Re: [PATCH] crypto: Add CTS mode required for Kerberos AES support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Feb 20, 2008 at 03:25:43PM -0500, Kevin Coffman wrote:
> Implement CTS wrapper for CBC mode required for support of AES
> encryption support for Kerberos (rfc3962).
> 
> Signed-off-by: Kevin Coffman <kwc@xxxxxxxxxxxxxx>

Great work! The only problem is that I was slow in merging it
so the tcrypt rework got in the way.  I've fixed it up with the
following patch.

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@xxxxxxxxxxxxxxxxxxx>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
diff --git a/crypto/tcrypt.h b/crypto/tcrypt.h
index 6585df0..47bc0ec 100644
--- a/crypto/tcrypt.h
+++ b/crypto/tcrypt.h
@@ -7630,204 +7630,204 @@ static struct cipher_testvec salsa20_stream_enc_tv_template[] = {
 static struct cipher_testvec cts_mode_enc_tv_template[] = {
 	{ /* from rfc3962 */
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen	= 17,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20 },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20",
 		.rlen	= 17,
-		.result	= { 0xc6, 0x35, 0x35, 0x68, 0xf2, 0xbf, 0x8c, 0xb4,
-			    0xd8, 0xa5, 0x80, 0x36, 0x2d, 0xa7, 0xff, 0x7f,
-			    0x97 },
+		.result	= "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4"
+			  "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f"
+			  "\x97",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen   = 31,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20 },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20",
 		.rlen   = 31,
-		.result = { 0xfc, 0x00, 0x78, 0x3e, 0x0e, 0xfd, 0xb2, 0xc1,
-			    0xd4, 0x45, 0xd4, 0xc8, 0xef, 0xf7, 0xed, 0x22,
-			    0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5 },
+		.result = "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1"
+			  "\xd4\x45\xd4\xc8\xef\xf7\xed\x22"
+			  "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen   = 32,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43 },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43",
 		.rlen   = 32,
-		.result = { 0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
-			    0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84 },
+		.result = "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
+			  "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen   = 47,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c",
 		.rlen   = 47,
-		.result = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0xb3, 0xff, 0xfd, 0x94, 0x0c, 0x16, 0xa1, 0x8c,
-			    0x1b, 0x55, 0x49, 0xd2, 0xf8, 0x38, 0x02, 0x9e,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5 },
+		.result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c"
+			  "\x1b\x55\x49\xd2\xf8\x38\x02\x9e"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen   = 48,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20 },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c\x20",
 		.rlen   = 48,
-		.result = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
-			    0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8 },
+		.result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
+			  "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.ilen   = 64,
-		.input  = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20,
-			    0x61, 0x6e, 0x64, 0x20, 0x77, 0x6f, 0x6e, 0x74,
-			    0x6f, 0x6e, 0x20, 0x73, 0x6f, 0x75, 0x70, 0x2e },
+		.input  = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c\x20"
+			  "\x61\x6e\x64\x20\x77\x6f\x6e\x74"
+			  "\x6f\x6e\x20\x73\x6f\x75\x70\x2e",
 		.rlen   = 64,
-		.result = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
-			    0x48, 0x07, 0xef, 0xe8, 0x36, 0xee, 0x89, 0xa5,
-			    0x26, 0x73, 0x0d, 0xbc, 0x2f, 0x7b, 0xc8, 0x40,
-			    0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
-			    0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8 },
+		.result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
+			  "\x48\x07\xef\xe8\x36\xee\x89\xa5"
+			  "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40"
+			  "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
+			  "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
 	}
 };
 
 static struct cipher_testvec cts_mode_dec_tv_template[] = {
 	{ /* from rfc3962 */
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen	= 17,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20 },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20",
 		.ilen	= 17,
-		.input	= { 0xc6, 0x35, 0x35, 0x68, 0xf2, 0xbf, 0x8c, 0xb4,
-			    0xd8, 0xa5, 0x80, 0x36, 0x2d, 0xa7, 0xff, 0x7f,
-			    0x97 },
+		.input	= "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4"
+			  "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f"
+			  "\x97",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen   = 31,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20 },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20",
 		.ilen   = 31,
-		.input  = { 0xfc, 0x00, 0x78, 0x3e, 0x0e, 0xfd, 0xb2, 0xc1,
-			    0xd4, 0x45, 0xd4, 0xc8, 0xef, 0xf7, 0xed, 0x22,
-			    0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5 },
+		.input  = "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1"
+			  "\xd4\x45\xd4\xc8\xef\xf7\xed\x22"
+			  "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen   = 32,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43 },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43",
 		.ilen   = 32,
-		.input  = { 0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
-			    0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84 },
+		.input  = "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
+			  "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen   = 47,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c",
 		.ilen   = 47,
-		.input  = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0xb3, 0xff, 0xfd, 0x94, 0x0c, 0x16, 0xa1, 0x8c,
-			    0x1b, 0x55, 0x49, 0xd2, 0xf8, 0x38, 0x02, 0x9e,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5 },
+		.input  = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c"
+			  "\x1b\x55\x49\xd2\xf8\x38\x02\x9e"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen   = 48,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20 },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c\x20",
 		.ilen   = 48,
-		.input  = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
-			    0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8 },
+		.input  = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
+			  "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8",
 	}, {
 		.klen	= 16,
-		.key    = { 0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
-			    0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69 },
+		.key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
+			  "\x74\x65\x72\x69\x79\x61\x6b\x69",
 		.rlen   = 64,
-		.result = { 0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
-			    0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
-			    0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
-			    0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
-			    0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
-			    0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20,
-			    0x61, 0x6e, 0x64, 0x20, 0x77, 0x6f, 0x6e, 0x74,
-			    0x6f, 0x6e, 0x20, 0x73, 0x6f, 0x75, 0x70, 0x2e },
+		.result = "\x49\x20\x77\x6f\x75\x6c\x64\x20"
+			  "\x6c\x69\x6b\x65\x20\x74\x68\x65"
+			  "\x20\x47\x65\x6e\x65\x72\x61\x6c"
+			  "\x20\x47\x61\x75\x27\x73\x20\x43"
+			  "\x68\x69\x63\x6b\x65\x6e\x2c\x20"
+			  "\x70\x6c\x65\x61\x73\x65\x2c\x20"
+			  "\x61\x6e\x64\x20\x77\x6f\x6e\x74"
+			  "\x6f\x6e\x20\x73\x6f\x75\x70\x2e",
 		.ilen   = 64,
-		.input  = { 0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
-			    0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
-			    0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
-			    0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
-			    0x48, 0x07, 0xef, 0xe8, 0x36, 0xee, 0x89, 0xa5,
-			    0x26, 0x73, 0x0d, 0xbc, 0x2f, 0x7b, 0xc8, 0x40,
-			    0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
-			    0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8 },
+		.input  = "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
+			  "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
+			  "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+			  "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
+			  "\x48\x07\xef\xe8\x36\xee\x89\xa5"
+			  "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40"
+			  "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
+			  "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
 	}
 };
 
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux