diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2012-07-26 16:00:59 -0400 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2012-07-26 16:00:59 -0400 |
| commit | 44a6b8442190cf213081060b610dae2e822f802b (patch) | |
| tree | 2280bfe385bef8b6416a6493ea8988a975008165 /crypto | |
| parent | 945c40c6b007eb4b07374a38ea37b2a34da306b1 (diff) | |
| parent | a43478863b16cb0986fd2ec9d1f1b9ebaaec5922 (diff) | |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto updates from Herbert Xu:
- Fixed algorithm construction hang when self-test fails.
- Added SHA variants to talitos AEAD list.
- New driver for Exynos random number generator.
- Performance enhancements for arc4.
- Added hwrng support to caam.
- Added ahash support to caam.
- Fixed bad kfree in aesni-intel.
- Allow aesni-intel in FIPS mode.
- Added atmel driver with support for AES/3DES/SHA.
- Bug fixes for mv_cesa.
- CRC hardware driver for BF60x family processors.
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (66 commits)
crypto: twofish-avx - remove useless instruction
crypto: testmgr - add aead cbc aes hmac sha1,256,512 test vectors
crypto: talitos - add sha224, sha384 and sha512 to existing AEAD algorithms
crypto: talitos - export the talitos_submit function
crypto: talitos - move talitos structures to header file
crypto: atmel - add new tests to tcrypt
crypto: atmel - add Atmel SHA1/SHA256 driver
crypto: atmel - add Atmel DES/TDES driver
crypto: atmel - add Atmel AES driver
ARM: AT91SAM9G45: add crypto peripherals
crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode
hwrng: exynos - Add support for Exynos random number generator
crypto: aesni-intel - fix wrong kfree pointer
crypto: caam - ERA retrieval and printing for SEC device
crypto: caam - Using alloc_coherent for caam job rings
crypto: algapi - Fix hang on crypto allocation
crypto: arc4 - now arc needs blockcipher support
crypto: caam - one tasklet per job ring
crypto: caam - consolidate memory barriers from job ring en/dequeue
crypto: caam - only query h/w in job ring dequeue path
...
Diffstat (limited to 'crypto')
| -rw-r--r-- | crypto/Kconfig | 67 | ||||
| -rw-r--r-- | crypto/algapi.c | 17 | ||||
| -rw-r--r-- | crypto/algboss.c | 17 | ||||
| -rw-r--r-- | crypto/arc4.c | 115 | ||||
| -rw-r--r-- | crypto/internal.h | 1 | ||||
| -rw-r--r-- | crypto/tcrypt.c | 86 | ||||
| -rw-r--r-- | crypto/testmgr.c | 203 | ||||
| -rw-r--r-- | crypto/testmgr.h | 1852 |
8 files changed, 2269 insertions, 89 deletions
diff --git a/crypto/Kconfig b/crypto/Kconfig index 8e84225c096b..a3238051b03e 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig | |||
| @@ -174,6 +174,16 @@ config CRYPTO_TEST | |||
| 174 | help | 174 | help |
| 175 | Quick & dirty crypto test module. | 175 | Quick & dirty crypto test module. |
| 176 | 176 | ||
| 177 | config CRYPTO_ABLK_HELPER_X86 | ||
| 178 | tristate | ||
| 179 | depends on X86 | ||
| 180 | select CRYPTO_CRYPTD | ||
| 181 | |||
| 182 | config CRYPTO_GLUE_HELPER_X86 | ||
| 183 | tristate | ||
| 184 | depends on X86 | ||
| 185 | select CRYPTO_ALGAPI | ||
| 186 | |||
| 177 | comment "Authenticated Encryption with Associated Data" | 187 | comment "Authenticated Encryption with Associated Data" |
| 178 | 188 | ||
| 179 | config CRYPTO_CCM | 189 | config CRYPTO_CCM |
| @@ -552,6 +562,7 @@ config CRYPTO_AES_NI_INTEL | |||
| 552 | select CRYPTO_AES_X86_64 if 64BIT | 562 | select CRYPTO_AES_X86_64 if 64BIT |
| 553 | select CRYPTO_AES_586 if !64BIT | 563 | select CRYPTO_AES_586 if !64BIT |
| 554 | select CRYPTO_CRYPTD | 564 | select CRYPTO_CRYPTD |
| 565 | select CRYPTO_ABLK_HELPER_X86 | ||
| 555 | select CRYPTO_ALGAPI | 566 | select CRYPTO_ALGAPI |
| 556 | help | 567 | help |
| 557 | Use Intel AES-NI instructions for AES algorithm. | 568 | Use Intel AES-NI instructions for AES algorithm. |
| @@ -593,7 +604,7 @@ config CRYPTO_ANUBIS | |||
| 593 | 604 | ||
| 594 | config CRYPTO_ARC4 | 605 | config CRYPTO_ARC4 |
| 595 | tristate "ARC4 cipher algorithm" | 606 | tristate "ARC4 cipher algorithm" |
| 596 | select CRYPTO_ALGAPI | 607 | select CRYPTO_BLKCIPHER |
| 597 | help | 608 | help |
| 598 | ARC4 cipher algorithm. | 609 | ARC4 cipher algorithm. |
| 599 | 610 | ||
| @@ -660,6 +671,7 @@ config CRYPTO_CAMELLIA_X86_64 | |||
| 660 | depends on X86 && 64BIT | 671 | depends on X86 && 64BIT |
| 661 | depends on CRYPTO | 672 | depends on CRYPTO |
| 662 | select CRYPTO_ALGAPI | 673 | select CRYPTO_ALGAPI |
| 674 | select CRYPTO_GLUE_HELPER_X86 | ||
| 663 | select CRYPTO_LRW | 675 | select CRYPTO_LRW |
| 664 | select CRYPTO_XTS | 676 | select CRYPTO_XTS |
| 665 | help | 677 | help |
| @@ -786,6 +798,8 @@ config CRYPTO_SERPENT_SSE2_X86_64 | |||
| 786 | depends on X86 && 64BIT | 798 | depends on X86 && 64BIT |
| 787 | select CRYPTO_ALGAPI | 799 | select CRYPTO_ALGAPI |
| 788 | select CRYPTO_CRYPTD | 800 | select CRYPTO_CRYPTD |
| 801 | select CRYPTO_ABLK_HELPER_X86 | ||
| 802 | select CRYPTO_GLUE_HELPER_X86 | ||
| 789 | select CRYPTO_SERPENT | 803 | select CRYPTO_SERPENT |
| 790 | select CRYPTO_LRW | 804 | select CRYPTO_LRW |
| 791 | select CRYPTO_XTS | 805 | select CRYPTO_XTS |
| @@ -806,6 +820,8 @@ config CRYPTO_SERPENT_SSE2_586 | |||
| 806 | depends on X86 && !64BIT | 820 | depends on X86 && !64BIT |
| 807 | select CRYPTO_ALGAPI | 821 | select CRYPTO_ALGAPI |
| 808 | select CRYPTO_CRYPTD | 822 | select CRYPTO_CRYPTD |
| 823 | select CRYPTO_ABLK_HELPER_X86 | ||
| 824 | select CRYPTO_GLUE_HELPER_X86 | ||
| 809 | select CRYPTO_SERPENT | 825 | select CRYPTO_SERPENT |
| 810 | select CRYPTO_LRW | 826 | select CRYPTO_LRW |
| 811 | select CRYPTO_XTS | 827 | select CRYPTO_XTS |
| @@ -821,6 +837,28 @@ config CRYPTO_SERPENT_SSE2_586 | |||
| 821 | See also: | 837 | See also: |
| 822 | <http://www.cl.cam.ac.uk/~rja14/serpent.html> | 838 | <http://www.cl.cam.ac.uk/~rja14/serpent.html> |
| 823 | 839 | ||
| 840 | config CRYPTO_SERPENT_AVX_X86_64 | ||
| 841 | tristate "Serpent cipher algorithm (x86_64/AVX)" | ||
| 842 | depends on X86 && 64BIT | ||
| 843 | select CRYPTO_ALGAPI | ||
| 844 | select CRYPTO_CRYPTD | ||
| 845 | select CRYPTO_ABLK_HELPER_X86 | ||
| 846 | select CRYPTO_GLUE_HELPER_X86 | ||
| 847 | select CRYPTO_SERPENT | ||
| 848 | select CRYPTO_LRW | ||
| 849 | select CRYPTO_XTS | ||
| 850 | help | ||
| 851 | Serpent cipher algorithm, by Anderson, Biham & Knudsen. | ||
| 852 | |||
| 853 | Keys are allowed to be from 0 to 256 bits in length, in steps | ||
| 854 | of 8 bits. | ||
| 855 | |||
| 856 | This module provides the Serpent cipher algorithm that processes | ||
| 857 | eight blocks parallel using the AVX instruction set. | ||
| 858 | |||
| 859 | See also: | ||
| 860 | <http://www.cl.cam.ac.uk/~rja14/serpent.html> | ||
| 861 | |||
| 824 | config CRYPTO_TEA | 862 | config CRYPTO_TEA |
| 825 | tristate "TEA, XTEA and XETA cipher algorithms" | 863 | tristate "TEA, XTEA and XETA cipher algorithms" |
| 826 | select CRYPTO_ALGAPI | 864 | select CRYPTO_ALGAPI |
| @@ -897,6 +935,7 @@ config CRYPTO_TWOFISH_X86_64_3WAY | |||
| 897 | select CRYPTO_ALGAPI | 935 | select CRYPTO_ALGAPI |
| 898 | select CRYPTO_TWOFISH_COMMON | 936 | select CRYPTO_TWOFISH_COMMON |
| 899 | select CRYPTO_TWOFISH_X86_64 | 937 | select CRYPTO_TWOFISH_X86_64 |
| 938 | select CRYPTO_GLUE_HELPER_X86 | ||
| 900 | select CRYPTO_LRW | 939 | select CRYPTO_LRW |
| 901 | select CRYPTO_XTS | 940 | select CRYPTO_XTS |
| 902 | help | 941 | help |
| @@ -913,6 +952,32 @@ config CRYPTO_TWOFISH_X86_64_3WAY | |||
| 913 | See also: | 952 | See also: |
| 914 | <http://www.schneier.com/twofish.html> | 953 | <http://www.schneier.com/twofish.html> |
| 915 | 954 | ||
| 955 | config CRYPTO_TWOFISH_AVX_X86_64 | ||
| 956 | tristate "Twofish cipher algorithm (x86_64/AVX)" | ||
| 957 | depends on X86 && 64BIT | ||
| 958 | select CRYPTO_ALGAPI | ||
| 959 | select CRYPTO_CRYPTD | ||
| 960 | select CRYPTO_ABLK_HELPER_X86 | ||
| 961 | select CRYPTO_GLUE_HELPER_X86 | ||
| 962 | select CRYPTO_TWOFISH_COMMON | ||
| 963 | select CRYPTO_TWOFISH_X86_64 | ||
| 964 | select CRYPTO_TWOFISH_X86_64_3WAY | ||
| 965 | select CRYPTO_LRW | ||
| 966 | select CRYPTO_XTS | ||
| 967 | help | ||
| 968 | Twofish cipher algorithm (x86_64/AVX). | ||
| 969 | |||
| 970 | Twofish was submitted as an AES (Advanced Encryption Standard) | ||
| 971 | candidate cipher by researchers at CounterPane Systems. It is a | ||
| 972 | 16 round block cipher supporting key sizes of 128, 192, and 256 | ||
| 973 | bits. | ||
| 974 | |||
| 975 | This module provides the Twofish cipher algorithm that processes | ||
| 976 | eight blocks parallel using the AVX Instruction Set. | ||
| 977 | |||
| 978 | See also: | ||
| 979 | <http://www.schneier.com/twofish.html> | ||
| 980 | |||
| 916 | comment "Compression" | 981 | comment "Compression" |
| 917 | 982 | ||
| 918 | config CRYPTO_DEFLATE | 983 | config CRYPTO_DEFLATE |
diff --git a/crypto/algapi.c b/crypto/algapi.c index 056571b85445..c3b9bfeeb7ff 100644 --- a/crypto/algapi.c +++ b/crypto/algapi.c | |||
| @@ -24,22 +24,6 @@ | |||
| 24 | 24 | ||
| 25 | static LIST_HEAD(crypto_template_list); | 25 | static LIST_HEAD(crypto_template_list); |
| 26 | 26 | ||
| 27 | void crypto_larval_error(const char *name, u32 type, u32 mask) | ||
| 28 | { | ||
| 29 | struct crypto_alg *alg; | ||
| 30 | |||
| 31 | alg = crypto_alg_lookup(name, type, mask); | ||
| 32 | |||
| 33 | if (alg) { | ||
| 34 | if (crypto_is_larval(alg)) { | ||
| 35 | struct crypto_larval *larval = (void *)alg; | ||
| 36 | complete_all(&larval->completion); | ||
| 37 | } | ||
| 38 | crypto_mod_put(alg); | ||
| 39 | } | ||
| 40 | } | ||
| 41 | EXPORT_SYMBOL_GPL(crypto_larval_error); | ||
| 42 | |||
| 43 | static inline int crypto_set_driver_name(struct crypto_alg *alg) | 27 | static inline int crypto_set_driver_name(struct crypto_alg *alg) |
| 44 | { | 28 | { |
| 45 | static const char suffix[] = "-generic"; | 29 | static const char suffix[] = "-generic"; |
| @@ -295,7 +279,6 @@ found: | |||
| 295 | continue; | 279 | continue; |
| 296 | 280 | ||
| 297 | larval->adult = alg; | 281 | larval->adult = alg; |
| 298 | complete_all(&larval->completion); | ||
| 299 | continue; | 282 | continue; |
| 300 | } | 283 | } |
| 301 | 284 | ||
diff --git a/crypto/algboss.c b/crypto/algboss.c index 791d194958fa..769219b29309 100644 --- a/crypto/algboss.c +++ b/crypto/algboss.c | |||
| @@ -11,6 +11,7 @@ | |||
| 11 | */ | 11 | */ |
| 12 | 12 | ||
| 13 | #include <crypto/internal/aead.h> | 13 | #include <crypto/internal/aead.h> |
| 14 | #include <linux/completion.h> | ||
| 14 | #include <linux/ctype.h> | 15 | #include <linux/ctype.h> |
| 15 | #include <linux/err.h> | 16 | #include <linux/err.h> |
| 16 | #include <linux/init.h> | 17 | #include <linux/init.h> |
| @@ -47,6 +48,8 @@ struct cryptomgr_param { | |||
| 47 | char larval[CRYPTO_MAX_ALG_NAME]; | 48 | char larval[CRYPTO_MAX_ALG_NAME]; |
| 48 | char template[CRYPTO_MAX_ALG_NAME]; | 49 | char template[CRYPTO_MAX_ALG_NAME]; |
| 49 | 50 | ||
| 51 | struct completion *completion; | ||
| 52 | |||
| 50 | u32 otype; | 53 | u32 otype; |
| 51 | u32 omask; | 54 | u32 omask; |
| 52 | }; | 55 | }; |
| @@ -66,7 +69,7 @@ static int cryptomgr_probe(void *data) | |||
| 66 | 69 | ||
| 67 | tmpl = crypto_lookup_template(param->template); | 70 | tmpl = crypto_lookup_template(param->template); |
| 68 | if (!tmpl) | 71 | if (!tmpl) |
| 69 | goto err; | 72 | goto out; |
| 70 | 73 | ||
| 71 | do { | 74 | do { |
| 72 | if (tmpl->create) { | 75 | if (tmpl->create) { |
| @@ -83,16 +86,10 @@ static int cryptomgr_probe(void *data) | |||
| 83 | 86 | ||
| 84 | crypto_tmpl_put(tmpl); | 87 | crypto_tmpl_put(tmpl); |
| 85 | 88 | ||
| 86 | if (err) | ||
| 87 | goto err; | ||
| 88 | |||
| 89 | out: | 89 | out: |
| 90 | complete_all(param->completion); | ||
| 90 | kfree(param); | 91 | kfree(param); |
| 91 | module_put_and_exit(0); | 92 | module_put_and_exit(0); |
| 92 | |||
| 93 | err: | ||
| 94 | crypto_larval_error(param->larval, param->otype, param->omask); | ||
| 95 | goto out; | ||
| 96 | } | 93 | } |
| 97 | 94 | ||
| 98 | static int cryptomgr_schedule_probe(struct crypto_larval *larval) | 95 | static int cryptomgr_schedule_probe(struct crypto_larval *larval) |
| @@ -192,10 +189,14 @@ static int cryptomgr_schedule_probe(struct crypto_larval *larval) | |||
| 192 | 189 | ||
| 193 | memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME); | 190 | memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME); |
| 194 | 191 | ||
| 192 | param->completion = &larval->completion; | ||
| 193 | |||
| 195 | thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe"); | 194 | thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe"); |
| 196 | if (IS_ERR(thread)) | 195 | if (IS_ERR(thread)) |
| 197 | goto err_free_param; | 196 | goto err_free_param; |
| 198 | 197 | ||
| 198 | wait_for_completion_interruptible(&larval->completion); | ||
| 199 | |||
| 199 | return NOTIFY_STOP; | 200 | return NOTIFY_STOP; |
| 200 | 201 | ||
| 201 | err_free_param: | 202 | err_free_param: |
diff --git a/crypto/arc4.c b/crypto/arc4.c index 0d12a96da1d8..5a772c3657d5 100644 --- a/crypto/arc4.c +++ b/crypto/arc4.c | |||
| @@ -11,17 +11,19 @@ | |||
| 11 | * (at your option) any later version. | 11 | * (at your option) any later version. |
| 12 | * | 12 | * |
| 13 | */ | 13 | */ |
| 14 | |||
| 14 | #include <linux/module.h> | 15 | #include <linux/module.h> |
| 15 | #include <linux/init.h> | 16 | #include <linux/init.h> |
| 16 | #include <linux/crypto.h> | 17 | #include <linux/crypto.h> |
| 18 | #include <crypto/algapi.h> | ||
| 17 | 19 | ||
| 18 | #define ARC4_MIN_KEY_SIZE 1 | 20 | #define ARC4_MIN_KEY_SIZE 1 |
| 19 | #define ARC4_MAX_KEY_SIZE 256 | 21 | #define ARC4_MAX_KEY_SIZE 256 |
| 20 | #define ARC4_BLOCK_SIZE 1 | 22 | #define ARC4_BLOCK_SIZE 1 |
| 21 | 23 | ||
| 22 | struct arc4_ctx { | 24 | struct arc4_ctx { |
| 23 | u8 S[256]; | 25 | u32 S[256]; |
| 24 | u8 x, y; | 26 | u32 x, y; |
| 25 | }; | 27 | }; |
| 26 | 28 | ||
| 27 | static int arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key, | 29 | static int arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key, |
| @@ -37,7 +39,7 @@ static int arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
| 37 | ctx->S[i] = i; | 39 | ctx->S[i] = i; |
| 38 | 40 | ||
| 39 | for (i = 0; i < 256; i++) { | 41 | for (i = 0; i < 256; i++) { |
| 40 | u8 a = ctx->S[i]; | 42 | u32 a = ctx->S[i]; |
| 41 | j = (j + in_key[k] + a) & 0xff; | 43 | j = (j + in_key[k] + a) & 0xff; |
| 42 | ctx->S[i] = ctx->S[j]; | 44 | ctx->S[i] = ctx->S[j]; |
| 43 | ctx->S[j] = a; | 45 | ctx->S[j] = a; |
| @@ -48,51 +50,114 @@ static int arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
| 48 | return 0; | 50 | return 0; |
| 49 | } | 51 | } |
| 50 | 52 | ||
| 51 | static void arc4_crypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) | 53 | static void arc4_crypt(struct arc4_ctx *ctx, u8 *out, const u8 *in, |
| 54 | unsigned int len) | ||
| 52 | { | 55 | { |
| 53 | struct arc4_ctx *ctx = crypto_tfm_ctx(tfm); | 56 | u32 *const S = ctx->S; |
| 57 | u32 x, y, a, b; | ||
| 58 | u32 ty, ta, tb; | ||
| 59 | |||
| 60 | if (len == 0) | ||
| 61 | return; | ||
| 54 | 62 | ||
| 55 | u8 *const S = ctx->S; | 63 | x = ctx->x; |
| 56 | u8 x = ctx->x; | 64 | y = ctx->y; |
| 57 | u8 y = ctx->y; | ||
| 58 | u8 a, b; | ||
| 59 | 65 | ||
| 60 | a = S[x]; | 66 | a = S[x]; |
| 61 | y = (y + a) & 0xff; | 67 | y = (y + a) & 0xff; |
| 62 | b = S[y]; | 68 | b = S[y]; |
| 63 | S[x] = b; | 69 | |
| 64 | S[y] = a; | 70 | do { |
| 65 | x = (x + 1) & 0xff; | 71 | S[y] = a; |
| 66 | *out++ = *in ^ S[(a + b) & 0xff]; | 72 | a = (a + b) & 0xff; |
| 73 | S[x] = b; | ||
| 74 | x = (x + 1) & 0xff; | ||
| 75 | ta = S[x]; | ||
| 76 | ty = (y + ta) & 0xff; | ||
| 77 | tb = S[ty]; | ||
| 78 | *out++ = *in++ ^ S[a]; | ||
| 79 | if (--len == 0) | ||
| 80 | break; | ||
| 81 | y = ty; | ||
| 82 | a = ta; | ||
| 83 | b = tb; | ||
| 84 | } while (true); | ||
| 67 | 85 | ||
| 68 | ctx->x = x; | 86 | ctx->x = x; |
| 69 | ctx->y = y; | 87 | ctx->y = y; |
| 70 | } | 88 | } |
| 71 | 89 | ||
| 72 | static struct crypto_alg arc4_alg = { | 90 | static void arc4_crypt_one(struct crypto_tfm *tfm, u8 *out, const u8 *in) |
| 91 | { | ||
| 92 | arc4_crypt(crypto_tfm_ctx(tfm), out, in, 1); | ||
| 93 | } | ||
| 94 | |||
| 95 | static int ecb_arc4_crypt(struct blkcipher_desc *desc, struct scatterlist *dst, | ||
| 96 | struct scatterlist *src, unsigned int nbytes) | ||
| 97 | { | ||
| 98 | struct arc4_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); | ||
| 99 | struct blkcipher_walk walk; | ||
| 100 | int err; | ||
| 101 | |||
| 102 | blkcipher_walk_init(&walk, dst, src, nbytes); | ||
| 103 | |||
| 104 | err = blkcipher_walk_virt(desc, &walk); | ||
| 105 | |||
| 106 | while (walk.nbytes > 0) { | ||
| 107 | u8 *wsrc = walk.src.virt.addr; | ||
| 108 | u8 *wdst = walk.dst.virt.addr; | ||
| 109 | |||
| 110 | arc4_crypt(ctx, wdst, wsrc, walk.nbytes); | ||
| 111 | |||
| 112 | err = blkcipher_walk_done(desc, &walk, 0); | ||
| 113 | } | ||
| 114 | |||
| 115 | return err; | ||
| 116 | } | ||
| 117 | |||
| 118 | static struct crypto_alg arc4_algs[2] = { { | ||
| 73 | .cra_name = "arc4", | 119 | .cra_name = "arc4", |
| 74 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, | 120 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, |
| 75 | .cra_blocksize = ARC4_BLOCK_SIZE, | 121 | .cra_blocksize = ARC4_BLOCK_SIZE, |
| 76 | .cra_ctxsize = sizeof(struct arc4_ctx), | 122 | .cra_ctxsize = sizeof(struct arc4_ctx), |
| 77 | .cra_module = THIS_MODULE, | 123 | .cra_module = THIS_MODULE, |
| 78 | .cra_list = LIST_HEAD_INIT(arc4_alg.cra_list), | 124 | .cra_u = { |
| 79 | .cra_u = { .cipher = { | 125 | .cipher = { |
| 80 | .cia_min_keysize = ARC4_MIN_KEY_SIZE, | 126 | .cia_min_keysize = ARC4_MIN_KEY_SIZE, |
| 81 | .cia_max_keysize = ARC4_MAX_KEY_SIZE, | 127 | .cia_max_keysize = ARC4_MAX_KEY_SIZE, |
