mirror of
https://git.suyu.dev/suyu/mbedtls.git
synced 2025-12-24 08:16:33 +01:00
Combine hex parameters in a struct
This commit is contained in:
parent
5cfc06832e
commit
d30ca130e8
36 changed files with 756 additions and 1014 deletions
|
|
@ -8,9 +8,8 @@
|
|||
*/
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void xtea_encrypt_ecb( uint8_t * key_str, uint32_t key_str_len,
|
||||
uint8_t * src_str, uint32_t src_str_len,
|
||||
uint8_t * hex_dst_string, uint32_t hex_dst_string_len )
|
||||
void xtea_encrypt_ecb( HexParam_t * key_str, HexParam_t * src_str,
|
||||
HexParam_t * hex_dst_string )
|
||||
{
|
||||
unsigned char output[100];
|
||||
mbedtls_xtea_context ctx;
|
||||
|
|
@ -18,17 +17,16 @@ void xtea_encrypt_ecb( uint8_t * key_str, uint32_t key_str_len,
|
|||
memset(output, 0x00, 100);
|
||||
|
||||
|
||||
mbedtls_xtea_setup( &ctx, key_str );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_ecb( &ctx, MBEDTLS_XTEA_ENCRYPT, src_str, output ) == 0 );
|
||||
mbedtls_xtea_setup( &ctx, key_str->x );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_ecb( &ctx, MBEDTLS_XTEA_ENCRYPT, src_str->x, output ) == 0 );
|
||||
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string, 8, hex_dst_string_len ) == 0 );
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string->x, 8, hex_dst_string->len ) == 0 );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void xtea_decrypt_ecb( uint8_t * key_str, uint32_t key_str_len,
|
||||
uint8_t * src_str, uint32_t src_str_len,
|
||||
uint8_t * hex_dst_string, uint32_t hex_dst_string_len )
|
||||
void xtea_decrypt_ecb( HexParam_t * key_str, HexParam_t * src_str,
|
||||
HexParam_t * hex_dst_string )
|
||||
{
|
||||
unsigned char output[100];
|
||||
mbedtls_xtea_context ctx;
|
||||
|
|
@ -36,18 +34,16 @@ void xtea_decrypt_ecb( uint8_t * key_str, uint32_t key_str_len,
|
|||
memset(output, 0x00, 100);
|
||||
|
||||
|
||||
mbedtls_xtea_setup( &ctx, key_str );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_ecb( &ctx, MBEDTLS_XTEA_DECRYPT, src_str, output ) == 0 );
|
||||
mbedtls_xtea_setup( &ctx, key_str->x );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_ecb( &ctx, MBEDTLS_XTEA_DECRYPT, src_str->x, output ) == 0 );
|
||||
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string, 8, hex_dst_string_len ) == 0 );
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string->x, 8, hex_dst_string->len ) == 0 );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
|
||||
void xtea_encrypt_cbc( uint8_t * key_str, uint32_t key_str_len,
|
||||
uint8_t * iv_str, uint32_t iv_str_len,
|
||||
uint8_t * src_str, uint32_t len,
|
||||
uint8_t * hex_dst_string, uint32_t hex_dst_string_len )
|
||||
void xtea_encrypt_cbc( HexParam_t * key_str, HexParam_t * iv_str,
|
||||
HexParam_t * src_str, HexParam_t * hex_dst_string )
|
||||
{
|
||||
unsigned char output[100];
|
||||
mbedtls_xtea_context ctx;
|
||||
|
|
@ -55,19 +51,17 @@ void xtea_encrypt_cbc( uint8_t * key_str, uint32_t key_str_len,
|
|||
memset(output, 0x00, 100);
|
||||
|
||||
|
||||
mbedtls_xtea_setup( &ctx, key_str );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_cbc( &ctx, MBEDTLS_XTEA_ENCRYPT, len, iv_str,
|
||||
src_str, output ) == 0 );
|
||||
mbedtls_xtea_setup( &ctx, key_str->x );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_cbc( &ctx, MBEDTLS_XTEA_ENCRYPT, src_str->len, iv_str->x,
|
||||
src_str->x, output ) == 0 );
|
||||
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string, len, hex_dst_string_len ) == 0 );
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string->x, src_str->len, hex_dst_string->len ) == 0 );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
|
||||
void xtea_decrypt_cbc( uint8_t * key_str, uint32_t key_str_len,
|
||||
uint8_t * iv_str, uint32_t iv_str_len,
|
||||
uint8_t * src_str, uint32_t len,
|
||||
uint8_t * hex_dst_string, uint32_t hex_dst_string_len )
|
||||
void xtea_decrypt_cbc( HexParam_t * key_str, HexParam_t * iv_str,
|
||||
HexParam_t * src_str, HexParam_t * hex_dst_string )
|
||||
{
|
||||
unsigned char output[100];
|
||||
mbedtls_xtea_context ctx;
|
||||
|
|
@ -75,11 +69,11 @@ void xtea_decrypt_cbc( uint8_t * key_str, uint32_t key_str_len,
|
|||
memset(output, 0x00, 100);
|
||||
|
||||
|
||||
mbedtls_xtea_setup( &ctx, key_str );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_cbc( &ctx, MBEDTLS_XTEA_DECRYPT, len, iv_str,
|
||||
src_str, output ) == 0 );
|
||||
mbedtls_xtea_setup( &ctx, key_str->x );
|
||||
TEST_ASSERT( mbedtls_xtea_crypt_cbc( &ctx, MBEDTLS_XTEA_DECRYPT, src_str->len, iv_str->x,
|
||||
src_str->x, output ) == 0 );
|
||||
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string, len, hex_dst_string_len ) == 0 );
|
||||
TEST_ASSERT( hexcmp( output, hex_dst_string->x, src_str->len, hex_dst_string->len ) == 0 );
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue