Lines Matching +full:- +full:path
29 const char *path; member
40 * http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
44 /* NIST F.1.1 ECB-AES128.Encrypt */
45 .path = "/crypto/cipher/aes-ecb-128",
61 /* NIST F.1.3 ECB-AES192.Encrypt */
62 .path = "/crypto/cipher/aes-ecb-192",
78 /* NIST F.1.5 ECB-AES256.Encrypt */
79 .path = "/crypto/cipher/aes-ecb-256",
97 /* NIST F.2.1 CBC-AES128.Encrypt */
98 .path = "/crypto/cipher/aes-cbc-128",
115 /* NIST F.2.3 CBC-AES128.Encrypt */
116 .path = "/crypto/cipher/aes-cbc-192",
133 /* NIST F.2.5 CBC-AES128.Encrypt */
134 .path = "/crypto/cipher/aes-cbc-256",
158 .path = "/crypto/cipher/des-ecb-56-one-block",
167 .path = "/crypto/cipher/des-cbc-56-one-block",
176 .path = "/crypto/cipher/des-ecb-56",
192 /* Borrowed from linux-kernel crypto/testmgr.h */
193 .path = "/crypto/cipher/3des-cbc",
221 /* Borrowed from linux-kernel crypto/testmgr.h */
222 .path = "/crypto/cipher/3des-ecb",
234 /* Borrowed from linux-kernel crypto/testmgr.h */
235 .path = "/crypto/cipher/3des-ctr",
310 .path = "/crypto/cipher/cast5-128",
319 .path = "/crypto/cipher/serpent-128",
328 .path = "/crypto/cipher/serpent-192",
338 .path = "/crypto/cipher/serpent-256a",
348 .path = "/crypto/cipher/serpent-256b",
358 .path = "/crypto/cipher/twofish-128",
367 .path = "/crypto/cipher/twofish-192",
377 .path = "/crypto/cipher/twofish-256",
387 /* SM4, GB/T 32907-2016, Appendix A.1 */
388 .path = "/crypto/cipher/sm4",
400 .path = "/crypto/cipher/aes-xts-128-1",
417 .path = "/crypto/cipher/aes-xts-128-2",
434 .path = "/crypto/cipher/aes-xts-128-3",
451 .path = "/crypto/cipher/aes-xts-128-4",
527 /* Bad config - cast5-128 has 8 byte block size
530 .path = "/crypto/cipher/cast5-xts-128",
538 /* NIST F.5.1 CTR-AES128.Encrypt */
539 .path = "/crypto/cipher/aes-ctr-128",
556 /* NIST F.5.3 CTR-AES192.Encrypt */
557 .path = "/crypto/cipher/aes-ctr-192",
574 /* NIST F.5.5 CTR-AES256.Encrypt */
575 .path = "/crypto/cipher/aes-ctr-256",
598 return 10 + (c - 'a'); in unhex()
601 return 10 + (c - 'A'); in unhex()
603 return c - '0'; in unhex()
611 return 'a' + (i - 10); in hex()
661 nkey = unhex_string(data->key, &key); in test_cipher()
662 if (data->iv) { in test_cipher()
663 niv = unhex_string(data->iv, &iv); in test_cipher()
665 if (data->ciphertext) { in test_cipher()
666 nciphertext = unhex_string(data->ciphertext, &ciphertext); in test_cipher()
668 if (data->plaintext) { in test_cipher()
669 nplaintext = unhex_string(data->plaintext, &plaintext); in test_cipher()
677 data->alg, data->mode, in test_cipher()
679 data->plaintext ? &error_abort : &err); in test_cipher()
680 if (data->plaintext) { in test_cipher()
688 keysize = qcrypto_cipher_get_key_len(data->alg); in test_cipher()
689 blocksize = qcrypto_cipher_get_block_len(data->alg); in test_cipher()
690 ivsize = qcrypto_cipher_get_iv_len(data->alg, data->mode); in test_cipher()
692 if (data->mode == QCRYPTO_CIPHER_MODE_XTS) { in test_cipher()
715 g_assert_cmpstr(outtexthex, ==, data->ciphertext); in test_cipher()
732 g_assert_cmpstr(outtexthex, ==, data->plaintext); in test_cipher()
796 g_assert(ret == -1); in test_cipher_short_plaintext()
807 g_assert(ret == -1); in test_cipher_short_plaintext()
823 g_test_add_data_func(test_data[i].path, &test_data[i], test_cipher); in main()
833 g_test_add_func("/crypto/cipher/null-iv", in main()
836 g_test_add_func("/crypto/cipher/short-plaintext", in main()
839 g_printerr("# skip unsupported aes-256:cbc\n"); in main()