| 82 | .cia_setkey = arc4_set_key, | 128 | .cia_setkey = arc4_set_key, |
| 83 | .cia_encrypt = arc4_crypt, | 129 | .cia_encrypt = arc4_crypt_one, |
| 84 | .cia_decrypt = arc4_crypt } } | 130 | .cia_decrypt = arc4_crypt_one, |
| 85 | }; | 131 | }, |
| 132 | }, | ||
| 133 | }, { | ||
| 134 | .cra_name = "ecb(arc4)", | ||
| 135 | .cra_priority = 100, | ||
| 136 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
| 137 | .cra_blocksize = ARC4_BLOCK_SIZE, | ||
| 138 | .cra_ctxsize = sizeof(struct arc4_ctx), | ||
| 139 | .cra_alignmask = 0, | ||
| 140 | .cra_type = &crypto_blkcipher_type, | ||
| 141 | .cra_module = THIS_MODULE, | ||
| 142 | .cra_u = { | ||
| 143 | .blkcipher = { | ||
| 144 | .min_keysize = ARC4_MIN_KEY_SIZE, | ||
| 145 | .max_keysize = ARC4_MAX_KEY_SIZE, | ||
| 146 | .setkey = arc4_set_key, | ||
| 147 | .encrypt = ecb_arc4_crypt, | ||
| 148 | .decrypt = ecb_arc4_crypt, | ||
| 149 | }, | ||
| 150 | }, | ||
| 151 | } }; | ||
| 86 | 152 | ||
| 87 | static int __init arc4_init(void) | 153 | static int __init arc4_init(void) |
| 88 | { | 154 | { |
| 89 | return crypto_register_alg(&arc4_alg); | 155 | return crypto_register_algs(arc4_algs, ARRAY_SIZE(arc4_algs)); |
| 90 | } | 156 | } |
| 91 | 157 | ||
| 92 | |||
| 93 | static void __exit arc4_exit(void) | 158 | static void __exit arc4_exit(void) |
| 94 | { | 159 | { |
| 95 | crypto_unregister_alg(&arc4_alg); | 160 | crypto_unregister_algs(arc4_algs, ARRAY_SIZE(arc4_algs)); |
| 96 | } | 161 | } |
| 97 | 162 | ||
| 98 | module_init(arc4_init); | 163 | module_init(arc4_init); |
diff --git a/crypto/internal.h b/crypto/internal.h index b865ca1a8613..9ebedae3fb54 100644 --- a/crypto/internal.h +++ b/crypto/internal.h | |||
| @@ -83,7 +83,6 @@ void crypto_exit_compress_ops(struct crypto_tfm *tfm); | |||
| 83 | struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask); | 83 | struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask); |
| 84 | void crypto_larval_kill(struct crypto_alg *alg); | 84 | void crypto_larval_kill(struct crypto_alg *alg); |
| 85 | struct crypto_alg *crypto_larval_lookup(const char *name, u32 type, u32 mask); | 85 | struct crypto_alg *crypto_larval_lookup(const char *name, u32 type, u32 mask); |
| 86 | void crypto_larval_error(const char *name, u32 type, u32 mask); | ||
| 87 | void crypto_alg_tested(const char *name, int err); | 86 | void crypto_alg_tested(const char *name, int err); |
| 88 | 87 | ||
| 89 | void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list, | 88 | void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list, |
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index 8f147bff0980..5cf2ccb1540c 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c | |||
| @@ -809,7 +809,7 @@ static void test_acipher_speed(const char *algo, int enc, unsigned int sec, | |||
| 809 | struct cipher_speed_template *template, | 809 | struct cipher_speed_template *template, |
| 810 | unsigned int tcount, u8 *keysize) | 810 | unsigned int tcount, u8 *keysize) |
| 811 | { | 811 | { |
| 812 | unsigned int ret, i, j, iv_len; | 812 | unsigned int ret, i, j, k, iv_len; |
| 813 | struct tcrypt_result tresult; | 813 | struct tcrypt_result tresult; |
| 814 | const char *key; | 814 | const char *key; |
| 815 | char iv[128]; | 815 | char iv[128]; |
| @@ -883,11 +883,23 @@ static void test_acipher_speed(const char *algo, int enc, unsigned int sec, | |||
| 883 | } | 883 | } |
| 884 | 884 | ||
| 885 | sg_init_table(sg, TVMEMSIZE); | 885 | sg_init_table(sg, TVMEMSIZE); |
| 886 | sg_set_buf(sg, tvmem[0] + *keysize, | 886 | |
| 887 | k = *keysize + *b_size; | ||
| 888 | if (k > PAGE_SIZE) { | ||
| 889 | sg_set_buf(sg, tvmem[0] + *keysize, | ||
| 887 | PAGE_SIZE - *keysize); | 890 | PAGE_SIZE - *keysize); |
| 888 | for (j = 1; j < TVMEMSIZE; j++) { | 891 | k -= PAGE_SIZE; |
| 889 | sg_set_buf(sg + j, tvmem[j], PAGE_SIZE); | 892 | j = 1; |
| 890 | memset(tvmem[j], 0xff, PAGE_SIZE); | 893 | while (k > PAGE_SIZE) { |
| 894 | sg_set_buf(sg + j, tvmem[j], PAGE_SIZE); | ||
| 895 | memset(tvmem[j], 0xff, PAGE_SIZE); | ||
| 896 | j++; | ||
| 897 | k -= PAGE_SIZE; | ||
| 898 | } | ||
| 899 | sg_set_buf(sg + j, tvmem[j], k); | ||
| 900 | memset(tvmem[j], 0xff, k); | ||
| 901 | } else { | ||
| 902 | sg_set_buf(sg, tvmem[0] + *keysize, *b_size); | ||
| 891 | } | 903 | } |
| 892 | 904 | ||
| 893 | iv_len = crypto_ablkcipher_ivsize(tfm); | 905 | iv_len = crypto_ablkcipher_ivsize(tfm); |
| @@ -1192,6 +1204,9 @@ static int do_test(int m) | |||
| 1192 | case 109: | 1204 | case 109: |
| 1193 | ret += tcrypt_test("vmac(aes)"); | 1205 | ret += tcrypt_test("vmac(aes)"); |
| 1194 | break; | 1206 | break; |
| 1207 | case 110: | ||
| 1208 | ret += tcrypt_test("hmac(crc32)"); | ||
| 1209 | break; | ||
| 1195 | 1210 | ||
| 1196 | case 150: | 1211 | case 150: |
| 1197 | ret += tcrypt_test("ansi_cprng"); | 1212 | ret += tcrypt_test("ansi_cprng"); |
| @@ -1339,6 +1354,11 @@ static int do_test(int m) | |||
| 1339 | speed_template_32_64); | 1354 | speed_template_32_64); |
| 1340 | break; | 1355 | break; |
| 1341 | 1356 | ||
| 1357 | case 208: | ||
| 1358 | test_cipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0, | ||
| 1359 | speed_template_8); | ||
| 1360 | break; | ||
| 1361 | |||
| 1342 | case 300: | 1362 | case 300: |
| 1343 | /* fall through */ | 1363 | /* fall through */ |
| 1344 | 1364 | ||
| @@ -1512,6 +1532,14 @@ static int do_test(int m) | |||
| 1512 | speed_template_16_24_32); | 1532 | speed_template_16_24_32); |
| 1513 | test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, | 1533 | test_acipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, |
| 1514 | speed_template_16_24_32); | 1534 | speed_template_16_24_32); |
| 1535 | test_acipher_speed("cfb(aes)", ENCRYPT, sec, NULL, 0, | ||
| 1536 | speed_template_16_24_32); | ||
| 1537 | test_acipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0, | ||
| 1538 | speed_template_16_24_32); | ||
| 1539 | test_acipher_speed("ofb(aes)", ENCRYPT, sec, NULL, 0, | ||
| 1540 | speed_template_16_24_32); | ||
| 1541 | test_acipher_speed("ofb(aes)", DECRYPT, sec, NULL, 0, | ||
| 1542 | speed_template_16_24_32); | ||
| 1515 | break; | 1543 | break; |
| 1516 | 1544 | ||
| 1517 | case 501: | 1545 | case 501: |
| @@ -1527,6 +1555,18 @@ static int do_test(int m) | |||
| 1527 | test_acipher_speed("cbc(des3_ede)", DECRYPT, sec, | 1555 | test_acipher_speed("cbc(des3_ede)", DECRYPT, sec, |
| 1528 | des3_speed_template, DES3_SPEED_VECTORS, | 1556 | des3_speed_template, DES3_SPEED_VECTORS, |
| 1529 | speed_template_24); | 1557 | speed_template_24); |
| 1558 | test_acipher_speed("cfb(des3_ede)", ENCRYPT, sec, | ||
| 1559 | des3_speed_template, DES3_SPEED_VECTORS, | ||
| 1560 | speed_template_24); | ||
| 1561 | test_acipher_speed("cfb(des3_ede)", DECRYPT, sec, | ||
| 1562 | des3_speed_template, DES3_SPEED_VECTORS, | ||
| 1563 | speed_template_24); | ||
| 1564 | test_acipher_speed("ofb(des3_ede)", ENCRYPT, sec, | ||
| 1565 | des3_speed_template, DES3_SPEED_VECTORS, | ||
| 1566 | speed_template_24); | ||
| 1567 | test_acipher_speed("ofb(des3_ede)", DECRYPT, sec, | ||
| 1568 | des3_speed_template, DES3_SPEED_VECTORS, | ||
| 1569 | speed_template_24); | ||
| 1530 | break; | 1570 | break; |
| 1531 | 1571 | ||
| 1532 | case 502: | 1572 | case 502: |
| @@ -1538,6 +1578,14 @@ static int do_test(int m) | |||
| 1538 | speed_template_8); | 1578 | speed_template_8); |
| 1539 | test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0, | 1579 | test_acipher_speed("cbc(des)", DECRYPT, sec, NULL, 0, |
| 1540 | speed_template_8); | 1580 | speed_template_8); |
| 1581 | test_acipher_speed("cfb(des)", ENCRYPT, sec, NULL, 0, | ||
| 1582 | speed_template_8); | ||
| 1583 | test_acipher_speed("cfb(des)", DECRYPT, sec, NULL, 0, | ||
| 1584 | speed_template_8); | ||
| 1585 | test_acipher_speed("ofb(des)", ENCRYPT, sec, NULL, 0, | ||
| 1586 | speed_template_8); | ||
| 1587 | test_acipher_speed("ofb(des)", DECRYPT, sec, NULL, 0, | ||
| 1588 | speed_template_8); | ||
| 1541 | break; | 1589 | break; |
| 1542 | 1590 | ||
| 1543 | case 503: | 1591 | case 503: |
| @@ -1563,6 +1611,34 @@ static int do_test(int m) | |||
| 1563 | speed_template_32_64); | 1611 | speed_template_32_64); |
| 1564 | break; | 1612 | break; |
| 1565 | 1613 | ||
| 1614 | case 504: | ||
| 1615 | test_acipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0, | ||
| 1616 | speed_template_16_24_32); | ||
| 1617 | test_acipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0, | ||
| 1618 | speed_template_16_24_32); | ||
| 1619 | test_acipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0, | ||
| 1620 | speed_template_16_24_32); | ||
| 1621 | test_acipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0, | ||
| 1622 | speed_template_16_24_32); | ||
| 1623 | test_acipher_speed("ctr(twofish)", ENCRYPT, sec, NULL, 0, | ||
| 1624 | speed_template_16_24_32); | ||
| 1625 | test_acipher_speed("ctr(twofish)", DECRYPT, sec, NULL, 0, | ||
| 1626 | speed_template_16_24_32); | ||
| 1627 | test_acipher_speed("lrw(twofish)", ENCRYPT, sec, NULL, 0, | ||
| 1628 | speed_template_32_40_48); | ||
| 1629 | test_acipher_speed("lrw(twofish)", DECRYPT, sec, NULL, 0, | ||
| 1630 | speed_template_32_40_48); | ||
| 1631 | test_acipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, | ||
| 1632 | speed_template_32_48_64); | ||
| 1633 | test_acipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, | ||
| 1634 | speed_template_32_48_64); | ||
| 1635 | break; | ||
| 1636 | |||
| 1637 | case 505: | ||
| 1638 | test_acipher_speed("ecb(arc4)", ENCRYPT, sec, NULL, 0, | ||
| 1639 | speed_template_8); | ||
| 1640 | break; | ||
| 1641 | |||
| 1566 | case 1000: | 1642 | case 1000: |
| 1567 | test_available(); | 1643 | test_available(); |
| 1568 | break; | 1644 | break; |
diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 5674878ff6c1..a2ca7431760a 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c | |||
| @@ -1534,6 +1534,21 @@ static int alg_test_null(const struct alg_test_desc *desc, | |||
| 1534 | /* Please keep this list sorted by algorithm name. */ | 1534 | /* Please keep this list sorted by algorithm name. */ |
| 1535 | static const struct alg_test_desc alg_test_descs[] = { | 1535 | static const struct alg_test_desc alg_test_descs[] = { |
| 1536 | { | 1536 | { |
| 1537 | .alg = "__cbc-serpent-avx", | ||
| 1538 | .test = alg_test_null, | ||
| 1539 | .suite = { | ||
| 1540 | .cipher = { | ||
| 1541 | .enc = { | ||
| 1542 | .vecs = NULL, | ||
| 1543 | .count = 0 | ||
| 1544 | }, | ||
| 1545 | .dec = { | ||
| 1546 | .vecs = NULL, | ||
| 1547 | .count = 0 | ||
| 1548 | } | ||
| 1549 | } | ||
| 1550 | } | ||
| 1551 | }, { | ||
| 1537 | .alg = "__cbc-serpent-sse2", | 1552 | .alg = "__cbc-serpent-sse2", |
| 1538 | .test = alg_test_null, | 1553 | .test = alg_test_null, |
| 1539 | .suite = { | 1554 | .suite = { |
| @@ -1549,8 +1564,39 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1549 | } | 1564 | } |
| 1550 | } | 1565 | } |
| 1551 | }, { | 1566 | }, { |
| 1567 | .alg = "__cbc-twofish-avx", | ||
| 1568 | .test = alg_test_null, | ||
| 1569 | .suite = { | ||
| 1570 | .cipher = { | ||
| 1571 | .enc = { | ||
| 1572 | .vecs = NULL, | ||
| 1573 | .count = 0 | ||
| 1574 | }, | ||
| 1575 | .dec = { | ||
| 1576 | .vecs = NULL, | ||
| 1577 | .count = 0 | ||
| 1578 | } | ||
| 1579 | } | ||
| 1580 | } | ||
| 1581 | }, { | ||
| 1552 | .alg = "__driver-cbc-aes-aesni", | 1582 | .alg = "__driver-cbc-aes-aesni", |
| 1553 | .test = alg_test_null, | 1583 | .test = alg_test_null, |
| 1584 | .fips_allowed = 1, | ||
| 1585 | .suite = { | ||
| 1586 | .cipher = { | ||
| 1587 | .enc = { | ||
| 1588 | .vecs = NULL, | ||
| 1589 | .count = 0 | ||
| 1590 | }, | ||
| 1591 | .dec = { | ||
| 1592 | .vecs = NULL, | ||
| 1593 | .count = 0 | ||
| 1594 | } | ||
| 1595 | } | ||
| 1596 | } | ||
| 1597 | }, { | ||
| 1598 | .alg = "__driver-cbc-serpent-avx", | ||
| 1599 | .test = alg_test_null, | ||
| 1554 | .suite = { | 1600 | .suite = { |
| 1555 | .cipher = { | 1601 | .cipher = { |
| 1556 | .enc = { | 1602 | .enc = { |
| @@ -1579,8 +1625,39 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1579 | } | 1625 | } |
| 1580 | } | 1626 | } |
| 1581 | }, { | 1627 | }, { |
| 1628 | .alg = "__driver-cbc-twofish-avx", | ||
| 1629 | .test = alg_test_null, | ||
| 1630 | .suite = { | ||
| 1631 | .cipher = { | ||
| 1632 | .enc = { | ||
| 1633 | .vecs = NULL, | ||
| 1634 | .count = 0 | ||
| 1635 | }, | ||
| 1636 | .dec = { | ||
| 1637 | .vecs = NULL, | ||
| 1638 | .count = 0 | ||
| 1639 | } | ||
| 1640 | } | ||
| 1641 | } | ||
| 1642 | }, { | ||
| 1582 | .alg = "__driver-ecb-aes-aesni", | 1643 | .alg = "__driver-ecb-aes-aesni", |
| 1583 | .test = alg_test_null, | 1644 | .test = alg_test_null, |
| 1645 | .fips_allowed = 1, | ||
| 1646 | .suite = { | ||
| 1647 | .cipher = { | ||
| 1648 | .enc = { | ||
| 1649 | .vecs = NULL, | ||
| 1650 | .count = 0 | ||
| 1651 | }, | ||
| 1652 | .dec = { | ||
| 1653 | .vecs = NULL, | ||
| 1654 | .count = 0 | ||
| 1655 | } | ||
| 1656 | } | ||
| 1657 | } | ||
| 1658 | }, { | ||
| 1659 | .alg = "__driver-ecb-serpent-avx", | ||
| 1660 | .test = alg_test_null, | ||
| 1584 | .suite = { | 1661 | .suite = { |
| 1585 | .cipher = { | 1662 | .cipher = { |
| 1586 | .enc = { | 1663 | .enc = { |
| @@ -1609,8 +1686,24 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1609 | } | 1686 | } |
| 1610 | } | 1687 | } |
| 1611 | }, { | 1688 | }, { |
| 1689 | .alg = "__driver-ecb-twofish-avx", | ||
| 1690 | .test = alg_test_null, | ||
| 1691 | .suite = { | ||
| 1692 | .cipher = { | ||
| 1693 | .enc = { | ||
| 1694 | .vecs = NULL, | ||
| 1695 | .count = 0 | ||
| 1696 | }, | ||
| 1697 | .dec = { | ||
| 1698 | .vecs = NULL, | ||
| 1699 | .count = 0 | ||
| 1700 | } | ||
| 1701 | } | ||
| 1702 | } | ||
| 1703 | }, { | ||
| 1612 | .alg = "__ghash-pclmulqdqni", | 1704 | .alg = "__ghash-pclmulqdqni", |
| 1613 | .test = alg_test_null, | 1705 | .test = alg_test_null, |
| 1706 | .fips_allowed = 1, | ||
| 1614 | .suite = { | 1707 | .suite = { |
| 1615 | .hash = { | 1708 | .hash = { |
| 1616 | .vecs = NULL, | 1709 | .vecs = NULL, |
| @@ -1628,6 +1721,42 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1628 | } | 1721 | } |
| 1629 | } | 1722 | } |
| 1630 | }, { | 1723 | }, { |
| 1724 | .alg = "authenc(hmac(sha1),cbc(aes))", | ||
| 1725 | .test = alg_test_aead, | ||
| 1726 | .fips_allowed = 1, | ||
| 1727 | .suite = { | ||
| 1728 | .aead = { | ||
| 1729 | .enc = { | ||
| 1730 | .vecs = hmac_sha1_aes_cbc_enc_tv_template, | ||
| 1731 | .count = HMAC_SHA1_AES_CBC_ENC_TEST_VECTORS | ||
| 1732 | } | ||
| 1733 | } | ||
| 1734 | } | ||
| 1735 | }, { | ||
| 1736 | .alg = "authenc(hmac(sha256),cbc(aes))", | ||
| 1737 | .test = alg_test_aead, | ||
| 1738 | .fips_allowed = 1, | ||
| 1739 | .suite = { | ||
| 1740 | .aead = { | ||
| 1741 | .enc = { | ||
| 1742 | .vecs = hmac_sha256_aes_cbc_enc_tv_template, | ||
| 1743 | .count = HMAC_SHA256_AES_CBC_ENC_TEST_VECTORS | ||
| 1744 | } | ||
| 1745 | } | ||
| 1746 | } | ||
| 1747 | }, { | ||
| 1748 | .alg = "authenc(hmac(sha512),cbc(aes))", | ||
| 1749 | .test = alg_test_aead, | ||
| 1750 | .fips_allowed = 1, | ||
| 1751 | .suite = { | ||
| 1752 | .aead = { | ||
| 1753 | .enc = { | ||
| 1754 | .vecs = hmac_sha512_aes_cbc_enc_tv_template, | ||
| 1755 | .count = HMAC_SHA512_AES_CBC_ENC_TEST_VECTORS | ||
| 1756 | } | ||
| 1757 | } | ||
| 1758 | } | ||
| 1759 | }, { | ||
| 1631 | .alg = "cbc(aes)", | 1760 | .alg = "cbc(aes)", |
| 1632 | .test = alg_test_skcipher, | 1761 | .test = alg_test_skcipher, |
| 1633 | .fips_allowed = 1, | 1762 | .fips_allowed = 1, |
| @@ -1776,8 +1905,40 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1776 | } | 1905 | } |
| 1777 | } | 1906 | } |
| 1778 | }, { | 1907 | }, { |
| 1908 | .alg = "cryptd(__driver-cbc-aes-aesni)", | ||
| 1909 | .test = alg_test_null, | ||
| 1910 | .fips_allowed = 1, | ||
| 1911 | .suite = { | ||
| 1912 | .cipher = { | ||
| 1913 | .enc = { | ||
| 1914 | .vecs = NULL, | ||
| 1915 | .count = 0 | ||
| 1916 | }, | ||
| 1917 | .dec = { | ||
| 1918 | .vecs = NULL, | ||
| 1919 | .count = 0 | ||
| 1920 | } | ||
| 1921 | } | ||
| 1922 | } | ||
| 1923 | }, { | ||
| 1779 | .alg = "cryptd(__driver-ecb-aes-aesni)", | 1924 | .alg = "cryptd(__driver-ecb-aes-aesni)", |
| 1780 | .test = alg_test_null, | 1925 | .test = alg_test_null, |
| 1926 | .fips_allowed = 1, | ||
| 1927 | .suite = { | ||
| 1928 | .cipher = { | ||
| 1929 | .enc = { | ||
| 1930 | .vecs = NULL, | ||
| 1931 | .count = 0 | ||
| 1932 | }, | ||
| 1933 | .dec = { | ||
| 1934 | .vecs = NULL, | ||
| 1935 | .count = 0 | ||
| 1936 | } | ||
| 1937 | } | ||
| 1938 | } | ||
| 1939 | }, { | ||
| 1940 | .alg = "cryptd(__driver-ecb-serpent-avx)", | ||
| 1941 | .test = alg_test_null, | ||
| 1781 | .suite = { | 1942 | .suite = { |
| 1782 | .cipher = { | 1943 | .cipher = { |
| 1783 | .enc = { | 1944 | .enc = { |
| @@ -1806,8 +1967,40 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1806 | } | 1967 | } |
| 1807 | } | 1968 | } |
| 1808 | }, { | 1969 | }, { |
| 1970 | .alg = "cryptd(__driver-ecb-twofish-avx)", | ||
| 1971 | .test = alg_test_null, | ||
| 1972 | .suite = { | ||
| 1973 | .cipher = { | ||
| 1974 | .enc = { | ||
| 1975 | .vecs = NULL, | ||
| 1976 | .count = 0 | ||
| 1977 | }, | ||
| 1978 | .dec = { | ||
| 1979 | .vecs = NULL, | ||
| 1980 | .count = 0 | ||
| 1981 | } | ||
| 1982 | } | ||
| 1983 | } | ||
| 1984 | }, { | ||
| 1985 | .alg = "cryptd(__driver-gcm-aes-aesni)", | ||
| 1986 | .test = alg_test_null, | ||
| 1987 | .fips_allowed = 1, | ||
| 1988 | .suite = { | ||
| 1989 | .cipher = { | ||
| 1990 | .enc = { | ||
| 1991 | .vecs = NULL, | ||
| 1992 | .count = 0 | ||
| 1993 | }, | ||
| 1994 | .dec = { | ||
| 1995 | .vecs = NULL, | ||
| 1996 | .count = 0 | ||
| 1997 | } | ||
| 1998 | } | ||
| 1999 | } | ||
| 2000 | }, { | ||
| 1809 | .alg = "cryptd(__ghash-pclmulqdqni)", | 2001 | .alg = "cryptd(__ghash-pclmulqdqni)", |
| 1810 | .test = alg_test_null, | 2002 | .test = alg_test_null, |
| 2003 | .fips_allowed = 1, | ||
| 1811 | .suite = { | 2004 | .suite = { |
| 1812 | .hash = { | 2005 | .hash = { |
| 1813 | .vecs = NULL, | 2006 | .vecs = NULL, |
| @@ -1923,6 +2116,7 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 1923 | }, { | 2116 | }, { |
| 1924 | .alg = "ecb(__aes-aesni)", | 2117 | .alg = "ecb(__aes-aesni)", |
| 1925 | .test = alg_test_null, | 2118 | .test = alg_test_null, |
| 2119 | .fips_allowed = 1, | ||
| 1926 | .suite = { | 2120 | .suite = { |
| 1927 | .cipher = { | 2121 | .cipher = { |
| 1928 | .enc = { | 2122 | .enc = { |
| @@ -2220,6 +2414,15 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
| 2220 | } | 2414 | } |
| 2221 | } | 2415 | } |
| 2222 | }, { | 2416 | }, { |
| 2417 | .alg = "hmac(crc32)", | ||
| 2418 | .test = alg_test_hash, | ||
| 2419 | .suite = { | ||
| 2420 | .hash = { | ||
| 2421 | .vecs = bfin_crc_tv_template, | ||
| 2422 | .count = BFIN_CRC_TEST_VECTORS | ||
| 2423 | } | ||
| 2424 | } | ||
| 2425 | }, { | ||
| 2223 | .alg = "hmac(md5)", | 2426 | .alg = "hmac(md5)", |
| 2224 | .test = alg_test_hash, | 2427 | .test = alg_test_hash, |
| 2225 | .suite = { | 2428 | .suite = { |
diff --git a/crypto/testmgr.h b/crypto/testmgr.h index 36e5a8ee0e1e..f8179e0344ed 100644 --- a/crypto/testmgr.h +++ b/crypto/testmgr.h | |||
| @@ -2765,8 +2765,62 @@ static struct cipher_testvec tf_enc_tv_template[] = { | |||
| 2765 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 2765 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 2766 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 2766 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 2767 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 2767 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 2768 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 2768 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 2769 | .ilen = 64, | 2769 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 2770 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 2771 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 2772 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 2773 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 2774 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 2775 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 2776 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 2777 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 2778 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 2779 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 2780 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 2781 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 2782 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 2783 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 2784 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 2785 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 2786 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 2787 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 2788 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 2789 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 2790 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 2791 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 2792 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 2793 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 2794 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 2795 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 2796 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 2797 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 2798 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 2799 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 2800 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 2801 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 2802 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 2803 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 2804 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 2805 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 2806 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 2807 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 2808 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 2809 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 2810 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 2811 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 2812 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 2813 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 2814 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 2815 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 2816 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 2817 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 2818 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 2819 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 2820 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 2821 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 2822 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 2823 | .ilen = 496, | ||
| 2770 | .result = "\x88\xCB\x1E\xC2\xAF\x8A\x97\xFF" | 2824 | .result = "\x88\xCB\x1E\xC2\xAF\x8A\x97\xFF" |
| 2771 | "\xF6\x90\x46\x9C\x4A\x0F\x08\xDC" | 2825 | "\xF6\x90\x46\x9C\x4A\x0F\x08\xDC" |
| 2772 | "\xDE\xAB\xAD\xFA\xFC\xA8\xC2\x3D" | 2826 | "\xDE\xAB\xAD\xFA\xFC\xA8\xC2\x3D" |
| @@ -2774,8 +2828,62 @@ static struct cipher_testvec tf_enc_tv_template[] = { | |||
| 2774 | "\x34\x9E\xB6\x08\xB2\xDD\xA8\xF5" | 2828 | "\x34\x9E\xB6\x08\xB2\xDD\xA8\xF5" |
| 2775 | "\xDF\xFA\xC7\xE8\x09\x50\x76\x08" | 2829 | "\xDF\xFA\xC7\xE8\x09\x50\x76\x08" |
| 2776 | "\xA2\xB6\x6A\x59\xC0\x2B\x6D\x05" | 2830 | "\xA2\xB6\x6A\x59\xC0\x2B\x6D\x05" |
| 2777 | "\x89\xF6\x82\xF0\xD3\xDB\x06\x02", | 2831 | "\x89\xF6\x82\xF0\xD3\xDB\x06\x02" |
| 2778 | .rlen = 64, | 2832 | "\xB5\x11\x5C\x5E\x79\x1A\xAC\x43" |
| 2833 | "\x5C\xC0\x30\x4B\x6B\x16\xA1\x40" | ||
| 2834 | "\x80\x27\x88\xBA\x2C\x74\x42\xE0" | ||
| 2835 | "\x1B\xA5\x85\x08\xB9\xE6\x22\x7A" | ||
| 2836 | "\x36\x3B\x0D\x9F\xA0\x22\x6C\x2A" | ||
| 2837 | "\x91\x75\x47\xBC\x67\x21\x4E\xF9" | ||
| 2838 | "\xEA\xFF\xD9\xD5\xC0\xFC\x9E\x2C" | ||
| 2839 | "\x3E\xAD\xC6\x61\x0E\x93\x7A\x22" | ||
| 2840 | "\x09\xC8\x8D\xC1\x8E\xB4\x8B\x5C" | ||
| 2841 | "\xC6\x24\x42\xB8\x23\x66\x80\xA9" | ||
| 2842 | "\x32\x0B\x7A\x29\xBF\xB3\x0B\x63" | ||
| 2843 | "\x43\x27\x13\xA9\xBE\xEB\xBD\xF3" | ||
| 2844 | "\x33\x62\x70\xE2\x1B\x86\x7A\xA1" | ||
| 2845 | "\x51\x4A\x16\xFE\x29\x63\x7E\xD0" | ||
| 2846 | "\x7A\xA4\x6E\x2C\xF8\xC1\xDB\xE8" | ||
| 2847 | "\xCB\x4D\xD2\x8C\x04\x14\xB4\x66" | ||
| 2848 | "\x41\xB7\x3A\x96\x16\x7C\x1D\x5B" | ||
| 2849 | "\xB6\x41\x42\x64\x43\xEE\x6E\x7C" | ||
| 2850 | "\x8B\xAF\x01\x9C\xA4\x6E\x75\x8F" | ||
| 2851 | "\xDE\x10\x9F\xA6\xE7\xD6\x44\x97" | ||
| 2852 | "\x66\xA3\x96\x0F\x1C\x25\x60\xF5" | ||
| 2853 | "\x3C\x2E\x32\x69\x0E\x82\xFF\x27" | ||
| 2854 | "\x0F\xB5\x06\xDA\xD8\x31\x15\x6C" | ||
| 2855 | "\xDF\x18\x6C\x87\xF5\x3B\x11\x9A" | ||
| 2856 | "\x1B\x42\x1F\x5B\x29\x19\x96\x13" | ||
| 2857 | "\x68\x2E\x5E\x08\x1C\x8F\x32\x4B" | ||
| 2858 | "\x81\x77\x6D\xF4\xA0\x01\x42\xEC" | ||
| 2859 | "\xDD\x5B\xFD\x3A\x8E\x6A\x14\xFB" | ||
| 2860 | "\x83\x54\xDF\x0F\x86\xB7\xEA\x40" | ||
| 2861 | "\x46\x39\xF7\x2A\x89\x8D\x4E\x96" | ||
| 2862 | "\x5F\x5F\x6D\x76\xC6\x13\x9D\x3D" | ||
| 2863 | "\x1D\x5F\x0C\x7D\xE2\xBC\xC2\x16" | ||
| 2864 | "\x16\xBE\x89\x3E\xB0\x61\xA2\x5D" | ||
| 2865 | "\xAF\xD1\x40\x5F\x1A\xB8\x26\x41" | ||
| 2866 | "\xC6\xBD\x36\xEF\xED\x29\x50\x6D" | ||
| 2867 | "\x10\xEF\x26\xE8\xA8\x93\x11\x3F" | ||
| 2868 | "\x2D\x1F\x88\x20\x77\x45\xF5\x66" | ||
| 2869 | "\x08\xB9\xF1\xEF\xB1\x93\xA8\x81" | ||
| 2870 | "\x65\xC5\xCD\x3E\x8C\x06\x60\x2C" | ||
| 2871 | "\xB2\x10\x7A\xCA\x05\x25\x59\xDB" | ||
| 2872 | "\xC7\x28\xF5\x20\x35\x52\x9E\x62" | ||
| 2873 | "\xF8\x88\x24\x1C\x4D\x84\x12\x39" | ||
| 2874 | "\x39\xE4\x2E\xF4\xD4\x9D\x2B\xBC" | ||
| 2875 | "\x87\x66\xE6\xC0\x6B\x31\x9A\x66" | ||
| 2876 | "\x03\xDC\x95\xD8\x6B\xD0\x30\x8F" | ||
| 2877 | "\xDF\x8F\x8D\xFA\xEC\x1F\x08\xBD" | ||
| 2878 | "\xA3\x63\xE2\x71\x4F\x03\x94\x87" | ||
| 2879 | "\x50\xDF\x15\x1F\xED\x3A\xA3\x7F" | ||
| 2880 | "\x1F\x2A\xB5\xA1\x69\xAC\x4B\x0D" | ||
| 2881 | "\x84\x9B\x2A\xE9\x55\xDD\x46\x91" | ||
| 2882 | "\x15\x33\xF3\x2B\x9B\x46\x97\x00" | ||
| 2883 | "\xF0\x29\xD8\x59\x5D\x33\x37\xF9" | ||
| 2884 | "\x58\x33\x9B\x78\xC7\x58\x48\x6B" | ||
| 2885 | "\x2C\x75\x64\xC4\xCA\xC1\x7E\xD5", | ||
| 2886 | .rlen = 496, | ||
| 2779 | }, | 2887 | }, |
| 2780 | }; | 2888 | }; |
| 2781 | 2889 | ||
| @@ -2822,8 +2930,62 @@ static struct cipher_testvec tf_dec_tv_template[] = { | |||
| 2822 | "\x34\x9E\xB6\x08\xB2\xDD\xA8\xF5" | 2930 | "\x34\x9E\xB6\x08\xB2\xDD\xA8\xF5" |
| 2823 | "\xDF\xFA\xC7\xE8\x09\x50\x76\x08" | 2931 | "\xDF\xFA\xC7\xE8\x09\x50\x76\x08" |
| 2824 | "\xA2\xB6\x6A\x59\xC0\x2B\x6D\x05" | 2932 | "\xA2\xB6\x6A\x59\xC0\x2B\x6D\x05" |
| 2825 | "\x89\xF6\x82\xF0\xD3\xDB\x06\x02", | 2933 | "\x89\xF6\x82\xF0\xD3\xDB\x06\x02" |
| 2826 | .ilen = 64, | 2934 | "\xB5\x11\x5C\x5E\x79\x1A\xAC\x43" |
| 2935 | "\x5C\xC0\x30\x4B\x6B\x16\xA1\x40" | ||
| 2936 | "\x80\x27\x88\xBA\x2C\x74\x42\xE0" | ||
| 2937 | "\x1B\xA5\x85\x08\xB9\xE6\x22\x7A" | ||
| 2938 | "\x36\x3B\x0D\x9F\xA0\x22\x6C\x2A" | ||
| 2939 | "\x91\x75\x47\xBC\x67\x21\x4E\xF9" | ||
| 2940 | "\xEA\xFF\xD9\xD5\xC0\xFC\x9E\x2C" | ||
| 2941 | "\x3E\xAD\xC6\x61\x0E\x93\x7A\x22" | ||
| 2942 | "\x09\xC8\x8D\xC1\x8E\xB4\x8B\x5C" | ||
| 2943 | "\xC6\x24\x42\xB8\x23\x66\x80\xA9" | ||
| 2944 | "\x32\x0B\x7A\x29\xBF\xB3\x0B\x63" | ||
| 2945 | "\x43\x27\x13\xA9\xBE\xEB\xBD\xF3" | ||
| 2946 | "\x33\x62\x70\xE2\x1B\x86\x7A\xA1" | ||
| 2947 | "\x51\x4A\x16\xFE\x29\x63\x7E\xD0" | ||
| 2948 | "\x7A\xA4\x6E\x2C\xF8\xC1\xDB\xE8" | ||
| 2949 | "\xCB\x4D\xD2\x8C\x04\x14\xB4\x66" | ||
| 2950 | "\x41\xB7\x3A\x96\x16\x7C\x1D\x5B" | ||
| 2951 | "\xB6\x41\x42\x64\x43\xEE\x6E\x7C" | ||
| 2952 | "\x8B\xAF\x01\x9C\xA4\x6E\x75\x8F" | ||
| 2953 | "\xDE\x10\x9F\xA6\xE7\xD6\x44\x97" | ||
| 2954 | "\x66\xA3\x96\x0F\x1C\x25\x60\xF5" | ||
| 2955 | "\x3C\x2E\x32\x69\x0E\x82\xFF\x27" | ||
| 2956 | "\x0F\xB5\x06\xDA\xD8\x31\x15\x6C" | ||
| 2957 | "\xDF\x18\x6C\x87\xF5\x3B\x11\x9A" | ||
| 2958 | "\x1B\x42\x1F\x5B\x29\x19\x96\x13" | ||
| 2959 | "\x68\x2E\x5E\x08\x1C\x8F\x32\x4B" | ||
| 2960 | "\x81\x77\x6D\xF4\xA0\x01\x42\xEC" | ||
| 2961 | "\xDD\x5B\xFD\x3A\x8E\x6A\x14\xFB" | ||
| 2962 | "\x83\x54\xDF\x0F\x86\xB7\xEA\x40" | ||
| 2963 | "\x46\x39\xF7\x2A\x89\x8D\x4E\x96" | ||
| 2964 | "\x5F\x5F\x6D\x76\xC6\x13\x9D\x3D" | ||
| 2965 | "\x1D\x5F\x0C\x7D\xE2\xBC\xC2\x16" | ||
| 2966 | "\x16\xBE\x89\x3E\xB0\x61\xA2\x5D" | ||
| 2967 | "\xAF\xD1\x40\x5F\x1A\xB8\x26\x41" | ||
| 2968 | "\xC6\xBD\x36\xEF\xED\x29\x50\x6D" | ||
| 2969 | "\x10\xEF\x26\xE8\xA8\x93\x11\x3F" | ||
| 2970 | "\x2D\x1F\x88\x20\x77\x45\xF5\x66" | ||
| 2971 | "\x08\xB9\xF1\xEF\xB1\x93\xA8\x81" | ||
| 2972 | "\x65\xC5\xCD\x3E\x8C\x06\x60\x2C" | ||
| 2973 | "\xB2\x10\x7A\xCA\x05\x25\x59\xDB" | ||
| 2974 | "\xC7\x28\xF5\x20\x35\x52\x9E\x62" | ||
| 2975 | "\xF8\x88\x24\x1C\x4D\x84\x12\x39" | ||
| 2976 | "\x39\xE4\x2E\xF4\xD4\x9D\x2B\xBC" | ||
| 2977 | "\x87\x66\xE6\xC0\x6B\x31\x9A\x66" | ||
| 2978 | "\x03\xDC\x95\xD8\x6B\xD0\x30\x8F" | ||
| 2979 | "\xDF\x8F\x8D\xFA\xEC\x1F\x08\xBD" | ||
| 2980 | "\xA3\x63\xE2\x71\x4F\x03\x94\x87" | ||
| 2981 | "\x50\xDF\x15\x1F\xED\x3A\xA3\x7F" | ||
| 2982 | "\x1F\x2A\xB5\xA1\x69\xAC\x4B\x0D" | ||
| 2983 | "\x84\x9B\x2A\xE9\x55\xDD\x46\x91" | ||
| 2984 | "\x15\x33\xF3\x2B\x9B\x46\x97\x00" | ||
| 2985 | "\xF0\x29\xD8\x59\x5D\x33\x37\xF9" | ||
| 2986 | "\x58\x33\x9B\x78\xC7\x58\x48\x6B" | ||
| 2987 | "\x2C\x75\x64\xC4\xCA\xC1\x7E\xD5", | ||
| 2988 | .ilen = 496, | ||
| 2827 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" | 2989 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" |
| 2828 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" | 2990 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" |
| 2829 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" | 2991 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" |
| @@ -2831,8 +2993,62 @@ static struct cipher_testvec tf_dec_tv_template[] = { | |||
| 2831 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 2993 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 2832 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 2994 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 2833 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 2995 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 2834 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 2996 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 2835 | .rlen = 64, | 2997 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 2998 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 2999 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3000 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3001 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3002 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3003 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3004 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3005 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3006 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3007 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3008 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3009 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3010 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3011 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3012 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3013 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3014 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3015 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3016 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3017 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3018 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3019 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3020 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3021 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3022 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3023 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3024 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3025 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3026 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3027 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3028 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3029 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3030 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3031 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3032 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3033 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3034 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3035 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3036 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3037 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3038 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3039 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3040 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3041 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3042 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3043 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3044 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3045 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3046 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3047 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3048 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3049 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3050 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 3051 | .rlen = 496, | ||
| 2836 | }, | 3052 | }, |
| 2837 | }; | 3053 | }; |
| 2838 | 3054 | ||
| @@ -2894,8 +3110,62 @@ static struct cipher_testvec tf_cbc_enc_tv_template[] = { | |||
| 2894 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 3110 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 2895 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3111 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 2896 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3112 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 2897 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 3113 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 2898 | .ilen = 64, | 3114 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3115 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 3116 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3117 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3118 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3119 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3120 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3121 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3122 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3123 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3124 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3125 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3126 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3127 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3128 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3129 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3130 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3131 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3132 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3133 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3134 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3135 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3136 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3137 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3138 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3139 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3140 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3141 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3142 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3143 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3144 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3145 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3146 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3147 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3148 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3149 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3150 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3151 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3152 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3153 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3154 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3155 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3156 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3157 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3158 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3159 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3160 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3161 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3162 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3163 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3164 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3165 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3166 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3167 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 3168 | .ilen = 496, | ||
| 2899 | .result = "\xC8\xFF\xF2\x53\xA6\x27\x09\xD1" | 3169 | .result = "\xC8\xFF\xF2\x53\xA6\x27\x09\xD1" |
| 2900 | "\x33\x38\xC2\xC0\x0C\x14\x7E\xB5" | 3170 | "\x33\x38\xC2\xC0\x0C\x14\x7E\xB5" |
| 2901 | "\x26\x1B\x05\x0C\x05\x12\x3F\xC0" | 3171 | "\x26\x1B\x05\x0C\x05\x12\x3F\xC0" |
| @@ -2903,8 +3173,62 @@ static struct cipher_testvec tf_cbc_enc_tv_template[] = { | |||
| 2903 | "\x3D\x32\xDF\xDA\x56\x00\x6E\xEE" | 3173 | "\x3D\x32\xDF\xDA\x56\x00\x6E\xEE" |
| 2904 | "\x5B\x2A\x72\x9D\xC2\x4D\x19\xBC" | 3174 | "\x5B\x2A\x72\x9D\xC2\x4D\x19\xBC" |
| 2905 | "\x8C\x53\xFA\x87\x6F\xDD\x81\xA3" | 3175 | "\x8C\x53\xFA\x87\x6F\xDD\x81\xA3" |
| 2906 | "\xB1\xD3\x44\x65\xDF\xE7\x63\x38", | 3176 | "\xB1\xD3\x44\x65\xDF\xE7\x63\x38" |
| 2907 | .rlen = 64, | 3177 | "\x4A\xFC\xDC\xEC\x3F\x26\x8E\xB8" |
| 3178 | "\x43\xFC\xFE\x18\xB5\x11\x6D\x31" | ||
| 3179 | "\x81\x8B\x0D\x75\xF6\x80\xEC\x84" | ||
| 3180 | "\x04\xB9\xE6\x09\x63\xED\x39\xDB" | ||
| 3181 | "\xC3\xF6\x14\xD6\x6E\x5E\x8B\xBD" | ||
| 3182 | "\x3E\xFA\xD7\x98\x50\x6F\xD9\x63" | ||
| 3183 | "\x02\xCD\x0D\x39\x4B\x0D\xEC\x80" | ||
| 3184 | "\xE3\x6A\x17\xF4\xCC\xAD\xFF\x68" | ||
| 3185 | "\x45\xDD\xC8\x83\x1D\x41\x96\x0D" | ||
| 3186 | "\x91\x2E\x05\xD3\x59\x82\xE0\x43" | ||
| 3187 | "\x90\x4F\xB9\xF7\xAD\x6B\x2E\xAF" | ||
| 3188 | "\xA7\x84\x00\x53\xCD\x6F\xD1\x0C" | ||
| 3189 | "\x4E\xF9\x5A\x23\xFB\xCA\xC7\xD3" | ||
| 3190 | "\xA9\xAA\x9D\xB2\x3F\x66\xF1\xAC" | ||
| 3191 | "\x25\x21\x8F\xF7\xEF\xF2\x6A\xDF" | ||
| 3192 | "\xE8\xDA\x75\x1A\x8A\xF1\xDD\x38" | ||
| 3193 | "\x1F\xF9\x3D\x68\x4A\xBB\x9E\x34" | ||
| 3194 | "\x1F\x66\x1F\x9C\x2B\x54\xFF\x60" | ||
| 3195 | "\x7F\x29\x4B\x55\x80\x8F\x4E\xA7" | ||
| 3196 | "\xA6\x9A\x0A\xD9\x0D\x19\x00\xF8" | ||
| 3197 | "\x1F\xBC\x0C\x40\x6B\xEC\x99\x25" | ||
| 3198 | "\x94\x70\x74\x0E\x1D\xC5\xBC\x12" | ||
| 3199 | "\xF3\x42\xBE\x95\xBF\xFB\x4E\x55" | ||
| 3200 | "\x9A\xB9\xCE\x14\x16\x5B\xDC\xD3" | ||
| 3201 | "\x75\x42\x62\x04\x31\x1F\x95\x7C" | ||
| 3202 | "\x66\x1A\x97\xDC\x2F\x40\x5C\x39" | ||
| 3203 | "\x78\xE6\x02\xDB\x49\xE1\xC6\x47" | ||
| 3204 | "\xC2\x78\x9A\xBB\xF3\xBE\xCB\x93" | ||
| 3205 | "\xD8\xB8\xE8\xBB\x8C\xB3\x9B\xA7" | ||
| 3206 | "\xC2\x89\xF3\x91\x88\x83\x3D\xF0" | ||
| 3207 | "\x29\xA2\xCD\xB5\x79\x16\xC2\x40" | ||
| 3208 | "\x11\x03\x8E\x9C\xFD\xC9\x43\xC4" | ||
| 3209 | "\xC2\x19\xF0\x4A\x32\xEF\x0C\x2B" | ||
| 3210 | "\xD3\x2B\xE9\xD4\x4C\xDE\x95\xCF" | ||
| 3211 | "\x04\x03\xD3\x2C\x7F\x82\xC8\xFA" | ||
| 3212 | "\x0F\xD8\x7A\x39\x7B\x01\x41\x9C" | ||
| 3213 | "\x78\xB6\xC9\xBF\xF9\x78\x57\x88" | ||
| 3214 | "\xB1\xA5\xE1\xE0\xD9\x16\xD4\xC8" | ||
| 3215 | "\xEE\xC4\xBE\x7B\x55\x59\x00\x48" | ||
| 3216 | "\x1B\xBC\x14\xFA\x2A\x9D\xC9\x1C" | ||
| 3217 | "\xFB\x28\x3F\x95\xDD\xB7\xD6\xCE" | ||
| 3218 | "\x3A\x7F\x09\x0C\x0E\x69\x30\x7D" | ||
| 3219 | "\xBC\x68\x9C\x91\x2A\x59\x57\x04" | ||
| 3220 | "\xED\x1A\x1E\x00\xB1\x85\x92\x04" | ||
| 3221 | "\x28\x8C\x0C\x3C\xC1\xD5\x12\xF7" | ||
| 3222 | "\x4C\x3E\xB0\xE7\x86\x62\x68\x91" | ||
| 3223 | "\xFC\xC4\xE2\xCE\xA6\xDC\x5E\x93" | ||
| 3224 | "\x5D\x8D\x8C\x68\xB3\xB2\xB9\x64" | ||
| 3225 | "\x16\xB8\xC8\x6F\xD8\xEE\x21\xBD" | ||
| 3226 | "\xAC\x18\x0C\x7D\x0D\x05\xAB\xF1" | ||
| 3227 | "\xFA\xDD\xE2\x48\xDF\x4C\x02\x39" | ||
| 3228 | "\x69\xA1\x62\xBD\x49\x3A\x9D\x91" | ||
| 3229 | "\x30\x70\x56\xA4\x37\xDD\x7C\xC0" | ||
| 3230 | "\x0A\xA3\x30\x10\x26\x25\x41\x2C", | ||
| 3231 | .rlen = 496, | ||
| 2908 | }, | 3232 | }, |
| 2909 | }; | 3233 | }; |
| 2910 | 3234 | ||
| @@ -2966,8 +3290,62 @@ static struct cipher_testvec tf_cbc_dec_tv_template[] = { | |||
| 2966 | "\x3D\x32\xDF\xDA\x56\x00\x6E\xEE" | 3290 | "\x3D\x32\xDF\xDA\x56\x00\x6E\xEE" |
| 2967 | "\x5B\x2A\x72\x9D\xC2\x4D\x19\xBC" | 3291 | "\x5B\x2A\x72\x9D\xC2\x4D\x19\xBC" |
| 2968 | "\x8C\x53\xFA\x87\x6F\xDD\x81\xA3" | 3292 | "\x8C\x53\xFA\x87\x6F\xDD\x81\xA3" |
| 2969 | "\xB1\xD3\x44\x65\xDF\xE7\x63\x38", | 3293 | "\xB1\xD3\x44\x65\xDF\xE7\x63\x38" |
| 2970 | .ilen = 64, | 3294 | "\x4A\xFC\xDC\xEC\x3F\x26\x8E\xB8" |
| 3295 | "\x43\xFC\xFE\x18\xB5\x11\x6D\x31" | ||
| 3296 | "\x81\x8B\x0D\x75\xF6\x80\xEC\x84" | ||
| 3297 | "\x04\xB9\xE6\x09\x63\xED\x39\xDB" | ||
| 3298 | "\xC3\xF6\x14\xD6\x6E\x5E\x8B\xBD" | ||
| 3299 | "\x3E\xFA\xD7\x98\x50\x6F\xD9\x63" | ||
| 3300 | "\x02\xCD\x0D\x39\x4B\x0D\xEC\x80" | ||
| 3301 | "\xE3\x6A\x17\xF4\xCC\xAD\xFF\x68" | ||
| 3302 | "\x45\xDD\xC8\x83\x1D\x41\x96\x0D" | ||
| 3303 | "\x91\x2E\x05\xD3\x59\x82\xE0\x43" | ||
| 3304 | "\x90\x4F\xB9\xF7\xAD\x6B\x2E\xAF" | ||
| 3305 | "\xA7\x84\x00\x53\xCD\x6F\xD1\x0C" | ||
| 3306 | "\x4E\xF9\x5A\x23\xFB\xCA\xC7\xD3" | ||
| 3307 | "\xA9\xAA\x9D\xB2\x3F\x66\xF1\xAC" | ||
| 3308 | "\x25\x21\x8F\xF7\xEF\xF2\x6A\xDF" | ||
| 3309 | "\xE8\xDA\x75\x1A\x8A\xF1\xDD\x38" | ||
| 3310 | "\x1F\xF9\x3D\x68\x4A\xBB\x9E\x34" | ||
| 3311 | "\x1F\x66\x1F\x9C\x2B\x54\xFF\x60" | ||
| 3312 | "\x7F\x29\x4B\x55\x80\x8F\x4E\xA7" | ||
| 3313 | "\xA6\x9A\x0A\xD9\x0D\x19\x00\xF8" | ||
| 3314 | "\x1F\xBC\x0C\x40\x6B\xEC\x99\x25" | ||
| 3315 | "\x94\x70\x74\x0E\x1D\xC5\xBC\x12" | ||
| 3316 | "\xF3\x42\xBE\x95\xBF\xFB\x4E\x55" | ||
| 3317 | "\x9A\xB9\xCE\x14\x16\x5B\xDC\xD3" | ||
| 3318 | "\x75\x42\x62\x04\x31\x1F\x95\x7C" | ||
| 3319 | "\x66\x1A\x97\xDC\x2F\x40\x5C\x39" | ||
| 3320 | "\x78\xE6\x02\xDB\x49\xE1\xC6\x47" | ||
| 3321 | "\xC2\x78\x9A\xBB\xF3\xBE\xCB\x93" | ||
| 3322 | "\xD8\xB8\xE8\xBB\x8C\xB3\x9B\xA7" | ||
| 3323 | "\xC2\x89\xF3\x91\x88\x83\x3D\xF0" | ||
| 3324 | "\x29\xA2\xCD\xB5\x79\x16\xC2\x40" | ||
| 3325 | "\x11\x03\x8E\x9C\xFD\xC9\x43\xC4" | ||
| 3326 | "\xC2\x19\xF0\x4A\x32\xEF\x0C\x2B" | ||
| 3327 | "\xD3\x2B\xE9\xD4\x4C\xDE\x95\xCF" | ||
| 3328 | "\x04\x03\xD3\x2C\x7F\x82\xC8\xFA" | ||
| 3329 | "\x0F\xD8\x7A\x39\x7B\x01\x41\x9C" | ||
| 3330 | "\x78\xB6\xC9\xBF\xF9\x78\x57\x88" | ||
| 3331 | "\xB1\xA5\xE1\xE0\xD9\x16\xD4\xC8" | ||
| 3332 | "\xEE\xC4\xBE\x7B\x55\x59\x00\x48" | ||
| 3333 | "\x1B\xBC\x14\xFA\x2A\x9D\xC9\x1C" | ||
| 3334 | "\xFB\x28\x3F\x95\xDD\xB7\xD6\xCE" | ||
| 3335 | "\x3A\x7F\x09\x0C\x0E\x69\x30\x7D" | ||
| 3336 | "\xBC\x68\x9C\x91\x2A\x59\x57\x04" | ||
| 3337 | "\xED\x1A\x1E\x00\xB1\x85\x92\x04" | ||
| 3338 | "\x28\x8C\x0C\x3C\xC1\xD5\x12\xF7" | ||
| 3339 | "\x4C\x3E\xB0\xE7\x86\x62\x68\x91" | ||
| 3340 | "\xFC\xC4\xE2\xCE\xA6\xDC\x5E\x93" | ||
| 3341 | "\x5D\x8D\x8C\x68\xB3\xB2\xB9\x64" | ||
| 3342 | "\x16\xB8\xC8\x6F\xD8\xEE\x21\xBD" | ||
| 3343 | "\xAC\x18\x0C\x7D\x0D\x05\xAB\xF1" | ||
| 3344 | "\xFA\xDD\xE2\x48\xDF\x4C\x02\x39" | ||
| 3345 | "\x69\xA1\x62\xBD\x49\x3A\x9D\x91" | ||
| 3346 | "\x30\x70\x56\xA4\x37\xDD\x7C\xC0" | ||
| 3347 | "\x0A\xA3\x30\x10\x26\x25\x41\x2C", | ||
| 3348 | .ilen = 496, | ||
| 2971 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" | 3349 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" |
| 2972 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" | 3350 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" |
| 2973 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" | 3351 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" |
| @@ -2975,8 +3353,62 @@ static struct cipher_testvec tf_cbc_dec_tv_template[] = { | |||
| 2975 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 3353 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 2976 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3354 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 2977 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3355 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 2978 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 3356 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 2979 | .rlen = 64, | 3357 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3358 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 3359 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3360 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3361 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3362 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3363 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3364 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3365 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3366 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3367 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3368 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3369 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3370 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3371 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3372 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3373 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3374 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3375 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3376 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3377 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3378 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3379 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3380 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3381 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3382 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3383 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3384 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3385 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3386 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3387 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3388 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3389 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3390 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3391 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3392 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3393 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3394 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3395 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3396 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3397 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3398 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3399 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3400 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3401 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3402 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3403 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3404 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3405 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3406 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3407 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3408 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3409 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3410 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 3411 | .rlen = 496, | ||
| 2980 | }, | 3412 | }, |
| 2981 | }; | 3413 | }; |
| 2982 | 3414 | ||
| @@ -2996,8 +3428,62 @@ static struct cipher_testvec tf_ctr_enc_tv_template[] = { | |||
| 2996 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 3428 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 2997 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3429 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 2998 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3430 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 2999 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 3431 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 3000 | .ilen = 64, | 3432 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3433 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 3434 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3435 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3436 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3437 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3438 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3439 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3440 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3441 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3442 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3443 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3444 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3445 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3446 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3447 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3448 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3449 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3450 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3451 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3452 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3453 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3454 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3455 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3456 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3457 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3458 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3459 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3460 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3461 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3462 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3463 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3464 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3465 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3466 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3467 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3468 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3469 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3470 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3471 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3472 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3473 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3474 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3475 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3476 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3477 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3478 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3479 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3480 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3481 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3482 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3483 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3484 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3485 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 3486 | .ilen = 496, | ||
| 3001 | .result = "\xDF\xDD\x69\xFA\xB0\x2E\xFD\xFE" | 3487 | .result = "\xDF\xDD\x69\xFA\xB0\x2E\xFD\xFE" |
| 3002 | "\x70\x9E\xC5\x4B\xC9\xD4\xA1\x30" | 3488 | "\x70\x9E\xC5\x4B\xC9\xD4\xA1\x30" |
| 3003 | "\x26\x9B\x89\xA1\xEE\x43\xE0\x52" | 3489 | "\x26\x9B\x89\xA1\xEE\x43\xE0\x52" |
| @@ -3005,8 +3491,62 @@ static struct cipher_testvec tf_ctr_enc_tv_template[] = { | |||
| 3005 | "\x9F\x8D\x40\x9F\x24\xFD\x92\xA0" | 3491 | "\x9F\x8D\x40\x9F\x24\xFD\x92\xA0" |
| 3006 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" | 3492 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" |
| 3007 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" | 3493 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" |
| 3008 | "\x01\x41\x21\x12\x38\xAB\x52\x4F", | 3494 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" |
| 3009 | .rlen = 64, | 3495 | "\xA8\x57\x20\xE0\x21\x6A\x17\x0D" |
| 3496 | "\x0E\xF9\x8E\x49\x42\x00\x3C\x94" | ||
| 3497 | "\x14\xC0\xD0\x8D\x8A\x98\xEB\x29" | ||
| 3498 | "\xEC\xAE\x96\x44\xC0\x3C\x48\xDC" | ||
| 3499 | "\x29\x35\x25\x2F\xE7\x11\x6C\x68" | ||
| 3500 | "\xC8\x67\x0A\x2F\xF4\x07\xBE\xF9" | ||
