Loading crypto/testmgr.h +58 −1 Original line number Diff line number Diff line Loading @@ -1822,7 +1822,7 @@ static struct hash_testvec tgr128_tv_template[] = { }, }; #define GHASH_TEST_VECTORS 5 #define GHASH_TEST_VECTORS 6 static struct hash_testvec ghash_tv_template[] = { Loading Loading @@ -1875,6 +1875,63 @@ static struct hash_testvec ghash_tv_template[] = .psize = 20, .digest = "\xf8\x94\x87\x2a\x4b\x63\x99\x28" "\x23\xf7\x93\xf7\x19\xf5\x96\xd9", }, { .key = "\x0a\x1b\x2c\x3d\x4e\x5f\x64\x71" "\x82\x93\xa4\xb5\xc6\xd7\xe8\xf9", .ksize = 16, .plaintext = "\x56\x6f\x72\x20\x6c\x61\x75\x74" "\x65\x72\x20\x4c\x61\x75\x73\x63" "\x68\x65\x6e\x20\x75\x6e\x64\x20" "\x53\x74\x61\x75\x6e\x65\x6e\x20" "\x73\x65\x69\x20\x73\x74\x69\x6c" "\x6c\x2c\x0a\x64\x75\x20\x6d\x65" "\x69\x6e\x20\x74\x69\x65\x66\x74" "\x69\x65\x66\x65\x73\x20\x4c\x65" "\x62\x65\x6e\x3b\x0a\x64\x61\x73" "\x73\x20\x64\x75\x20\x77\x65\x69" "\xc3\x9f\x74\x20\x77\x61\x73\x20" "\x64\x65\x72\x20\x57\x69\x6e\x64" "\x20\x64\x69\x72\x20\x77\x69\x6c" "\x6c\x2c\x0a\x65\x68\x20\x6e\x6f" "\x63\x68\x20\x64\x69\x65\x20\x42" "\x69\x72\x6b\x65\x6e\x20\x62\x65" "\x62\x65\x6e\x2e\x0a\x0a\x55\x6e" "\x64\x20\x77\x65\x6e\x6e\x20\x64" "\x69\x72\x20\x65\x69\x6e\x6d\x61" "\x6c\x20\x64\x61\x73\x20\x53\x63" "\x68\x77\x65\x69\x67\x65\x6e\x20" "\x73\x70\x72\x61\x63\x68\x2c\x0a" "\x6c\x61\x73\x73\x20\x64\x65\x69" "\x6e\x65\x20\x53\x69\x6e\x6e\x65" "\x20\x62\x65\x73\x69\x65\x67\x65" "\x6e\x2e\x0a\x4a\x65\x64\x65\x6d" "\x20\x48\x61\x75\x63\x68\x65\x20" "\x67\x69\x62\x74\x20\x64\x69\x63" "\x68\x2c\x20\x67\x69\x62\x20\x6e" "\x61\x63\x68\x2c\x0a\x65\x72\x20" "\x77\x69\x72\x64\x20\x64\x69\x63" "\x68\x20\x6c\x69\x65\x62\x65\x6e" "\x20\x75\x6e\x64\x20\x77\x69\x65" "\x67\x65\x6e\x2e\x0a\x0a\x55\x6e" "\x64\x20\x64\x61\x6e\x6e\x20\x6d" "\x65\x69\x6e\x65\x20\x53\x65\x65" "\x6c\x65\x20\x73\x65\x69\x74\x20" "\x77\x65\x69\x74\x2c\x20\x73\x65" "\x69\x20\x77\x65\x69\x74\x2c\x0a" "\x64\x61\x73\x73\x20\x64\x69\x72" "\x20\x64\x61\x73\x20\x4c\x65\x62" "\x65\x6e\x20\x67\x65\x6c\x69\x6e" "\x67\x65\x2c\x0a\x62\x72\x65\x69" "\x74\x65\x20\x64\x69\x63\x68\x20" "\x77\x69\x65\x20\x65\x69\x6e\x20" "\x46\x65\x69\x65\x72\x6b\x6c\x65" "\x69\x64\x0a\xc3\xbc\x62\x65\x72" "\x20\x64\x69\x65\x20\x73\x69\x6e" "\x6e\x65\x6e\x64\x65\x6e\x20\x44" "\x69\x6e\x67\x65\x2e\x2e\x2e\x0a", .psize = 400, .digest = "\xad\xb1\xc1\xe9\x56\x70\x31\x1d" "\xbb\x5b\xdf\x5e\x70\x72\x1a\x57", }, }; Loading
crypto/testmgr.h +58 −1 Original line number Diff line number Diff line Loading @@ -1822,7 +1822,7 @@ static struct hash_testvec tgr128_tv_template[] = { }, }; #define GHASH_TEST_VECTORS 5 #define GHASH_TEST_VECTORS 6 static struct hash_testvec ghash_tv_template[] = { Loading Loading @@ -1875,6 +1875,63 @@ static struct hash_testvec ghash_tv_template[] = .psize = 20, .digest = "\xf8\x94\x87\x2a\x4b\x63\x99\x28" "\x23\xf7\x93\xf7\x19\xf5\x96\xd9", }, { .key = "\x0a\x1b\x2c\x3d\x4e\x5f\x64\x71" "\x82\x93\xa4\xb5\xc6\xd7\xe8\xf9", .ksize = 16, .plaintext = "\x56\x6f\x72\x20\x6c\x61\x75\x74" "\x65\x72\x20\x4c\x61\x75\x73\x63" "\x68\x65\x6e\x20\x75\x6e\x64\x20" "\x53\x74\x61\x75\x6e\x65\x6e\x20" "\x73\x65\x69\x20\x73\x74\x69\x6c" "\x6c\x2c\x0a\x64\x75\x20\x6d\x65" "\x69\x6e\x20\x74\x69\x65\x66\x74" "\x69\x65\x66\x65\x73\x20\x4c\x65" "\x62\x65\x6e\x3b\x0a\x64\x61\x73" "\x73\x20\x64\x75\x20\x77\x65\x69" "\xc3\x9f\x74\x20\x77\x61\x73\x20" "\x64\x65\x72\x20\x57\x69\x6e\x64" "\x20\x64\x69\x72\x20\x77\x69\x6c" "\x6c\x2c\x0a\x65\x68\x20\x6e\x6f" "\x63\x68\x20\x64\x69\x65\x20\x42" "\x69\x72\x6b\x65\x6e\x20\x62\x65" "\x62\x65\x6e\x2e\x0a\x0a\x55\x6e" "\x64\x20\x77\x65\x6e\x6e\x20\x64" "\x69\x72\x20\x65\x69\x6e\x6d\x61" "\x6c\x20\x64\x61\x73\x20\x53\x63" "\x68\x77\x65\x69\x67\x65\x6e\x20" "\x73\x70\x72\x61\x63\x68\x2c\x0a" "\x6c\x61\x73\x73\x20\x64\x65\x69" "\x6e\x65\x20\x53\x69\x6e\x6e\x65" "\x20\x62\x65\x73\x69\x65\x67\x65" "\x6e\x2e\x0a\x4a\x65\x64\x65\x6d" "\x20\x48\x61\x75\x63\x68\x65\x20" "\x67\x69\x62\x74\x20\x64\x69\x63" "\x68\x2c\x20\x67\x69\x62\x20\x6e" "\x61\x63\x68\x2c\x0a\x65\x72\x20" "\x77\x69\x72\x64\x20\x64\x69\x63" "\x68\x20\x6c\x69\x65\x62\x65\x6e" "\x20\x75\x6e\x64\x20\x77\x69\x65" "\x67\x65\x6e\x2e\x0a\x0a\x55\x6e" "\x64\x20\x64\x61\x6e\x6e\x20\x6d" "\x65\x69\x6e\x65\x20\x53\x65\x65" "\x6c\x65\x20\x73\x65\x69\x74\x20" "\x77\x65\x69\x74\x2c\x20\x73\x65" "\x69\x20\x77\x65\x69\x74\x2c\x0a" "\x64\x61\x73\x73\x20\x64\x69\x72" "\x20\x64\x61\x73\x20\x4c\x65\x62" "\x65\x6e\x20\x67\x65\x6c\x69\x6e" "\x67\x65\x2c\x0a\x62\x72\x65\x69" "\x74\x65\x20\x64\x69\x63\x68\x20" "\x77\x69\x65\x20\x65\x69\x6e\x20" "\x46\x65\x69\x65\x72\x6b\x6c\x65" "\x69\x64\x0a\xc3\xbc\x62\x65\x72" "\x20\x64\x69\x65\x20\x73\x69\x6e" "\x6e\x65\x6e\x64\x65\x6e\x20\x44" "\x69\x6e\x67\x65\x2e\x2e\x2e\x0a", .psize = 400, .digest = "\xad\xb1\xc1\xe9\x56\x70\x31\x1d" "\xbb\x5b\xdf\x5e\x70\x72\x1a\x57", }, };