|
@@ -666,13 +666,27 @@ int camellia_test(void)
|
|
|
0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 },
|
|
|
{ 0x9a, 0xcc, 0x23, 0x7d, 0xff, 0x16, 0xd7, 0x6c,
|
|
|
0x20, 0xef, 0x7c, 0x91, 0x9e, 0x3a, 0x75, 0x09 }
|
|
|
+},
|
|
|
+
|
|
|
+{
|
|
|
+ 32,
|
|
|
+ { 0x60, 0x3D, 0xEB, 0x10, 0x15, 0xCA, 0x71, 0xBE,
|
|
|
+ 0x2B, 0x73, 0xAE, 0xF0, 0x85, 0x7D, 0x77, 0x81,
|
|
|
+ 0x1F, 0x35, 0x2C, 0x07, 0x3B, 0x61, 0x08, 0xD7,
|
|
|
+ 0x2D, 0x98, 0x10, 0xA3, 0x09, 0x14, 0xDF, 0xF4 },
|
|
|
+ { 0xF6, 0x9F, 0x24, 0x45, 0xDF, 0x4F, 0x9B, 0x17,
|
|
|
+ 0xAD, 0x2B, 0x41, 0x7B, 0xE6, 0x6C, 0x37, 0x10 },
|
|
|
+ { 0x79, 0x60, 0x10, 0x9F, 0xB6, 0xDC, 0x42, 0x94,
|
|
|
+ 0x7F, 0xCF, 0xE5, 0x9E, 0xA3, 0xC5, 0xEB, 0x6B }
|
|
|
}
|
|
|
};
|
|
|
unsigned char buf[2][16];
|
|
|
symmetric_key skey;
|
|
|
- int err, x;
|
|
|
+ int err;
|
|
|
+ unsigned int x;
|
|
|
|
|
|
- for (x = 0; x < 3; x++) {
|
|
|
+ for (x = 0; x < sizeof(tests)/sizeof(tests[0]); x++) {
|
|
|
+ zeromem(&skey, sizeof(skey));
|
|
|
if ((err = camellia_setup(tests[x].key, tests[x].keylen, 0, &skey)) != CRYPT_OK) {
|
|
|
return err;
|
|
|
}
|