| 3501 | "\x2C\x31\x87\x40\xAB\xB2\xB6\xFA" | ||
| 3502 | "\xD2\xC9\x6D\x5C\x50\xE9\xE6\x7E" | ||
| 3503 | "\xE3\x0A\xD2\xD5\x6D\x8D\x64\x9E" | ||
| 3504 | "\x70\xCE\x03\x76\xDD\xE0\xF0\x8C" | ||
| 3505 | "\x84\x86\x8B\x6A\xFE\xC7\xF9\x69" | ||
| 3506 | "\x2E\xFE\xFC\xC2\xC4\x1A\x55\x58" | ||
| 3507 | "\xB3\xBE\xE2\x7E\xED\x39\x42\x6C" | ||
| 3508 | "\xB4\x42\x97\x9A\xEC\xE1\x0A\x06" | ||
| 3509 | "\x02\xC5\x03\x9D\xC4\x48\x15\x66" | ||
| 3510 | "\x35\x6A\xC2\xC9\xA2\x26\x30\xBB" | ||
| 3511 | "\xDB\x2D\xC8\x08\x2B\xA0\x29\x1A" | ||
| 3512 | "\x23\x61\x48\xEA\x80\x04\x27\xAA" | ||
| 3513 | "\x69\x49\xE8\xE8\x4A\x83\x6B\x5A" | ||
| 3514 | "\xCA\x7C\xD3\xB1\xB5\x0B\xCC\x23" | ||
| 3515 | "\x74\x1F\xA9\x87\xCD\xED\xC0\x2D" | ||
| 3516 | "\xBF\xEB\xCF\x16\x2D\x2A\x2E\x1D" | ||
| 3517 | "\x96\xBA\x36\x11\x45\x41\xDA\xCE" | ||
| 3518 | "\xA4\x48\x80\x8B\x06\xF4\x98\x89" | ||
| 3519 | "\x8B\x23\x08\x53\xF4\xD4\x5A\x24" | ||
| 3520 | "\x8B\xF8\x43\x73\xD1\xEE\xC4\xB0" | ||
| 3521 | "\xF8\xFE\x09\x0C\x75\x05\x38\x0B" | ||
| 3522 | "\x7C\x81\xDE\x9D\xE4\x61\x37\x63" | ||
| 3523 | "\x63\xAD\x12\xD2\x04\xB9\xCE\x45" | ||
| 3524 | "\x5A\x1A\x6E\xB3\x78\x2A\xA4\x74" | ||
| 3525 | "\x86\xD0\xE3\xFF\xDA\x38\x9C\xB5" | ||
| 3526 | "\xB8\xB1\xDB\x38\x2F\xC5\x6A\xB4" | ||
| 3527 | "\xEB\x6E\x96\xE8\x43\x80\xB5\x51" | ||
| 3528 | "\x61\x2D\x48\xAA\x07\x65\x11\x8C" | ||
| 3529 | "\x48\xE3\x90\x7E\x78\x3A\xEC\x97" | ||
| 3530 | "\x05\x3D\x84\xE7\x90\x2B\xAA\xBD" | ||
| 3531 | "\x83\x29\x0E\x1A\x81\x73\x7B\xE0" | ||
| 3532 | "\x7A\x01\x4A\x37\x3B\x77\x7F\x8D" | ||
| 3533 | "\x49\xA4\x2F\x6E\xBE\x68\x99\x08" | ||
| 3534 | "\x99\xAA\x4C\x12\x04\xAE\x1F\x77" | ||
| 3535 | "\x35\x88\xF1\x65\x06\x0A\x0B\x4D" | ||
| 3536 | "\x47\xF9\x50\x38\x5D\x71\xF9\x6E" | ||
| 3537 | "\xDE\xEC\x61\x35\x2C\x4C\x96\x50" | ||
| 3538 | "\xE8\x28\x93\x9C\x7E\x01\xC6\x04" | ||
| 3539 | "\xB2\xD6\xBC\x6C\x17\xEB\xC1\x7D" | ||
| 3540 | "\x11\xE9\x43\x83\x76\xAA\x53\x37" | ||
| 3541 | "\x0C\x1D\x39\x89\x53\x72\x09\x7E" | ||
| 3542 | "\xD9\x85\x16\x04\xA5\x2C\x05\x6F" | ||
| 3543 | "\x17\x0C\x6E\x66\xAA\x84\xA7\xD9" | ||
| 3544 | "\xE2\xD9\xC4\xEB\x43\x3E\xB1\x8D" | ||
| 3545 | "\x7C\x36\xC7\x71\x70\x9C\x10\xD8" | ||
| 3546 | "\xE8\x47\x2A\x4D\xFD\xA1\xBC\xE3" | ||
| 3547 | "\xB9\x32\xE2\xC1\x82\xAC\xFE\xCC" | ||
| 3548 | "\xC5\xC9\x7F\x9E\xCF\x33\x7A\xDF", | ||
| 3549 | .rlen = 496, | ||
| 3010 | }, { /* Generated with Crypto++ */ | 3550 | }, { /* Generated with Crypto++ */ |
| 3011 | .key = "\x85\x62\x3F\x1C\xF9\xD6\x1C\xF9" | 3551 | .key = "\x85\x62\x3F\x1C\xF9\xD6\x1C\xF9" |
| 3012 | "\xD6\xB3\x90\x6D\x4A\x90\x6D\x4A" | 3552 | "\xD6\xB3\x90\x6D\x4A\x90\x6D\x4A" |
| @@ -3023,8 +3563,62 @@ static struct cipher_testvec tf_ctr_enc_tv_template[] = { | |||
| 3023 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3563 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 3024 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3564 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 3025 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" | 3565 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 3026 | "\xC3\x37\xCE", | 3566 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3027 | .ilen = 67, | 3567 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" |
| 3568 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3569 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3570 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3571 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3572 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3573 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3574 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3575 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3576 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3577 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3578 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3579 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3580 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3581 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3582 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3583 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3584 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3585 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3586 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3587 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3588 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3589 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3590 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3591 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3592 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3593 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3594 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3595 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3596 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3597 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3598 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3599 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3600 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3601 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3602 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3603 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3604 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3605 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3606 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3607 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3608 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3609 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3610 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3611 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3612 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3613 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3614 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3615 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3616 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3617 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3618 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3619 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7" | ||
| 3620 | "\x2B\xC2\x59", | ||
| 3621 | .ilen = 499, | ||
| 3028 | .result = "\xDF\xDD\x69\xFA\xB0\x2E\xFD\xFE" | 3622 | .result = "\xDF\xDD\x69\xFA\xB0\x2E\xFD\xFE" |
| 3029 | "\x70\x9E\xC5\x4B\xC9\xD4\xA1\x30" | 3623 | "\x70\x9E\xC5\x4B\xC9\xD4\xA1\x30" |
| 3030 | "\x26\x9B\x89\xA1\xEE\x43\xE0\x52" | 3624 | "\x26\x9B\x89\xA1\xEE\x43\xE0\x52" |
| @@ -3033,8 +3627,62 @@ static struct cipher_testvec tf_ctr_enc_tv_template[] = { | |||
| 3033 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" | 3627 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" |
| 3034 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" | 3628 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" |
| 3035 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" | 3629 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" |
| 3036 | "\xA8\x57\x20", | 3630 | "\xA8\x57\x20\xE0\x21\x6A\x17\x0D" |
| 3037 | .rlen = 67, | 3631 | "\x0E\xF9\x8E\x49\x42\x00\x3C\x94" |
| 3632 | "\x14\xC0\xD0\x8D\x8A\x98\xEB\x29" | ||
| 3633 | "\xEC\xAE\x96\x44\xC0\x3C\x48\xDC" | ||
| 3634 | "\x29\x35\x25\x2F\xE7\x11\x6C\x68" | ||
| 3635 | "\xC8\x67\x0A\x2F\xF4\x07\xBE\xF9" | ||
| 3636 | "\x2C\x31\x87\x40\xAB\xB2\xB6\xFA" | ||
| 3637 | "\xD2\xC9\x6D\x5C\x50\xE9\xE6\x7E" | ||
| 3638 | "\xE3\x0A\xD2\xD5\x6D\x8D\x64\x9E" | ||
| 3639 | "\x70\xCE\x03\x76\xDD\xE0\xF0\x8C" | ||
| 3640 | "\x84\x86\x8B\x6A\xFE\xC7\xF9\x69" | ||
| 3641 | "\x2E\xFE\xFC\xC2\xC4\x1A\x55\x58" | ||
| 3642 | "\xB3\xBE\xE2\x7E\xED\x39\x42\x6C" | ||
| 3643 | "\xB4\x42\x97\x9A\xEC\xE1\x0A\x06" | ||
| 3644 | "\x02\xC5\x03\x9D\xC4\x48\x15\x66" | ||
| 3645 | "\x35\x6A\xC2\xC9\xA2\x26\x30\xBB" | ||
| 3646 | "\xDB\x2D\xC8\x08\x2B\xA0\x29\x1A" | ||
| 3647 | "\x23\x61\x48\xEA\x80\x04\x27\xAA" | ||
| 3648 | "\x69\x49\xE8\xE8\x4A\x83\x6B\x5A" | ||
| 3649 | "\xCA\x7C\xD3\xB1\xB5\x0B\xCC\x23" | ||
| 3650 | "\x74\x1F\xA9\x87\xCD\xED\xC0\x2D" | ||
| 3651 | "\xBF\xEB\xCF\x16\x2D\x2A\x2E\x1D" | ||
| 3652 | "\x96\xBA\x36\x11\x45\x41\xDA\xCE" | ||
| 3653 | "\xA4\x48\x80\x8B\x06\xF4\x98\x89" | ||
| 3654 | "\x8B\x23\x08\x53\xF4\xD4\x5A\x24" | ||
| 3655 | "\x8B\xF8\x43\x73\xD1\xEE\xC4\xB0" | ||
| 3656 | "\xF8\xFE\x09\x0C\x75\x05\x38\x0B" | ||
| 3657 | "\x7C\x81\xDE\x9D\xE4\x61\x37\x63" | ||
| 3658 | "\x63\xAD\x12\xD2\x04\xB9\xCE\x45" | ||
| 3659 | "\x5A\x1A\x6E\xB3\x78\x2A\xA4\x74" | ||
| 3660 | "\x86\xD0\xE3\xFF\xDA\x38\x9C\xB5" | ||
| 3661 | "\xB8\xB1\xDB\x38\x2F\xC5\x6A\xB4" | ||
| 3662 | "\xEB\x6E\x96\xE8\x43\x80\xB5\x51" | ||
| 3663 | "\x61\x2D\x48\xAA\x07\x65\x11\x8C" | ||
| 3664 | "\x48\xE3\x90\x7E\x78\x3A\xEC\x97" | ||
| 3665 | "\x05\x3D\x84\xE7\x90\x2B\xAA\xBD" | ||
| 3666 | "\x83\x29\x0E\x1A\x81\x73\x7B\xE0" | ||
| 3667 | "\x7A\x01\x4A\x37\x3B\x77\x7F\x8D" | ||
| 3668 | "\x49\xA4\x2F\x6E\xBE\x68\x99\x08" | ||
| 3669 | "\x99\xAA\x4C\x12\x04\xAE\x1F\x77" | ||
| 3670 | "\x35\x88\xF1\x65\x06\x0A\x0B\x4D" | ||
| 3671 | "\x47\xF9\x50\x38\x5D\x71\xF9\x6E" | ||
| 3672 | "\xDE\xEC\x61\x35\x2C\x4C\x96\x50" | ||
| 3673 | "\xE8\x28\x93\x9C\x7E\x01\xC6\x04" | ||
| 3674 | "\xB2\xD6\xBC\x6C\x17\xEB\xC1\x7D" | ||
| 3675 | "\x11\xE9\x43\x83\x76\xAA\x53\x37" | ||
| 3676 | "\x0C\x1D\x39\x89\x53\x72\x09\x7E" | ||
| 3677 | "\xD9\x85\x16\x04\xA5\x2C\x05\x6F" | ||
| 3678 | "\x17\x0C\x6E\x66\xAA\x84\xA7\xD9" | ||
| 3679 | "\xE2\xD9\xC4\xEB\x43\x3E\xB1\x8D" | ||
| 3680 | "\x7C\x36\xC7\x71\x70\x9C\x10\xD8" | ||
| 3681 | "\xE8\x47\x2A\x4D\xFD\xA1\xBC\xE3" | ||
| 3682 | "\xB9\x32\xE2\xC1\x82\xAC\xFE\xCC" | ||
| 3683 | "\xC5\xC9\x7F\x9E\xCF\x33\x7A\xDF" | ||
| 3684 | "\x6C\x82\x9D", | ||
| 3685 | .rlen = 499, | ||
| 3038 | }, | 3686 | }, |
| 3039 | }; | 3687 | }; |
| 3040 | 3688 | ||
| @@ -3054,8 +3702,62 @@ static struct cipher_testvec tf_ctr_dec_tv_template[] = { | |||
| 3054 | "\x9F\x8D\x40\x9F\x24\xFD\x92\xA0" | 3702 | "\x9F\x8D\x40\x9F\x24\xFD\x92\xA0" |
| 3055 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" | 3703 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" |
| 3056 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" | 3704 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" |
| 3057 | "\x01\x41\x21\x12\x38\xAB\x52\x4F", | 3705 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" |
| 3058 | .ilen = 64, | 3706 | "\xA8\x57\x20\xE0\x21\x6A\x17\x0D" |
| 3707 | "\x0E\xF9\x8E\x49\x42\x00\x3C\x94" | ||
| 3708 | "\x14\xC0\xD0\x8D\x8A\x98\xEB\x29" | ||
| 3709 | "\xEC\xAE\x96\x44\xC0\x3C\x48\xDC" | ||
| 3710 | "\x29\x35\x25\x2F\xE7\x11\x6C\x68" | ||
| 3711 | "\xC8\x67\x0A\x2F\xF4\x07\xBE\xF9" | ||
| 3712 | "\x2C\x31\x87\x40\xAB\xB2\xB6\xFA" | ||
| 3713 | "\xD2\xC9\x6D\x5C\x50\xE9\xE6\x7E" | ||
| 3714 | "\xE3\x0A\xD2\xD5\x6D\x8D\x64\x9E" | ||
| 3715 | "\x70\xCE\x03\x76\xDD\xE0\xF0\x8C" | ||
| 3716 | "\x84\x86\x8B\x6A\xFE\xC7\xF9\x69" | ||
| 3717 | "\x2E\xFE\xFC\xC2\xC4\x1A\x55\x58" | ||
| 3718 | "\xB3\xBE\xE2\x7E\xED\x39\x42\x6C" | ||
| 3719 | "\xB4\x42\x97\x9A\xEC\xE1\x0A\x06" | ||
| 3720 | "\x02\xC5\x03\x9D\xC4\x48\x15\x66" | ||
| 3721 | "\x35\x6A\xC2\xC9\xA2\x26\x30\xBB" | ||
| 3722 | "\xDB\x2D\xC8\x08\x2B\xA0\x29\x1A" | ||
| 3723 | "\x23\x61\x48\xEA\x80\x04\x27\xAA" | ||
| 3724 | "\x69\x49\xE8\xE8\x4A\x83\x6B\x5A" | ||
| 3725 | "\xCA\x7C\xD3\xB1\xB5\x0B\xCC\x23" | ||
| 3726 | "\x74\x1F\xA9\x87\xCD\xED\xC0\x2D" | ||
| 3727 | "\xBF\xEB\xCF\x16\x2D\x2A\x2E\x1D" | ||
| 3728 | "\x96\xBA\x36\x11\x45\x41\xDA\xCE" | ||
| 3729 | "\xA4\x48\x80\x8B\x06\xF4\x98\x89" | ||
| 3730 | "\x8B\x23\x08\x53\xF4\xD4\x5A\x24" | ||
| 3731 | "\x8B\xF8\x43\x73\xD1\xEE\xC4\xB0" | ||
| 3732 | "\xF8\xFE\x09\x0C\x75\x05\x38\x0B" | ||
| 3733 | "\x7C\x81\xDE\x9D\xE4\x61\x37\x63" | ||
| 3734 | "\x63\xAD\x12\xD2\x04\xB9\xCE\x45" | ||
| 3735 | "\x5A\x1A\x6E\xB3\x78\x2A\xA4\x74" | ||
| 3736 | "\x86\xD0\xE3\xFF\xDA\x38\x9C\xB5" | ||
| 3737 | "\xB8\xB1\xDB\x38\x2F\xC5\x6A\xB4" | ||
| 3738 | "\xEB\x6E\x96\xE8\x43\x80\xB5\x51" | ||
| 3739 | "\x61\x2D\x48\xAA\x07\x65\x11\x8C" | ||
| 3740 | "\x48\xE3\x90\x7E\x78\x3A\xEC\x97" | ||
| 3741 | "\x05\x3D\x84\xE7\x90\x2B\xAA\xBD" | ||
| 3742 | "\x83\x29\x0E\x1A\x81\x73\x7B\xE0" | ||
| 3743 | "\x7A\x01\x4A\x37\x3B\x77\x7F\x8D" | ||
| 3744 | "\x49\xA4\x2F\x6E\xBE\x68\x99\x08" | ||
| 3745 | "\x99\xAA\x4C\x12\x04\xAE\x1F\x77" | ||
| 3746 | "\x35\x88\xF1\x65\x06\x0A\x0B\x4D" | ||
| 3747 | "\x47\xF9\x50\x38\x5D\x71\xF9\x6E" | ||
| 3748 | "\xDE\xEC\x61\x35\x2C\x4C\x96\x50" | ||
| 3749 | "\xE8\x28\x93\x9C\x7E\x01\xC6\x04" | ||
| 3750 | "\xB2\xD6\xBC\x6C\x17\xEB\xC1\x7D" | ||
| 3751 | "\x11\xE9\x43\x83\x76\xAA\x53\x37" | ||
| 3752 | "\x0C\x1D\x39\x89\x53\x72\x09\x7E" | ||
| 3753 | "\xD9\x85\x16\x04\xA5\x2C\x05\x6F" | ||
| 3754 | "\x17\x0C\x6E\x66\xAA\x84\xA7\xD9" | ||
| 3755 | "\xE2\xD9\xC4\xEB\x43\x3E\xB1\x8D" | ||
| 3756 | "\x7C\x36\xC7\x71\x70\x9C\x10\xD8" | ||
| 3757 | "\xE8\x47\x2A\x4D\xFD\xA1\xBC\xE3" | ||
| 3758 | "\xB9\x32\xE2\xC1\x82\xAC\xFE\xCC" | ||
| 3759 | "\xC5\xC9\x7F\x9E\xCF\x33\x7A\xDF", | ||
| 3760 | .ilen = 496, | ||
| 3059 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" | 3761 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" |
| 3060 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" | 3762 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" |
| 3061 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" | 3763 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" |
| @@ -3063,8 +3765,62 @@ static struct cipher_testvec tf_ctr_dec_tv_template[] = { | |||
| 3063 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" | 3765 | "\x1E\x92\x29\xC0\x34\xCB\x62\xF9" |
| 3064 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3766 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 3065 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3767 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 3066 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C", | 3768 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 3067 | .rlen = 64, | 3769 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3770 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" | ||
| 3771 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3772 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3773 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3774 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3775 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3776 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3777 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3778 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3779 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3780 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3781 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3782 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3783 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3784 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3785 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3786 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3787 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3788 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3789 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3790 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3791 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3792 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3793 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3794 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3795 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3796 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3797 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3798 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3799 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3800 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3801 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3802 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3803 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3804 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3805 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3806 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3807 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3808 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3809 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3810 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3811 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3812 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3813 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3814 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3815 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3816 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3817 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3818 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3819 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3820 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3821 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3822 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7", | ||
| 3823 | .rlen = 496, | ||
| 3068 | }, { /* Generated with Crypto++ */ | 3824 | }, { /* Generated with Crypto++ */ |
| 3069 | .key = "\x85\x62\x3F\x1C\xF9\xD6\x1C\xF9" | 3825 | .key = "\x85\x62\x3F\x1C\xF9\xD6\x1C\xF9" |
| 3070 | "\xD6\xB3\x90\x6D\x4A\x90\x6D\x4A" | 3826 | "\xD6\xB3\x90\x6D\x4A\x90\x6D\x4A" |
| @@ -3081,8 +3837,62 @@ static struct cipher_testvec tf_ctr_dec_tv_template[] = { | |||
| 3081 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" | 3837 | "\xBC\x8F\x35\xDD\x67\x38\xD8\xAA" |
