa1, 0x6d }, + 16, + 0, + {} }, { - 32, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, + 32, + {}, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, { 0xde, 0x26, 0x9f, 0xf8, 0x33, 0xe4, 0x32, 0xb8, - 0x5b, 0x2e, 0x88, 0xd2, 0x70, 0x1c, 0xe7, 0x5c } + 0x5b, 0x2e, 0x88, 0xd2, 0x70, 0x1c, 0xe7, 0x5c }, + 16, + 0, + {} }, { - 16, 0, + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x80 }, + 16, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xdd, 0xd2, 0x6b, 0x98, 0xa5, 0xff, 0xd8, 0x2c, - 0x05, 0x34, 0x5a, 0x9d, 0xad, 0xbf, 0xaf, 0x49} + 0x05, 0x34, 0x5a, 0x9d, 0xad, 0xbf, 0xaf, 0x49}, + 16, + 0, + {} } }; -struct serpent_tv serpent_dec_tv_template[] = +struct cipher_testvec serpent_dec_tv_template[] = { { - 0, 0, - { 0 }, + 0, + 0, + {}, + 0, + {}, { 0x12, 0x07, 0xfc, 0xce, 0x9b, 0xd0, 0xd6, 0x47, 0x6a, 0xe9, 0x8f, 0xbe, 0xd1, 0x43, 0xa0, 0xe2 }, + 16, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, - + 16, + 0, + {} }, { - 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, + {}, { 0x4c, 0x7d, 0x8a, 0x32, 0x80, 0x72, 0xa2, 0x2c, 0x82, 0x3e, 0x4a, 0x1f, 0x3a, 0xcd, 0xa1, 0x6d }, + 16, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, + 0, + {} }, { - 32, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, - + 32, + {}, { 0xde, 0x26, 0x9f, 0xf8, 0x33, 0xe4, 0x32, 0xb8, 0x5b, 0x2e, 0x88, 0xd2, 0x70, 0x1c, 0xe7, 0x5c }, + 16, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + 16, + 0, + {} }, { - 16, 0, + 0, + 0, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x80 }, + 16, + {}, { 0xdd, 0xd2, 0x6b, 0x98, 0xa5, 0xff, 0xd8, 0x2c, 0x05, 0x34, 0x5a, 0x9d, 0xad, 0xbf, 0xaf, 0x49}, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} } }; @@ -1593,85 +1908,113 @@ struct serpent_tv serpent_dec_tv_template[] = #define CAST6_ENC_TEST_VECTORS 3 #define CAST6_DEC_TEST_VECTORS 3 -struct cast6_tv { - unsigned keylen; - unsigned fail; - u8 key[32]; - u8 plaintext[16]; - u8 result[16]; -}; - -struct cast6_tv cast6_enc_tv_template[] = +struct cipher_testvec cast6_enc_tv_template[] = { { - 16, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, + 16, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, + 16, + 0, + {} }, { - 24, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, + 24, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, + 16, + 0, + {} }, { - 32, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, + 32, + {}, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, + 16, + 0, + {} } }; -struct cast6_tv cast6_dec_tv_template[] = +struct cipher_testvec cast6_dec_tv_template[] = { { - 16, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, + 16, + {}, { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} }, { - 24, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, + 24, + {}, { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} }, { - 32, + 0, 0, { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, + 32, + {}, { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, + 16, { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, + 16, + 0, + {} } }; @@ -1682,90 +2025,113 @@ struct cast6_tv cast6_dec_tv_template[] = #define AES_ENC_TEST_VECTORS 3 #define AES_DEC_TEST_VECTORS 3 -struct aes_tv { - unsigned int keylen; - unsigned int plen; - unsigned int rlen; - int fail; - char key[32]; - char iv[8]; - char plaintext[16]; - char result[16]; -}; - -struct aes_tv aes_enc_tv_template[] = { +struct cipher_testvec aes_enc_tv_template[] = { /* From FIPS-197 */ { - 16, 16, 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, - { 0 }, + 16, + {}, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + 16, { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a }, + 16, + 0, + {} }, { - 24, 16, 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, - { 0 }, + 24, + {}, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + 16, { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 }, + 16, + 0, + {} }, { - 32, 16, 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, - { 0 }, + 32, + {}, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + 16, { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 }, + 16, + 0, + {} }, }; -struct aes_tv aes_dec_tv_template[] = { +struct cipher_testvec aes_dec_tv_template[] = { /* From FIPS-197 */ { - 16, 16, 16, 0, - + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, - { 0 }, + 16, + {}, { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a }, + 16, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, - }, - + 16, + 0, + {} + }, { - 24, 16, 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, - { 0 }, + 24, + {}, { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 }, + 16, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + 16, + 0, + {} }, { - 32, 16, 16, 0, + 0, + 0, { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, - { 0 }, + 32, + {}, { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 }, + 16, { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + 16, + 0, + {} }, }; @@ -1773,67 +2139,93 @@ struct aes_tv aes_dec_tv_template[] = { #define CAST5_ENC_TEST_VECTORS 3 #define CAST5_DEC_TEST_VECTORS 3 -struct cast5_tv { - unsigned keylen; - unsigned fail; - u8 key[16]; - u8 plaintext[8]; - u8 ciphertext[8]; -}; - -struct cast5_tv cast5_enc_tv_template[] = +struct cipher_testvec cast5_enc_tv_template[] = { { - 16, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A }, + 16, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x23, 0x8b, 0x4f, 0xe5, 0x84, 0x7e, 0x44, 0xb2 }, - + 8, + 0, + {} }, { - 10, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45 }, + 10, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0xeb, 0x6a, 0x71, 0x1a, 0x2c, 0x02, 0x27, 0x1b }, + 8, + 0, + {} }, { - 5, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12 }, + 5, + {}, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, { 0x7a, 0xc8, 0x16, 0xd1, 0x6e, 0x9b, 0x30, 0x2e }, + 8, + 0, + {} } }; -struct cast5_tv cast5_dec_tv_template[] = +struct cipher_testvec cast5_dec_tv_template[] = { { - 16, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A }, + 16, + {}, { 0x23, 0x8b, 0x4f, 0xe5, 0x84, 0x7e, 0x44, 0xb2 }, + 8, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, - + 8, + 0, + {} }, { - 10, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45 }, + 10, + {}, { 0xeb, 0x6a, 0x71, 0x1a, 0x2c, 0x02, 0x27, 0x1b }, + 8, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + 0, + {} }, { - 5, + 0, 0, { 0x01, 0x23, 0x45, 0x67, 0x12 }, + 5, + {}, { 0x7a, 0xc8, 0x16, 0xd1, 0x6e, 0x9b, 0x30, 0x2e }, + 8, { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, + 8, + 0, + {} } }; |