| 3082 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" | 3838 | "\xCF\xF8\x48\xCA\xFB\xE4\x5C\x60" |
| 3083 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" | 3839 | "\x01\x41\x21\x12\x38\xAB\x52\x4F" |
| 3084 | "\xA8\x57\x20", | 3840 | "\xA8\x57\x20\xE0\x21\x6A\x17\x0D" |
| 3085 | .ilen = 67, | 3841 | "\x0E\xF9\x8E\x49\x42\x00\x3C\x94" |
| 3842 | "\x14\xC0\xD0\x8D\x8A\x98\xEB\x29" | ||
| 3843 | "\xEC\xAE\x96\x44\xC0\x3C\x48\xDC" | ||
| 3844 | "\x29\x35\x25\x2F\xE7\x11\x6C\x68" | ||
| 3845 | "\xC8\x67\x0A\x2F\xF4\x07\xBE\xF9" | ||
| 3846 | "\x2C\x31\x87\x40\xAB\xB2\xB6\xFA" | ||
| 3847 | "\xD2\xC9\x6D\x5C\x50\xE9\xE6\x7E" | ||
| 3848 | "\xE3\x0A\xD2\xD5\x6D\x8D\x64\x9E" | ||
| 3849 | "\x70\xCE\x03\x76\xDD\xE0\xF0\x8C" | ||
| 3850 | "\x84\x86\x8B\x6A\xFE\xC7\xF9\x69" | ||
| 3851 | "\x2E\xFE\xFC\xC2\xC4\x1A\x55\x58" | ||
| 3852 | "\xB3\xBE\xE2\x7E\xED\x39\x42\x6C" | ||
| 3853 | "\xB4\x42\x97\x9A\xEC\xE1\x0A\x06" | ||
| 3854 | "\x02\xC5\x03\x9D\xC4\x48\x15\x66" | ||
| 3855 | "\x35\x6A\xC2\xC9\xA2\x26\x30\xBB" | ||
| 3856 | "\xDB\x2D\xC8\x08\x2B\xA0\x29\x1A" | ||
| 3857 | "\x23\x61\x48\xEA\x80\x04\x27\xAA" | ||
| 3858 | "\x69\x49\xE8\xE8\x4A\x83\x6B\x5A" | ||
| 3859 | "\xCA\x7C\xD3\xB1\xB5\x0B\xCC\x23" | ||
| 3860 | "\x74\x1F\xA9\x87\xCD\xED\xC0\x2D" | ||
| 3861 | "\xBF\xEB\xCF\x16\x2D\x2A\x2E\x1D" | ||
| 3862 | "\x96\xBA\x36\x11\x45\x41\xDA\xCE" | ||
| 3863 | "\xA4\x48\x80\x8B\x06\xF4\x98\x89" | ||
| 3864 | "\x8B\x23\x08\x53\xF4\xD4\x5A\x24" | ||
| 3865 | "\x8B\xF8\x43\x73\xD1\xEE\xC4\xB0" | ||
| 3866 | "\xF8\xFE\x09\x0C\x75\x05\x38\x0B" | ||
| 3867 | "\x7C\x81\xDE\x9D\xE4\x61\x37\x63" | ||
| 3868 | "\x63\xAD\x12\xD2\x04\xB9\xCE\x45" | ||
| 3869 | "\x5A\x1A\x6E\xB3\x78\x2A\xA4\x74" | ||
| 3870 | "\x86\xD0\xE3\xFF\xDA\x38\x9C\xB5" | ||
| 3871 | "\xB8\xB1\xDB\x38\x2F\xC5\x6A\xB4" | ||
| 3872 | "\xEB\x6E\x96\xE8\x43\x80\xB5\x51" | ||
| 3873 | "\x61\x2D\x48\xAA\x07\x65\x11\x8C" | ||
| 3874 | "\x48\xE3\x90\x7E\x78\x3A\xEC\x97" | ||
| 3875 | "\x05\x3D\x84\xE7\x90\x2B\xAA\xBD" | ||
| 3876 | "\x83\x29\x0E\x1A\x81\x73\x7B\xE0" | ||
| 3877 | "\x7A\x01\x4A\x37\x3B\x77\x7F\x8D" | ||
| 3878 | "\x49\xA4\x2F\x6E\xBE\x68\x99\x08" | ||
| 3879 | "\x99\xAA\x4C\x12\x04\xAE\x1F\x77" | ||
| 3880 | "\x35\x88\xF1\x65\x06\x0A\x0B\x4D" | ||
| 3881 | "\x47\xF9\x50\x38\x5D\x71\xF9\x6E" | ||
| 3882 | "\xDE\xEC\x61\x35\x2C\x4C\x96\x50" | ||
| 3883 | "\xE8\x28\x93\x9C\x7E\x01\xC6\x04" | ||
| 3884 | "\xB2\xD6\xBC\x6C\x17\xEB\xC1\x7D" | ||
| 3885 | "\x11\xE9\x43\x83\x76\xAA\x53\x37" | ||
| 3886 | "\x0C\x1D\x39\x89\x53\x72\x09\x7E" | ||
| 3887 | "\xD9\x85\x16\x04\xA5\x2C\x05\x6F" | ||
| 3888 | "\x17\x0C\x6E\x66\xAA\x84\xA7\xD9" | ||
| 3889 | "\xE2\xD9\xC4\xEB\x43\x3E\xB1\x8D" | ||
| 3890 | "\x7C\x36\xC7\x71\x70\x9C\x10\xD8" | ||
| 3891 | "\xE8\x47\x2A\x4D\xFD\xA1\xBC\xE3" | ||
| 3892 | "\xB9\x32\xE2\xC1\x82\xAC\xFE\xCC" | ||
| 3893 | "\xC5\xC9\x7F\x9E\xCF\x33\x7A\xDF" | ||
| 3894 | "\x6C\x82\x9D", | ||
| 3895 | .ilen = 499, | ||
| 3086 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" | 3896 | .result = "\x56\xED\x84\x1B\x8F\x26\xBD\x31" |
| 3087 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" | 3897 | "\xC8\x5F\xF6\x6A\x01\x98\x0C\xA3" |
| 3088 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" | 3898 | "\x3A\xD1\x45\xDC\x73\x0A\x7E\x15" |
| @@ -3091,8 +3901,62 @@ static struct cipher_testvec tf_ctr_dec_tv_template[] = { | |||
| 3091 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" | 3901 | "\x6D\x04\x9B\x0F\xA6\x3D\xD4\x48" |
| 3092 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" | 3902 | "\xDF\x76\x0D\x81\x18\xAF\x23\xBA" |
| 3093 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" | 3903 | "\x51\xE8\x5C\xF3\x8A\x21\x95\x2C" |
| 3094 | "\xC3\x37\xCE", | 3904 | "\xC3\x37\xCE\x65\xFC\x70\x07\x9E" |
| 3095 | .rlen = 67, | 3905 | "\x12\xA9\x40\xD7\x4B\xE2\x79\x10" |
| 3906 | "\x84\x1B\xB2\x26\xBD\x54\xEB\x5F" | ||
| 3907 | "\xF6\x8D\x01\x98\x2F\xC6\x3A\xD1" | ||
| 3908 | "\x68\xFF\x73\x0A\xA1\x15\xAC\x43" | ||
| 3909 | "\xDA\x4E\xE5\x7C\x13\x87\x1E\xB5" | ||
| 3910 | "\x29\xC0\x57\xEE\x62\xF9\x90\x04" | ||
| 3911 | "\x9B\x32\xC9\x3D\xD4\x6B\x02\x76" | ||
| 3912 | "\x0D\xA4\x18\xAF\x46\xDD\x51\xE8" | ||
| 3913 | "\x7F\x16\x8A\x21\xB8\x2C\xC3\x5A" | ||
| 3914 | "\xF1\x65\xFC\x93\x07\x9E\x35\xCC" | ||
| 3915 | "\x40\xD7\x6E\x05\x79\x10\xA7\x1B" | ||
| 3916 | "\xB2\x49\xE0\x54\xEB\x82\x19\x8D" | ||
| 3917 | "\x24\xBB\x2F\xC6\x5D\xF4\x68\xFF" | ||
| 3918 | "\x96\x0A\xA1\x38\xCF\x43\xDA\x71" | ||
| 3919 | "\x08\x7C\x13\xAA\x1E\xB5\x4C\xE3" | ||
| 3920 | "\x57\xEE\x85\x1C\x90\x27\xBE\x32" | ||
| 3921 | "\xC9\x60\xF7\x6B\x02\x99\x0D\xA4" | ||
| 3922 | "\x3B\xD2\x46\xDD\x74\x0B\x7F\x16" | ||
| 3923 | "\xAD\x21\xB8\x4F\xE6\x5A\xF1\x88" | ||
| 3924 | "\x1F\x93\x2A\xC1\x35\xCC\x63\xFA" | ||
| 3925 | "\x6E\x05\x9C\x10\xA7\x3E\xD5\x49" | ||
| 3926 | "\xE0\x77\x0E\x82\x19\xB0\x24\xBB" | ||
| 3927 | "\x52\xE9\x5D\xF4\x8B\x22\x96\x2D" | ||
| 3928 | "\xC4\x38\xCF\x66\xFD\x71\x08\x9F" | ||
| 3929 | "\x13\xAA\x41\xD8\x4C\xE3\x7A\x11" | ||
| 3930 | "\x85\x1C\xB3\x27\xBE\x55\xEC\x60" | ||
| 3931 | "\xF7\x8E\x02\x99\x30\xC7\x3B\xD2" | ||
| 3932 | "\x69\x00\x74\x0B\xA2\x16\xAD\x44" | ||
| 3933 | "\xDB\x4F\xE6\x7D\x14\x88\x1F\xB6" | ||
| 3934 | "\x2A\xC1\x58\xEF\x63\xFA\x91\x05" | ||
| 3935 | "\x9C\x33\xCA\x3E\xD5\x6C\x03\x77" | ||
| 3936 | "\x0E\xA5\x19\xB0\x47\xDE\x52\xE9" | ||
| 3937 | "\x80\x17\x8B\x22\xB9\x2D\xC4\x5B" | ||
| 3938 | "\xF2\x66\xFD\x94\x08\x9F\x36\xCD" | ||
| 3939 | "\x41\xD8\x6F\x06\x7A\x11\xA8\x1C" | ||
| 3940 | "\xB3\x4A\xE1\x55\xEC\x83\x1A\x8E" | ||
| 3941 | "\x25\xBC\x30\xC7\x5E\xF5\x69\x00" | ||
| 3942 | "\x97\x0B\xA2\x39\xD0\x44\xDB\x72" | ||
| 3943 | "\x09\x7D\x14\xAB\x1F\xB6\x4D\xE4" | ||
| 3944 | "\x58\xEF\x86\x1D\x91\x28\xBF\x33" | ||
| 3945 | "\xCA\x61\xF8\x6C\x03\x9A\x0E\xA5" | ||
| 3946 | "\x3C\xD3\x47\xDE\x75\x0C\x80\x17" | ||
| 3947 | "\xAE\x22\xB9\x50\xE7\x5B\xF2\x89" | ||
| 3948 | "\x20\x94\x2B\xC2\x36\xCD\x64\xFB" | ||
| 3949 | "\x6F\x06\x9D\x11\xA8\x3F\xD6\x4A" | ||
| 3950 | "\xE1\x78\x0F\x83\x1A\xB1\x25\xBC" | ||
| 3951 | "\x53\xEA\x5E\xF5\x8C\x00\x97\x2E" | ||
| 3952 | "\xC5\x39\xD0\x67\xFE\x72\x09\xA0" | ||
| 3953 | "\x14\xAB\x42\xD9\x4D\xE4\x7B\x12" | ||
| 3954 | "\x86\x1D\xB4\x28\xBF\x56\xED\x61" | ||
| 3955 | "\xF8\x8F\x03\x9A\x31\xC8\x3C\xD3" | ||
| 3956 | "\x6A\x01\x75\x0C\xA3\x17\xAE\x45" | ||
| 3957 | "\xDC\x50\xE7\x7E\x15\x89\x20\xB7" | ||
| 3958 | "\x2B\xC2\x59", | ||
| 3959 | .rlen = 499, | ||
| 3096 | }, | 3960 | }, |
| 3097 | }; | 3961 | }; |
| 3098 | 3962 | ||
| @@ -6111,6 +6975,9 @@ static struct cipher_testvec cast6_dec_tv_template[] = { | |||
| 6111 | #define AES_DEC_TEST_VECTORS 3 | 6975 | #define AES_DEC_TEST_VECTORS 3 |
| 6112 | #define AES_CBC_ENC_TEST_VECTORS 4 | 6976 | #define AES_CBC_ENC_TEST_VECTORS 4 |
| 6113 | #define AES_CBC_DEC_TEST_VECTORS 4 | 6977 | #define AES_CBC_DEC_TEST_VECTORS 4 |
| 6978 | #define HMAC_SHA1_AES_CBC_ENC_TEST_VECTORS 7 | ||
| 6979 | #define HMAC_SHA256_AES_CBC_ENC_TEST_VECTORS 7 | ||
| 6980 | #define HMAC_SHA512_AES_CBC_ENC_TEST_VECTORS 7 | ||
| 6114 | #define AES_LRW_ENC_TEST_VECTORS 8 | 6981 | #define AES_LRW_ENC_TEST_VECTORS 8 |
| 6115 | #define AES_LRW_DEC_TEST_VECTORS 8 | 6982 | #define AES_LRW_DEC_TEST_VECTORS 8 |
| 6116 | #define AES_XTS_ENC_TEST_VECTORS 5 | 6983 | #define AES_XTS_ENC_TEST_VECTORS 5 |
| @@ -6368,6 +7235,837 @@ static struct cipher_testvec aes_cbc_dec_tv_template[] = { | |||
| 6368 | }, | 7235 | }, |
| 6369 | }; | 7236 | }; |
| 6370 | 7237 | ||
| 7238 | static struct aead_testvec hmac_sha1_aes_cbc_enc_tv_template[] = { | ||
| 7239 | { /* RFC 3602 Case 1 */ | ||
| 7240 | #ifdef __LITTLE_ENDIAN | ||
| 7241 | .key = "\x08\x00" /* rta length */ | ||
| 7242 | "\x01\x00" /* rta type */ | ||
| 7243 | #else | ||
| 7244 | .key = "\x00\x08" /* rta length */ | ||
| 7245 | "\x00\x01" /* rta type */ | ||
| 7246 | #endif | ||
| 7247 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7248 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7249 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7250 | "\x00\x00\x00\x00" | ||
| 7251 | "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" | ||
| 7252 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", | ||
| 7253 | .klen = 8 + 20 + 16, | ||
| 7254 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" | ||
| 7255 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", | ||
| 7256 | .input = "Single block msg", | ||
| 7257 | .ilen = 16, | ||
| 7258 | .result = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" | ||
| 7259 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a" | ||
| 7260 | "\x1b\x13\xcb\xaf\x89\x5e\xe1\x2c" | ||
| 7261 | "\x13\xc5\x2e\xa3\xcc\xed\xdc\xb5" | ||
| 7262 | "\x03\x71\xa2\x06", | ||
| 7263 | .rlen = 16 + 20, | ||
| 7264 | }, { /* RFC 3602 Case 2 */ | ||
| 7265 | #ifdef __LITTLE_ENDIAN | ||
| 7266 | .key = "\x08\x00" /* rta length */ | ||
| 7267 | "\x01\x00" /* rta type */ | ||
| 7268 | #else | ||
| 7269 | .key = "\x00\x08" /* rta length */ | ||
| 7270 | "\x00\x01" /* rta type */ | ||
| 7271 | #endif | ||
| 7272 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7273 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7274 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7275 | "\x30\x31\x32\x33" | ||
| 7276 | "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" | ||
| 7277 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", | ||
| 7278 | .klen = 8 + 20 + 16, | ||
| 7279 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" | ||
| 7280 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", | ||
| 7281 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7282 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7283 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7284 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", | ||
| 7285 | .ilen = 32, | ||
| 7286 | .result = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a" | ||
| 7287 | "\x3a\x86\x30\x28\xb5\xe1\xdc\x0a" | ||
| 7288 | "\x75\x86\x60\x2d\x25\x3c\xff\xf9" | ||
| 7289 | "\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1" | ||
| 7290 | "\xad\x9b\x4c\x5c\x85\xe1\xda\xae" | ||
| 7291 | "\xee\x81\x4e\xd7\xdb\x74\xcf\x58" | ||
| 7292 | "\x65\x39\xf8\xde", | ||
| 7293 | .rlen = 32 + 20, | ||
| 7294 | }, { /* RFC 3602 Case 3 */ | ||
| 7295 | #ifdef __LITTLE_ENDIAN | ||
| 7296 | .key = "\x08\x00" /* rta length */ | ||
| 7297 | "\x01\x00" /* rta type */ | ||
| 7298 | #else | ||
| 7299 | .key = "\x00\x08" /* rta length */ | ||
| 7300 | "\x00\x01" /* rta type */ | ||
| 7301 | #endif | ||
| 7302 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7303 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7304 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7305 | "\x22\x33\x44\x55" | ||
| 7306 | "\x6c\x3e\xa0\x47\x76\x30\xce\x21" | ||
| 7307 | "\xa2\xce\x33\x4a\xa7\x46\xc2\xcd", | ||
| 7308 | .klen = 8 + 20 + 16, | ||
| 7309 | .iv = "\xc7\x82\xdc\x4c\x09\x8c\x66\xcb" | ||
| 7310 | "\xd9\xcd\x27\xd8\x25\x68\x2c\x81", | ||
| 7311 | .input = "This is a 48-byte message (exactly 3 AES blocks)", | ||
| 7312 | .ilen = 48, | ||
| 7313 | .result = "\xd0\xa0\x2b\x38\x36\x45\x17\x53" | ||
| 7314 | "\xd4\x93\x66\x5d\x33\xf0\xe8\x86" | ||
| 7315 | "\x2d\xea\x54\xcd\xb2\x93\xab\xc7" | ||
| 7316 | "\x50\x69\x39\x27\x67\x72\xf8\xd5" | ||
| 7317 | "\x02\x1c\x19\x21\x6b\xad\x52\x5c" | ||
| 7318 | "\x85\x79\x69\x5d\x83\xba\x26\x84" | ||
| 7319 | "\xc2\xec\x0c\xf8\x7f\x05\xba\xca" | ||
| 7320 | "\xff\xee\x4c\xd0\x93\xe6\x36\x7f" | ||
| 7321 | "\x8d\x62\xf2\x1e", | ||
| 7322 | .rlen = 48 + 20, | ||
| 7323 | }, { /* RFC 3602 Case 4 */ | ||
| 7324 | #ifdef __LITTLE_ENDIAN | ||
| 7325 | .key = "\x08\x00" /* rta length */ | ||
| 7326 | "\x01\x00" /* rta type */ | ||
| 7327 | #else | ||
| 7328 | .key = "\x00\x08" /* rta length */ | ||
| 7329 | "\x00\x01" /* rta type */ | ||
| 7330 | #endif | ||
| 7331 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7332 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7333 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7334 | "\x22\x33\x44\x55" | ||
| 7335 | "\x56\xe4\x7a\x38\xc5\x59\x89\x74" | ||
| 7336 | "\xbc\x46\x90\x3d\xba\x29\x03\x49", | ||
| 7337 | .klen = 8 + 20 + 16, | ||
| 7338 | .iv = "\x8c\xe8\x2e\xef\xbe\xa0\xda\x3c" | ||
| 7339 | "\x44\x69\x9e\xd7\xdb\x51\xb7\xd9", | ||
| 7340 | .input = "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" | ||
| 7341 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" | ||
| 7342 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" | ||
| 7343 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" | ||
| 7344 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" | ||
| 7345 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" | ||
| 7346 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" | ||
| 7347 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf", | ||
| 7348 | .ilen = 64, | ||
| 7349 | .result = "\xc3\x0e\x32\xff\xed\xc0\x77\x4e" | ||
| 7350 | "\x6a\xff\x6a\xf0\x86\x9f\x71\xaa" | ||
| 7351 | "\x0f\x3a\xf0\x7a\x9a\x31\xa9\xc6" | ||
| 7352 | "\x84\xdb\x20\x7e\xb0\xef\x8e\x4e" | ||
| 7353 | "\x35\x90\x7a\xa6\x32\xc3\xff\xdf" | ||
| 7354 | "\x86\x8b\xb7\xb2\x9d\x3d\x46\xad" | ||
| 7355 | "\x83\xce\x9f\x9a\x10\x2e\xe9\x9d" | ||
| 7356 | "\x49\xa5\x3e\x87\xf4\xc3\xda\x55" | ||
| 7357 | "\x1c\x45\x57\xa9\x56\xcb\xa9\x2d" | ||
| 7358 | "\x18\xac\xf1\xc7\x5d\xd1\xcd\x0d" | ||
| 7359 | "\x1d\xbe\xc6\xe9", | ||
| 7360 | .rlen = 64 + 20, | ||
| 7361 | }, { /* RFC 3602 Case 5 */ | ||
| 7362 | #ifdef __LITTLE_ENDIAN | ||
| 7363 | .key = "\x08\x00" /* rta length */ | ||
| 7364 | "\x01\x00" /* rta type */ | ||
| 7365 | #else | ||
| 7366 | .key = "\x00\x08" /* rta length */ | ||
| 7367 | "\x00\x01" /* rta type */ | ||
| 7368 | #endif | ||
| 7369 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7370 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7371 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7372 | "\x22\x33\x44\x55" | ||
| 7373 | "\x90\xd3\x82\xb4\x10\xee\xba\x7a" | ||
| 7374 | "\xd9\x38\xc4\x6c\xec\x1a\x82\xbf", | ||
| 7375 | .klen = 8 + 20 + 16, | ||
| 7376 | .iv = "\xe9\x6e\x8c\x08\xab\x46\x57\x63" | ||
| 7377 | "\xfd\x09\x8d\x45\xdd\x3f\xf8\x93", | ||
| 7378 | .assoc = "\x00\x00\x43\x21\x00\x00\x00\x01", | ||
| 7379 | .alen = 8, | ||
| 7380 | .input = "\x08\x00\x0e\xbd\xa7\x0a\x00\x00" | ||
| 7381 | "\x8e\x9c\x08\x3d\xb9\x5b\x07\x00" | ||
| 7382 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7383 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7384 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" | ||
| 7385 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7386 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7387 | "\x30\x31\x32\x33\x34\x35\x36\x37" | ||
| 7388 | "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 7389 | "\x09\x0a\x0b\x0c\x0d\x0e\x0e\x01", | ||
| 7390 | .ilen = 80, | ||
| 7391 | .result = "\xf6\x63\xc2\x5d\x32\x5c\x18\xc6" | ||
| 7392 | "\xa9\x45\x3e\x19\x4e\x12\x08\x49" | ||
| 7393 | "\xa4\x87\x0b\x66\xcc\x6b\x99\x65" | ||
| 7394 | "\x33\x00\x13\xb4\x89\x8d\xc8\x56" | ||
| 7395 | "\xa4\x69\x9e\x52\x3a\x55\xdb\x08" | ||
| 7396 | "\x0b\x59\xec\x3a\x8e\x4b\x7e\x52" | ||
| 7397 | "\x77\x5b\x07\xd1\xdb\x34\xed\x9c" | ||
| 7398 | "\x53\x8a\xb5\x0c\x55\x1b\x87\x4a" | ||
| 7399 | "\xa2\x69\xad\xd0\x47\xad\x2d\x59" | ||
| 7400 | "\x13\xac\x19\xb7\xcf\xba\xd4\xa6" | ||
| 7401 | "\x58\xc6\x84\x75\xe4\xe9\x6b\x0c" | ||
| 7402 | "\xe1\xc5\x0b\x73\x4d\x82\x55\xa8" | ||
| 7403 | "\x85\xe1\x59\xf7", | ||
| 7404 | .rlen = 80 + 20, | ||
| 7405 | }, { /* NIST SP800-38A F.2.3 CBC-AES192.Encrypt */ | ||
| 7406 | #ifdef __LITTLE_ENDIAN | ||
| 7407 | .key = "\x08\x00" /* rta length */ | ||
| 7408 | "\x01\x00" /* rta type */ | ||
| 7409 | #else | ||
| 7410 | .key = "\x00\x08" /* rta length */ | ||
| 7411 | "\x00\x01" /* rta type */ | ||
| 7412 | #endif | ||
| 7413 | "\x00\x00\x00\x18" /* enc key length */ | ||
| 7414 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7415 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7416 | "\x22\x33\x44\x55" | ||
| 7417 | "\x8e\x73\xb0\xf7\xda\x0e\x64\x52" | ||
| 7418 | "\xc8\x10\xf3\x2b\x80\x90\x79\xe5" | ||
| 7419 | "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", | ||
| 7420 | .klen = 8 + 20 + 24, | ||
| 7421 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7422 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 7423 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 7424 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 7425 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 7426 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 7427 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 7428 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 7429 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 7430 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 7431 | .ilen = 64, | ||
| 7432 | .result = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d" | ||
| 7433 | "\x71\x78\x18\x3a\x9f\xa0\x71\xe8" | ||
| 7434 | "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4" | ||
| 7435 | "\xe5\xe7\x38\x76\x3f\x69\x14\x5a" | ||
| 7436 | "\x57\x1b\x24\x20\x12\xfb\x7a\xe0" | ||
| 7437 | "\x7f\xa9\xba\xac\x3d\xf1\x02\xe0" | ||
| 7438 | "\x08\xb0\xe2\x79\x88\x59\x88\x81" | ||
| 7439 | "\xd9\x20\xa9\xe6\x4f\x56\x15\xcd" | ||
| 7440 | "\x73\xe3\x19\x3f\x8b\xc9\xc6\xf4" | ||
| 7441 | "\x5a\xf1\x5b\xa8\x98\x07\xc5\x36" | ||
| 7442 | "\x47\x4c\xfc\x36", | ||
| 7443 | .rlen = 64 + 20, | ||
| 7444 | }, { /* NIST SP800-38A F.2.5 CBC-AES256.Encrypt */ | ||
| 7445 | #ifdef __LITTLE_ENDIAN | ||
| 7446 | .key = "\x08\x00" /* rta length */ | ||
| 7447 | "\x01\x00" /* rta type */ | ||
| 7448 | #else | ||
| 7449 | .key = "\x00\x08" /* rta length */ | ||
| 7450 | "\x00\x01" /* rta type */ | ||
| 7451 | #endif | ||
| 7452 | "\x00\x00\x00\x20" /* enc key length */ | ||
| 7453 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7454 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7455 | "\x22\x33\x44\x55" | ||
| 7456 | "\x60\x3d\xeb\x10\x15\xca\x71\xbe" | ||
| 7457 | "\x2b\x73\xae\xf0\x85\x7d\x77\x81" | ||
| 7458 | "\x1f\x35\x2c\x07\x3b\x61\x08\xd7" | ||
| 7459 | "\x2d\x98\x10\xa3\x09\x14\xdf\xf4", | ||
| 7460 | .klen = 8 + 20 + 32, | ||
| 7461 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7462 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 7463 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 7464 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 7465 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 7466 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 7467 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 7468 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 7469 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 7470 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 7471 | .ilen = 64, | ||
| 7472 | .result = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba" | ||
| 7473 | "\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6" | ||
| 7474 | "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d" | ||
| 7475 | "\x67\x9f\x77\x7b\xc6\x70\x2c\x7d" | ||
| 7476 | "\x39\xf2\x33\x69\xa9\xd9\xba\xcf" | ||
| 7477 | "\xa5\x30\xe2\x63\x04\x23\x14\x61" | ||
| 7478 | "\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc" | ||
| 7479 | "\xda\x6c\x19\x07\x8c\x6a\x9d\x1b" | ||
| 7480 | "\xa3\xe8\x9b\x17\xe3\xf4\x7f\xde" | ||
| 7481 | "\x1b\x9f\xc6\x81\x26\x43\x4a\x87" | ||
| 7482 | "\x51\xee\xd6\x4e", | ||
| 7483 | .rlen = 64 + 20, | ||
| 7484 | }, | ||
| 7485 | }; | ||
| 7486 | |||
| 7487 | static struct aead_testvec hmac_sha256_aes_cbc_enc_tv_template[] = { | ||
| 7488 | { /* RFC 3602 Case 1 */ | ||
| 7489 | #ifdef __LITTLE_ENDIAN | ||
| 7490 | .key = "\x08\x00" /* rta length */ | ||
| 7491 | "\x01\x00" /* rta type */ | ||
| 7492 | #else | ||
| 7493 | .key = "\x00\x08" /* rta length */ | ||
| 7494 | "\x00\x01" /* rta type */ | ||
| 7495 | #endif | ||
| 7496 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7497 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7498 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7499 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7500 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7501 | "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" | ||
| 7502 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", | ||
| 7503 | .klen = 8 + 32 + 16, | ||
| 7504 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" | ||
| 7505 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", | ||
| 7506 | .input = "Single block msg", | ||
| 7507 | .ilen = 16, | ||
| 7508 | .result = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" | ||
| 7509 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a" | ||
| 7510 | "\xcc\xde\x2d\x6a\xae\xf1\x0b\xcc" | ||
| 7511 | "\x38\x06\x38\x51\xb4\xb8\xf3\x5b" | ||
| 7512 | "\x5c\x34\xa6\xa3\x6e\x0b\x05\xe5" | ||
| 7513 | "\x6a\x6d\x44\xaa\x26\xa8\x44\xa5", | ||
| 7514 | .rlen = 16 + 32, | ||
| 7515 | }, { /* RFC 3602 Case 2 */ | ||
| 7516 | #ifdef __LITTLE_ENDIAN | ||
| 7517 | .key = "\x08\x00" /* rta length */ | ||
| 7518 | "\x01\x00" /* rta type */ | ||
| 7519 | #else | ||
| 7520 | .key = "\x00\x08" /* rta length */ | ||
| 7521 | "\x00\x01" /* rta type */ | ||
| 7522 | #endif | ||
| 7523 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7524 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7525 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7526 | "\x30\x31\x32\x33\x34\x35\x36\x37" | ||
| 7527 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" | ||
| 7528 | "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" | ||
| 7529 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", | ||
| 7530 | .klen = 8 + 32 + 16, | ||
| 7531 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" | ||
| 7532 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", | ||
| 7533 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7534 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7535 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7536 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", | ||
| 7537 | .ilen = 32, | ||
| 7538 | .result = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a" | ||
| 7539 | "\x3a\x86\x30\x28\xb5\xe1\xdc\x0a" | ||
| 7540 | "\x75\x86\x60\x2d\x25\x3c\xff\xf9" | ||
| 7541 | "\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1" | ||
| 7542 | "\xf5\x33\x53\xf3\x68\x85\x2a\x99" | ||
| 7543 | "\x0e\x06\x58\x8f\xba\xf6\x06\xda" | ||
| 7544 | "\x49\x69\x0d\x5b\xd4\x36\x06\x62" | ||
| 7545 | "\x35\x5e\x54\x58\x53\x4d\xdf\xbf", | ||
| 7546 | .rlen = 32 + 32, | ||
| 7547 | }, { /* RFC 3602 Case 3 */ | ||
| 7548 | #ifdef __LITTLE_ENDIAN | ||
| 7549 | .key = "\x08\x00" /* rta length */ | ||
| 7550 | "\x01\x00" /* rta type */ | ||
| 7551 | #else | ||
| 7552 | .key = "\x00\x08" /* rta length */ | ||
| 7553 | "\x00\x01" /* rta type */ | ||
| 7554 | #endif | ||
| 7555 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7556 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7557 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7558 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7559 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7560 | "\x6c\x3e\xa0\x47\x76\x30\xce\x21" | ||
| 7561 | "\xa2\xce\x33\x4a\xa7\x46\xc2\xcd", | ||
| 7562 | .klen = 8 + 32 + 16, | ||
| 7563 | .iv = "\xc7\x82\xdc\x4c\x09\x8c\x66\xcb" | ||
| 7564 | "\xd9\xcd\x27\xd8\x25\x68\x2c\x81", | ||
| 7565 | .input = "This is a 48-byte message (exactly 3 AES blocks)", | ||
| 7566 | .ilen = 48, | ||
| 7567 | .result = "\xd0\xa0\x2b\x38\x36\x45\x17\x53" | ||
| 7568 | "\xd4\x93\x66\x5d\x33\xf0\xe8\x86" | ||
| 7569 | "\x2d\xea\x54\xcd\xb2\x93\xab\xc7" | ||
| 7570 | "\x50\x69\x39\x27\x67\x72\xf8\xd5" | ||
| 7571 | "\x02\x1c\x19\x21\x6b\xad\x52\x5c" | ||
| 7572 | "\x85\x79\x69\x5d\x83\xba\x26\x84" | ||
| 7573 | "\x68\xb9\x3e\x90\x38\xa0\x88\x01" | ||
| 7574 | "\xe7\xc6\xce\x10\x31\x2f\x9b\x1d" | ||
| 7575 | "\x24\x78\xfb\xbe\x02\xe0\x4f\x40" | ||
| 7576 | "\x10\xbd\xaa\xc6\xa7\x79\xe0\x1a", | ||
| 7577 | .rlen = 48 + 32, | ||
| 7578 | }, { /* RFC 3602 Case 4 */ | ||
| 7579 | #ifdef __LITTLE_ENDIAN | ||
| 7580 | .key = "\x08\x00" /* rta length */ | ||
| 7581 | "\x01\x00" /* rta type */ | ||
| 7582 | #else | ||
| 7583 | .key = "\x00\x08" /* rta length */ | ||
| 7584 | "\x00\x01" /* rta type */ | ||
| 7585 | #endif | ||
| 7586 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7587 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7588 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7589 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7590 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7591 | "\x56\xe4\x7a\x38\xc5\x59\x89\x74" | ||
| 7592 | "\xbc\x46\x90\x3d\xba\x29\x03\x49", | ||
| 7593 | .klen = 8 + 32 + 16, | ||
| 7594 | .iv = "\x8c\xe8\x2e\xef\xbe\xa0\xda\x3c" | ||
| 7595 | "\x44\x69\x9e\xd7\xdb\x51\xb7\xd9", | ||
| 7596 | .input = "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" | ||
| 7597 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" | ||
| 7598 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" | ||
| 7599 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" | ||
| 7600 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" | ||
| 7601 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" | ||
| 7602 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" | ||
| 7603 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf", | ||
| 7604 | .ilen = 64, | ||
| 7605 | .result = "\xc3\x0e\x32\xff\xed\xc0\x77\x4e" | ||
| 7606 | "\x6a\xff\x6a\xf0\x86\x9f\x71\xaa" | ||
| 7607 | "\x0f\x3a\xf0\x7a\x9a\x31\xa9\xc6" | ||
| 7608 | "\x84\xdb\x20\x7e\xb0\xef\x8e\x4e" | ||
| 7609 | "\x35\x90\x7a\xa6\x32\xc3\xff\xdf" | ||
| 7610 | "\x86\x8b\xb7\xb2\x9d\x3d\x46\xad" | ||
| 7611 | "\x83\xce\x9f\x9a\x10\x2e\xe9\x9d" | ||
| 7612 | "\x49\xa5\x3e\x87\xf4\xc3\xda\x55" | ||
| 7613 | "\x7a\x1b\xd4\x3c\xdb\x17\x95\xe2" | ||
| 7614 | "\xe0\x93\xec\xc9\x9f\xf7\xce\xd8" | ||
| 7615 | "\x3f\x54\xe2\x49\x39\xe3\x71\x25" | ||
| 7616 | "\x2b\x6c\xe9\x5d\xec\xec\x2b\x64", | ||
| 7617 | .rlen = 64 + 32, | ||
| 7618 | }, { /* RFC 3602 Case 5 */ | ||
| 7619 | #ifdef __LITTLE_ENDIAN | ||
| 7620 | .key = "\x08\x00" /* rta length */ | ||
| 7621 | "\x01\x00" /* rta type */ | ||
| 7622 | #else | ||
| 7623 | .key = "\x00\x08" /* rta length */ | ||
| 7624 | "\x00\x01" /* rta type */ | ||
| 7625 | #endif | ||
| 7626 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7627 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7628 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7629 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7630 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7631 | "\x90\xd3\x82\xb4\x10\xee\xba\x7a" | ||
| 7632 | "\xd9\x38\xc4\x6c\xec\x1a\x82\xbf", | ||
| 7633 | .klen = 8 + 32 + 16, | ||
| 7634 | .iv = "\xe9\x6e\x8c\x08\xab\x46\x57\x63" | ||
| 7635 | "\xfd\x09\x8d\x45\xdd\x3f\xf8\x93", | ||
| 7636 | .assoc = "\x00\x00\x43\x21\x00\x00\x00\x01", | ||
| 7637 | .alen = 8, | ||
| 7638 | .input = "\x08\x00\x0e\xbd\xa7\x0a\x00\x00" | ||
| 7639 | "\x8e\x9c\x08\x3d\xb9\x5b\x07\x00" | ||
| 7640 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7641 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7642 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" | ||
| 7643 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7644 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7645 | "\x30\x31\x32\x33\x34\x35\x36\x37" | ||
| 7646 | "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 7647 | "\x09\x0a\x0b\x0c\x0d\x0e\x0e\x01", | ||
| 7648 | .ilen = 80, | ||
| 7649 | .result = "\xf6\x63\xc2\x5d\x32\x5c\x18\xc6" | ||
| 7650 | "\xa9\x45\x3e\x19\x4e\x12\x08\x49" | ||
| 7651 | "\xa4\x87\x0b\x66\xcc\x6b\x99\x65" | ||
| 7652 | "\x33\x00\x13\xb4\x89\x8d\xc8\x56" | ||
| 7653 | "\xa4\x69\x9e\x52\x3a\x55\xdb\x08" | ||
| 7654 | "\x0b\x59\xec\x3a\x8e\x4b\x7e\x52" | ||
| 7655 | "\x77\x5b\x07\xd1\xdb\x34\xed\x9c" | ||
| 7656 | "\x53\x8a\xb5\x0c\x55\x1b\x87\x4a" | ||
| 7657 | "\xa2\x69\xad\xd0\x47\xad\x2d\x59" | ||
| 7658 | "\x13\xac\x19\xb7\xcf\xba\xd4\xa6" | ||
| 7659 | "\xbb\xd4\x0f\xbe\xa3\x3b\x4c\xb8" | ||
| 7660 | "\x3a\xd2\xe1\x03\x86\xa5\x59\xb7" | ||
| 7661 | "\x73\xc3\x46\x20\x2c\xb1\xef\x68" | ||
| 7662 | "\xbb\x8a\x32\x7e\x12\x8c\x69\xcf", | ||
| 7663 | .rlen = 80 + 32, | ||
| 7664 | }, { /* NIST SP800-38A F.2.3 CBC-AES192.Encrypt */ | ||
| 7665 | #ifdef __LITTLE_ENDIAN | ||
| 7666 | .key = "\x08\x00" /* rta length */ | ||
| 7667 | "\x01\x00" /* rta type */ | ||
| 7668 | #else | ||
| 7669 | .key = "\x00\x08" /* rta length */ | ||
| 7670 | "\x00\x01" /* rta type */ | ||
| 7671 | #endif | ||
| 7672 | "\x00\x00\x00\x18" /* enc key length */ | ||
| 7673 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7674 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7675 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7676 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7677 | "\x8e\x73\xb0\xf7\xda\x0e\x64\x52" | ||
| 7678 | "\xc8\x10\xf3\x2b\x80\x90\x79\xe5" | ||
| 7679 | "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", | ||
| 7680 | .klen = 8 + 32 + 24, | ||
| 7681 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7682 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 7683 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 7684 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 7685 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 7686 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 7687 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 7688 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 7689 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 7690 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 7691 | .ilen = 64, | ||
| 7692 | .result = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d" | ||
| 7693 | "\x71\x78\x18\x3a\x9f\xa0\x71\xe8" | ||
| 7694 | "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4" | ||
| 7695 | "\xe5\xe7\x38\x76\x3f\x69\x14\x5a" | ||
| 7696 | "\x57\x1b\x24\x20\x12\xfb\x7a\xe0" | ||
| 7697 | "\x7f\xa9\xba\xac\x3d\xf1\x02\xe0" | ||
| 7698 | "\x08\xb0\xe2\x79\x88\x59\x88\x81" | ||
| 7699 | "\xd9\x20\xa9\xe6\x4f\x56\x15\xcd" | ||
| 7700 | "\x2f\xee\x5f\xdb\x66\xfe\x79\x09" | ||
| 7701 | "\x61\x81\x31\xea\x5b\x3d\x8e\xfb" | ||
| 7702 | "\xca\x71\x85\x93\xf7\x85\x55\x8b" | ||
| 7703 | "\x7a\xe4\x94\xca\x8b\xba\x19\x33", | ||
| 7704 | .rlen = 64 + 32, | ||
| 7705 | }, { /* NIST SP800-38A F.2.5 CBC-AES256.Encrypt */ | ||
| 7706 | #ifdef __LITTLE_ENDIAN | ||
| 7707 | .key = "\x08\x00" /* rta length */ | ||
| 7708 | "\x01\x00" /* rta type */ | ||
| 7709 | #else | ||
| 7710 | .key = "\x00\x08" /* rta length */ | ||
| 7711 | "\x00\x01" /* rta type */ | ||
| 7712 | #endif | ||
| 7713 | "\x00\x00\x00\x20" /* enc key length */ | ||
| 7714 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7715 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7716 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7717 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7718 | "\x60\x3d\xeb\x10\x15\xca\x71\xbe" | ||
| 7719 | "\x2b\x73\xae\xf0\x85\x7d\x77\x81" | ||
| 7720 | "\x1f\x35\x2c\x07\x3b\x61\x08\xd7" | ||
| 7721 | "\x2d\x98\x10\xa3\x09\x14\xdf\xf4", | ||
| 7722 | .klen = 8 + 32 + 32, | ||
| 7723 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7724 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 7725 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 7726 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 7727 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 7728 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 7729 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 7730 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 7731 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 7732 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 7733 | .ilen = 64, | ||
| 7734 | .result = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba" | ||
| 7735 | "\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6" | ||
| 7736 | "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d" | ||
| 7737 | "\x67\x9f\x77\x7b\xc6\x70\x2c\x7d" | ||
| 7738 | "\x39\xf2\x33\x69\xa9\xd9\xba\xcf" | ||
| 7739 | "\xa5\x30\xe2\x63\x04\x23\x14\x61" | ||
| 7740 | "\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc" | ||
| 7741 | "\xda\x6c\x19\x07\x8c\x6a\x9d\x1b" | ||
| 7742 | "\x24\x29\xed\xc2\x31\x49\xdb\xb1" | ||
| 7743 | "\x8f\x74\xbd\x17\x92\x03\xbe\x8f" | ||
| 7744 | "\xf3\x61\xde\x1c\xe9\xdb\xcd\xd0" | ||
| 7745 | "\xcc\xce\xe9\x85\x57\xcf\x6f\x5f", | ||
| 7746 | .rlen = 64 + 32, | ||
| 7747 | }, | ||
| 7748 | }; | ||
| 7749 | |||
| 7750 | static struct aead_testvec hmac_sha512_aes_cbc_enc_tv_template[] = { | ||
| 7751 | { /* RFC 3602 Case 1 */ | ||
| 7752 | #ifdef __LITTLE_ENDIAN | ||
| 7753 | .key = "\x08\x00" /* rta length */ | ||
| 7754 | "\x01\x00" /* rta type */ | ||
| 7755 | #else | ||
| 7756 | .key = "\x00\x08" /* rta length */ | ||
| 7757 | "\x00\x01" /* rta type */ | ||
| 7758 | #endif | ||
| 7759 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7760 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7761 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7762 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7763 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7764 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7765 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7766 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7767 | "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
| 7768 | "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" | ||
| 7769 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", | ||
| 7770 | .klen = 8 + 64 + 16, | ||
| 7771 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" | ||
| 7772 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", | ||
| 7773 | .input = "Single block msg", | ||
| 7774 | .ilen = 16, | ||
| 7775 | .result = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" | ||
| 7776 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a" | ||
| 7777 | "\x3f\xdc\xad\x90\x03\x63\x5e\x68" | ||
| 7778 | "\xc3\x13\xdd\xa4\x5c\x4d\x54\xa7" | ||
| 7779 | "\x19\x6e\x03\x75\x2b\xa1\x62\xce" | ||
| 7780 | "\xe0\xc6\x96\x75\xb2\x14\xca\x96" | ||
| 7781 | "\xec\xbd\x50\x08\x07\x64\x1a\x49" | ||
| 7782 | "\xe8\x9a\x7c\x06\x3d\xcb\xff\xb2" | ||
| 7783 | "\xfa\x20\x89\xdd\x9c\xac\x9e\x16" | ||
| 7784 | "\x18\x8a\xa0\x6d\x01\x6c\xa3\x3a", | ||
| 7785 | .rlen = 16 + 64, | ||
| 7786 | }, { /* RFC 3602 Case 2 */ | ||
| 7787 | #ifdef __LITTLE_ENDIAN | ||
| 7788 | .key = "\x08\x00" /* rta length */ | ||
| 7789 | "\x01\x00" /* rta type */ | ||
| 7790 | #else | ||
| 7791 | .key = "\x00\x08" /* rta length */ | ||
| 7792 | "\x00\x01" /* rta type */ | ||
| 7793 | #endif | ||
| 7794 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7795 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7796 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7797 | "\x30\x31\x32\x33\x34\x35\x36\x37" | ||
| 7798 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" | ||
| 7799 | "\x40\x41\x42\x43\x44\x45\x46\x47" | ||
| 7800 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" | ||
| 7801 | "\x50\x51\x52\x53\x54\x55\x56\x57" | ||
| 7802 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" | ||
| 7803 | "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" | ||
| 7804 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", | ||
| 7805 | .klen = 8 + 64 + 16, | ||
| 7806 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" | ||
| 7807 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", | ||
| 7808 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7809 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7810 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7811 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", | ||
| 7812 | .ilen = 32, | ||
| 7813 | .result = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a" | ||
| 7814 | "\x3a\x86\x30\x28\xb5\xe1\xdc\x0a" | ||
| 7815 | "\x75\x86\x60\x2d\x25\x3c\xff\xf9" | ||
| 7816 | "\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1" | ||
| 7817 | "\xda\xb2\x0c\xb2\x26\xc4\xd5\xef" | ||
| 7818 | "\x60\x38\xa4\x5e\x9a\x8c\x1b\x41" | ||
| 7819 | "\x03\x9f\xc4\x64\x7f\x01\x42\x9b" | ||
| 7820 | "\x0e\x1b\xea\xef\xbc\x88\x19\x5e" | ||
| 7821 | "\x31\x7e\xc2\x95\xfc\x09\x32\x0a" | ||
| 7822 | "\x46\x32\x7c\x41\x9c\x59\x3e\xe9" | ||
| 7823 | "\x8f\x9f\xd4\x31\xd6\x22\xbd\xf8" | ||
| 7824 | "\xf7\x0a\x94\xe5\xa9\xc3\xf6\x9d", | ||
| 7825 | .rlen = 32 + 64, | ||
| 7826 | }, { /* RFC 3602 Case 3 */ | ||
| 7827 | #ifdef __LITTLE_ENDIAN | ||
| 7828 | .key = "\x08\x00" /* rta length */ | ||
| 7829 | "\x01\x00" /* rta type */ | ||
| 7830 | #else | ||
| 7831 | .key = "\x00\x08" /* rta length */ | ||
| 7832 | "\x00\x01" /* rta type */ | ||
| 7833 | #endif | ||
| 7834 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7835 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7836 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7837 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7838 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7839 | "\x33\x44\x55\x66\x77\x88\x99\xaa" | ||
| 7840 | "\xbb\xcc\xdd\xee\xff\x11\x22\x33" | ||
| 7841 | "\x44\x55\x66\x77\x88\x99\xaa\xbb" | ||
| 7842 | "\xcc\xdd\xee\xff\x11\x22\x33\x44" | ||
| 7843 | "\x6c\x3e\xa0\x47\x76\x30\xce\x21" | ||
| 7844 | "\xa2\xce\x33\x4a\xa7\x46\xc2\xcd", | ||
| 7845 | .klen = 8 + 64 + 16, | ||
| 7846 | .iv = "\xc7\x82\xdc\x4c\x09\x8c\x66\xcb" | ||
| 7847 | "\xd9\xcd\x27\xd8\x25\x68\x2c\x81", | ||
| 7848 | .input = "This is a 48-byte message (exactly 3 AES blocks)", | ||
| 7849 | .ilen = 48, | ||
| 7850 | .result = "\xd0\xa0\x2b\x38\x36\x45\x17\x53" | ||
| 7851 | "\xd4\x93\x66\x5d\x33\xf0\xe8\x86" | ||
| 7852 | "\x2d\xea\x54\xcd\xb2\x93\xab\xc7" | ||
| 7853 | "\x50\x69\x39\x27\x67\x72\xf8\xd5" | ||
| 7854 | "\x02\x1c\x19\x21\x6b\xad\x52\x5c" | ||
| 7855 | "\x85\x79\x69\x5d\x83\xba\x26\x84" | ||
| 7856 | "\x64\x19\x17\x5b\x57\xe0\x21\x0f" | ||
| 7857 | "\xca\xdb\xa1\x26\x38\x14\xa2\x69" | ||
| 7858 | "\xdb\x54\x67\x80\xc0\x54\xe0\xfd" | ||
| 7859 | "\x3e\x91\xe7\x91\x7f\x13\x38\x44" | ||
| 7860 | "\xb7\xb1\xd6\xc8\x7d\x48\x8d\x41" | ||
| 7861 | "\x08\xea\x29\x6c\x74\x67\x3f\xb0" | ||
| 7862 | "\xac\x7f\x5c\x1d\xf5\xee\x22\x66" | ||
| 7863 | "\x27\xa6\xb6\x13\xba\xba\xf0\xc2", | ||
| 7864 | .rlen = 48 + 64, | ||
| 7865 | }, { /* RFC 3602 Case 4 */ | ||
| 7866 | #ifdef __LITTLE_ENDIAN | ||
| 7867 | .key = "\x08\x00" /* rta length */ | ||
| 7868 | "\x01\x00" /* rta type */ | ||
| 7869 | #else | ||
| 7870 | .key = "\x00\x08" /* rta length */ | ||
| 7871 | "\x00\x01" /* rta type */ | ||
| 7872 | #endif | ||
| 7873 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7874 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7875 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7876 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7877 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7878 | "\x33\x44\x55\x66\x77\x88\x99\xaa" | ||
| 7879 | "\xbb\xcc\xdd\xee\xff\x11\x22\x33" | ||
| 7880 | "\x44\x55\x66\x77\x88\x99\xaa\xbb" | ||
| 7881 | "\xcc\xdd\xee\xff\x11\x22\x33\x44" | ||
| 7882 | "\x56\xe4\x7a\x38\xc5\x59\x89\x74" | ||
| 7883 | "\xbc\x46\x90\x3d\xba\x29\x03\x49", | ||
| 7884 | .klen = 8 + 64 + 16, | ||
| 7885 | .iv = "\x8c\xe8\x2e\xef\xbe\xa0\xda\x3c" | ||
| 7886 | "\x44\x69\x9e\xd7\xdb\x51\xb7\xd9", | ||
| 7887 | .input = "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" | ||
| 7888 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" | ||
| 7889 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" | ||
| 7890 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" | ||
| 7891 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" | ||
| 7892 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" | ||
| 7893 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" | ||
| 7894 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf", | ||
| 7895 | .ilen = 64, | ||
| 7896 | .result = "\xc3\x0e\x32\xff\xed\xc0\x77\x4e" | ||
| 7897 | "\x6a\xff\x6a\xf0\x86\x9f\x71\xaa" | ||
| 7898 | "\x0f\x3a\xf0\x7a\x9a\x31\xa9\xc6" | ||
| 7899 | "\x84\xdb\x20\x7e\xb0\xef\x8e\x4e" | ||
| 7900 | "\x35\x90\x7a\xa6\x32\xc3\xff\xdf" | ||
| 7901 | "\x86\x8b\xb7\xb2\x9d\x3d\x46\xad" | ||
| 7902 | "\x83\xce\x9f\x9a\x10\x2e\xe9\x9d" | ||
| 7903 | "\x49\xa5\x3e\x87\xf4\xc3\xda\x55" | ||
| 7904 | "\x82\xcd\x42\x28\x21\x20\x15\xcc" | ||
| 7905 | "\xb7\xb2\x48\x40\xc7\x64\x41\x3a" | ||
| 7906 | "\x61\x32\x82\x85\xcf\x27\xed\xb4" | ||
| 7907 | "\xe4\x68\xa2\xf5\x79\x26\x27\xb2" | ||
| 7908 | "\x51\x67\x6a\xc4\xf0\x66\x55\x50" | ||
| 7909 | "\xbc\x6f\xed\xd5\x8d\xde\x23\x7c" | ||
| 7910 | "\x62\x98\x14\xd7\x2f\x37\x8d\xdf" | ||
| 7911 | "\xf4\x33\x80\xeb\x8e\xb4\xa4\xda", | ||
| 7912 | .rlen = 64 + 64, | ||
| 7913 | }, { /* RFC 3602 Case 5 */ | ||
| 7914 | #ifdef __LITTLE_ENDIAN | ||
| 7915 | .key = "\x08\x00" /* rta length */ | ||
| 7916 | "\x01\x00" /* rta type */ | ||
| 7917 | #else | ||
| 7918 | .key = "\x00\x08" /* rta length */ | ||
| 7919 | "\x00\x01" /* rta type */ | ||
| 7920 | #endif | ||
| 7921 | "\x00\x00\x00\x10" /* enc key length */ | ||
| 7922 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7923 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7924 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7925 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7926 | "\x33\x44\x55\x66\x77\x88\x99\xaa" | ||
| 7927 | "\xbb\xcc\xdd\xee\xff\x11\x22\x33" | ||
| 7928 | "\x44\x55\x66\x77\x88\x99\xaa\xbb" | ||
| 7929 | "\xcc\xdd\xee\xff\x11\x22\x33\x44" | ||
| 7930 | "\x90\xd3\x82\xb4\x10\xee\xba\x7a" | ||
| 7931 | "\xd9\x38\xc4\x6c\xec\x1a\x82\xbf", | ||
| 7932 | .klen = 8 + 64 + 16, | ||
| 7933 | .iv = "\xe9\x6e\x8c\x08\xab\x46\x57\x63" | ||
| 7934 | "\xfd\x09\x8d\x45\xdd\x3f\xf8\x93", | ||
| 7935 | .assoc = "\x00\x00\x43\x21\x00\x00\x00\x01", | ||
| 7936 | .alen = 8, | ||
| 7937 | .input = "\x08\x00\x0e\xbd\xa7\x0a\x00\x00" | ||
| 7938 | "\x8e\x9c\x08\x3d\xb9\x5b\x07\x00" | ||
| 7939 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" | ||
| 7940 | "\x10\x11\x12\x13\x14\x15\x16\x17" | ||
| 7941 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" | ||
| 7942 | "\x20\x21\x22\x23\x24\x25\x26\x27" | ||
| 7943 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" | ||
| 7944 | "\x30\x31\x32\x33\x34\x35\x36\x37" | ||
| 7945 | "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 7946 | "\x09\x0a\x0b\x0c\x0d\x0e\x0e\x01", | ||
| 7947 | .ilen = 80, | ||
| 7948 | .result = "\xf6\x63\xc2\x5d\x32\x5c\x18\xc6" | ||
| 7949 | "\xa9\x45\x3e\x19\x4e\x12\x08\x49" | ||
| 7950 | "\xa4\x87\x0b\x66\xcc\x6b\x99\x65" | ||
| 7951 | "\x33\x00\x13\xb4\x89\x8d\xc8\x56" | ||
| 7952 | "\xa4\x69\x9e\x52\x3a\x55\xdb\x08" | ||
| 7953 | "\x0b\x59\xec\x3a\x8e\x4b\x7e\x52" | ||
| 7954 | "\x77\x5b\x07\xd1\xdb\x34\xed\x9c" | ||
| 7955 | "\x53\x8a\xb5\x0c\x55\x1b\x87\x4a" | ||
| 7956 | "\xa2\x69\xad\xd0\x47\xad\x2d\x59" | ||
| 7957 | "\x13\xac\x19\xb7\xcf\xba\xd4\xa6" | ||
| 7958 | "\x74\x84\x94\xe2\xd7\x7a\xf9\xbf" | ||
| 7959 | "\x00\x8a\xa2\xd5\xb7\xf3\x60\xcf" | ||
| 7960 | "\xa0\x47\xdf\x4e\x09\xf4\xb1\x7f" | ||
| 7961 | "\x14\xd9\x3d\x53\x8e\x12\xb3\x00" | ||
| 7962 | "\x4c\x0a\x4e\x32\x40\x43\x88\xce" | ||
| 7963 | "\x92\x26\xc1\x76\x20\x11\xeb\xba" | ||
| 7964 | "\x62\x4f\x9a\x62\x25\xc3\x75\x80" | ||
| 7965 | "\xb7\x0a\x17\xf5\xd7\x94\xb4\x14", | ||
| 7966 | .rlen = 80 + 64, | ||
| 7967 | }, { /* NIST SP800-38A F.2.3 CBC-AES192.Encrypt */ | ||
| 7968 | #ifdef __LITTLE_ENDIAN | ||
| 7969 | .key = "\x08\x00" /* rta length */ | ||
| 7970 | "\x01\x00" /* rta type */ | ||
| 7971 | #else | ||
| 7972 | .key = "\x00\x08" /* rta length */ | ||
| 7973 | "\x00\x01" /* rta type */ | ||
| 7974 | #endif | ||
| 7975 | "\x00\x00\x00\x18" /* enc key length */ | ||
| 7976 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 7977 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 7978 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 7979 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 7980 | "\x33\x44\x55\x66\x77\x88\x99\xaa" | ||
| 7981 | "\xbb\xcc\xdd\xee\xff\x11\x22\x33" | ||
| 7982 | "\x44\x55\x66\x77\x88\x99\xaa\xbb" | ||
| 7983 | "\xcc\xdd\xee\xff\x11\x22\x33\x44" | ||
| 7984 | "\x8e\x73\xb0\xf7\xda\x0e\x64\x52" | ||
| 7985 | "\xc8\x10\xf3\x2b\x80\x90\x79\xe5" | ||
| 7986 | "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", | ||
| 7987 | .klen = 8 + 64 + 24, | ||
| 7988 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 7989 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 7990 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 7991 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 7992 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 7993 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 7994 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 7995 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 7996 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 7997 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 7998 | .ilen = 64, | ||
| 7999 | .result = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d" | ||
| 8000 | "\x71\x78\x18\x3a\x9f\xa0\x71\xe8" | ||
| 8001 | "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4" | ||
| 8002 | "\xe5\xe7\x38\x76\x3f\x69\x14\x5a" | ||
| 8003 | "\x57\x1b\x24\x20\x12\xfb\x7a\xe0" | ||
| 8004 | "\x7f\xa9\xba\xac\x3d\xf1\x02\xe0" | ||
| 8005 | "\x08\xb0\xe2\x79\x88\x59\x88\x81" | ||
| 8006 | "\xd9\x20\xa9\xe6\x4f\x56\x15\xcd" | ||
| 8007 | "\x77\x4b\x69\x9d\x3a\x0d\xb4\x99" | ||
| 8008 | "\x8f\xc6\x8e\x0e\x72\x58\xe3\x56" | ||
| 8009 | "\xbb\x21\xd2\x7d\x93\x11\x17\x91" | ||
| 8010 | "\xc4\x83\xfd\x0a\xea\x71\xfe\x77" | ||
| 8011 | "\xae\x6f\x0a\xa5\xf0\xcf\xe1\x35" | ||
| 8012 | "\xba\x03\xd5\x32\xfa\x5f\x41\x58" | ||
| 8013 | "\x8d\x43\x98\xa7\x94\x16\x07\x02" | ||
| 8014 | "\x0f\xb6\x81\x50\x28\x95\x2e\x75", | ||
| 8015 | .rlen = 64 + 64, | ||
| 8016 | }, { /* NIST SP800-38A F.2.5 CBC-AES256.Encrypt */ | ||
| 8017 | #ifdef __LITTLE_ENDIAN | ||
| 8018 | .key = "\x08\x00" /* rta length */ | ||
| 8019 | "\x01\x00" /* rta type */ | ||
| 8020 | #else | ||
| 8021 | .key = "\x00\x08" /* rta length */ | ||
| 8022 | "\x00\x01" /* rta type */ | ||
| 8023 | #endif | ||
| 8024 | "\x00\x00\x00\x20" /* enc key length */ | ||
| 8025 | "\x11\x22\x33\x44\x55\x66\x77\x88" | ||
| 8026 | "\x99\xaa\xbb\xcc\xdd\xee\xff\x11" | ||
| 8027 | "\x22\x33\x44\x55\x66\x77\x88\x99" | ||
| 8028 | "\xaa\xbb\xcc\xdd\xee\xff\x11\x22" | ||
| 8029 | "\x33\x44\x55\x66\x77\x88\x99\xaa" | ||
| 8030 | "\xbb\xcc\xdd\xee\xff\x11\x22\x33" | ||
| 8031 | "\x44\x55\x66\x77\x88\x99\xaa\xbb" | ||
| 8032 | "\xcc\xdd\xee\xff\x11\x22\x33\x44" | ||
| 8033 | "\x60\x3d\xeb\x10\x15\xca\x71\xbe" | ||
| 8034 | "\x2b\x73\xae\xf0\x85\x7d\x77\x81" | ||
| 8035 | "\x1f\x35\x2c\x07\x3b\x61\x08\xd7" | ||
| 8036 | "\x2d\x98\x10\xa3\x09\x14\xdf\xf4", | ||
| 8037 | .klen = 8 + 64 + 32, | ||
| 8038 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" | ||
| 8039 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", | ||
| 8040 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" | ||
| 8041 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" | ||
| 8042 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" | ||
| 8043 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" | ||
| 8044 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" | ||
| 8045 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" | ||
| 8046 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" | ||
| 8047 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", | ||
| 8048 | .ilen = 64, | ||
| 8049 | .result = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba" | ||
| 8050 | "\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6" | ||
| 8051 | "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d" | ||
| 8052 | "\x67\x9f\x77\x7b\xc6\x70\x2c\x7d" | ||
| 8053 | "\x39\xf2\x33\x69\xa9\xd9\xba\xcf" | ||
| 8054 | "\xa5\x30\xe2\x63\x04\x23\x14\x61" | ||
| 8055 | "\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc" | ||
| 8056 | "\xda\x6c\x19\x07\x8c\x6a\x9d\x1b" | ||
| 8057 | "\xb2\x27\x69\x7f\x45\x64\x79\x2b" | ||
| 8058 | "\xb7\xb8\x4c\xd4\x75\x94\x68\x40" | ||
| 8059 | "\x2a\xea\x91\xc7\x3f\x7c\xed\x7b" | ||
| 8060 | "\x95\x2c\x9b\xa8\xf5\xe5\x52\x8d" | ||
| 8061 | "\x6b\xe1\xae\xf1\x74\xfa\x0d\x0c" | ||
| 8062 | "\xe3\x8d\x64\xc3\x8d\xff\x7c\x8c" | ||
| 8063 | "\xdb\xbf\xa0\xb4\x01\xa2\xa8\xa2" | ||
| 8064 | "\x2c\xb1\x62\x2c\x10\xca\xf1\x21", | ||
| 8065 | .rlen = 64 + 64, | ||
| 8066 | }, | ||
| 8067 | }; | ||
| 8068 | |||
| 6371 | static struct cipher_testvec aes_lrw_enc_tv_template[] = { | 8069 | static struct cipher_testvec aes_lrw_enc_tv_template[] = { |
| 6372 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ | 8070 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ |
| 6373 | { /* LRW-32-AES 1 */ | 8071 | { /* LRW-32-AES 1 */ |
| @@ -14858,4 +16556,94 @@ static struct hash_testvec crc32c_tv_template[] = { | |||
| 14858 | }, | 16556 | }, |
| 14859 | }; | 16557 | }; |
| 14860 | 16558 | ||
| 16559 | /* | ||
| 16560 | * Blakcifn CRC test vectors | ||
| 16561 | */ | ||
| 16562 | #define BFIN_CRC_TEST_VECTORS 6 | ||
| 16563 | |||
| 16564 | static struct hash_testvec bfin_crc_tv_template[] = { | ||
| 16565 | { | ||
| 16566 | .psize = 0, | ||
| 16567 | .digest = "\x00\x00\x00\x00", | ||
| 16568 | }, | ||
| 16569 | { | ||
| 16570 | .key = "\x87\xa9\xcb\xed", | ||
| 16571 | .ksize = 4, | ||
| 16572 | .psize = 0, | ||
| 16573 | .digest = "\x87\xa9\xcb\xed", | ||
| 16574 | }, | ||
| 16575 | { | ||
| 16576 | .key = "\xff\xff\xff\xff", | ||
| 16577 | .ksize = 4, | ||
| 16578 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 16579 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" | ||
| 16580 | "\x11\x12\x13\x14\x15\x16\x17\x18" | ||
| 16581 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" | ||
| 16582 | "\x21\x22\x23\x24\x25\x26\x27\x28", | ||
| 16583 | .psize = 40, | ||
| 16584 | .digest = "\x84\x0c\x8d\xa2", | ||
| 16585 | }, | ||
| 16586 | { | ||
| 16587 | .key = "\xff\xff\xff\xff", | ||
| 16588 | .ksize = 4, | ||
| 16589 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 16590 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" | ||
| 16591 | "\x11\x12\x13\x14\x15\x16\x17\x18" | ||
| 16592 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" | ||
| 16593 | "\x21\x22\x23\x24\x25\x26", | ||
| 16594 | .psize = 38, | ||
| 16595 | .digest = "\x8c\x58\xec\xb7", | ||
| 16596 | }, | ||
| 16597 | { | ||
| 16598 | .key = "\xff\xff\xff\xff", | ||
| 16599 | .ksize = 4, | ||
| 16600 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 16601 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" | ||
| 16602 | "\x11\x12\x13\x14\x15\x16\x17\x18" | ||
| 16603 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" | ||
| 16604 | "\x21\x22\x23\x24\x25\x26\x27", | ||
| 16605 | .psize = 39, | ||
| 16606 | .digest = "\xdc\x50\x28\x7b", | ||
| 16607 | }, | ||
| 16608 | { | ||
| 16609 | .key = "\xff\xff\xff\xff", | ||
| 16610 | .ksize = 4, | ||
| 16611 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" | ||
| 16612 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" | ||
| 16613 | "\x11\x12\x13\x14\x15\x16\x17\x18" | ||
| 16614 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" | ||
| 16615 | "\x21\x22\x23\x24\x25\x26\x27\x28" | ||
| 16616 | "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" | ||
| 16617 | "\x31\x32\x33\x34\x35\x36\x37\x38" | ||
| 16618 | "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" | ||
| 16619 | "\x41\x42\x43\x44\x45\x46\x47\x48" | ||
| 16620 | "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50" | ||
| 16621 | "\x51\x52\x53\x54\x55\x56\x57\x58" | ||
| 16622 | "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" | ||
| 16623 | "\x61\x62\x63\x64\x65\x66\x67\x68" | ||
| 16624 | "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" | ||
| 16625 | "\x71\x72\x73\x74\x75\x76\x77\x78" | ||
| 16626 | "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" | ||
| 16627 | "\x81\x82\x83\x84\x85\x86\x87\x88" | ||
| 16628 | "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" | ||
| 16629 | "\x91\x92\x93\x94\x95\x96\x97\x98" | ||
| 16630 | "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0" | ||
| 16631 | "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" | ||
| 16632 | "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" | ||
| 16633 | "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" | ||
| 16634 | "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" | ||
| 16635 | "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8" | ||
| 16636 | "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" | ||
| 16637 | "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" | ||
| 16638 | "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" | ||
| 16639 | "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" | ||
| 16640 | "\xe9\xea\xeb\xec\xed\xee\xef\xf0", | ||
| 16641 | .psize = 240, | ||
| 16642 | .digest = "\x10\x19\x4a\x5c", | ||
| 16643 | .np = 2, | ||
| 16644 | .tap = { 31, 209 } | ||
| 16645 | }, | ||
| 16646 | |||
| 16647 | }; | ||
| 16648 | |||
| 14861 | #endif /* _CRYPTO_TESTMGR_H */ | 16649 | #endif /* _CRYPTO_TESTMGR_H */ |
