test_cbc: fix indentation

Spaces were used instead of tabs. Fix up by using Lindent from
Linux kernel since we use same coding style.

Change-Id: Iece925ae40cad342fde1e33c240cb2ac23a15a9b
Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
This commit is contained in:
Andrew Boie 2016-08-26 10:29:52 -07:00 committed by Anas Nashif
commit 6d2ab0ea11

View file

@ -70,29 +70,32 @@
* Ciphertext 3ff1caa1681fac09120eca307586e1a7 * Ciphertext 3ff1caa1681fac09120eca307586e1a7
*/ */
const uint8_t key[16] = { const uint8_t key[16] = {
0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88,
0x09, 0xcf, 0x4f, 0x3c 0x09, 0xcf, 0x4f, 0x3c
}; };
const uint8_t iv[16] = { const uint8_t iv[16] = {
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
0x0c, 0x0d, 0x0e, 0x0f 0x0c, 0x0d, 0x0e, 0x0f
}; };
const uint8_t plaintext[64] = { const uint8_t plaintext[64] = {
0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11,
0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46,
0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b,
0xe6, 0x6c, 0x37, 0x10 0xe6, 0x6c, 0x37, 0x10
}; };
const uint8_t ciphertext[80] = { const uint8_t ciphertext[80] = {
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
0x0c, 0x0d, 0x0e, 0x0f, 0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0x0c, 0x0d, 0x0e, 0x0f, 0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46,
0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 0x50, 0x86, 0xcb, 0x9b, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 0x50, 0x86, 0xcb, 0x9b,
0x50, 0x72, 0x19, 0xee, 0x95, 0xdb, 0x11, 0x3a, 0x91, 0x76, 0x78, 0xb2, 0x50, 0x72, 0x19, 0xee, 0x95, 0xdb, 0x11, 0x3a, 0x91, 0x76, 0x78, 0xb2,
0x73, 0xbe, 0xd6, 0xb8, 0xe3, 0xc1, 0x74, 0x3b, 0x71, 0x16, 0xe6, 0x9e, 0x73, 0xbe, 0xd6, 0xb8, 0xe3, 0xc1, 0x74, 0x3b, 0x71, 0x16, 0xe6, 0x9e,
0x22, 0x22, 0x95, 0x16, 0x3f, 0xf1, 0xca, 0xa1, 0x68, 0x1f, 0xac, 0x09, 0x22, 0x22, 0x95, 0x16, 0x3f, 0xf1, 0xca, 0xa1, 0x68, 0x1f, 0xac, 0x09,
0x12, 0x0e, 0xca, 0x30, 0x75, 0x86, 0xe1, 0xa7 0x12, 0x0e, 0xca, 0x30, 0x75, 0x86, 0xe1, 0xa7
}; };
/* /*
@ -100,51 +103,55 @@ const uint8_t ciphertext[80] = {
*/ */
uint32_t test_1_and_2(void) uint32_t test_1_and_2(void)
{ {
struct tc_aes_key_sched_struct a; struct tc_aes_key_sched_struct a;
uint8_t iv_buffer[16]; uint8_t iv_buffer[16];
uint8_t encrypted[80]; uint8_t encrypted[80];
uint8_t decrypted[64]; uint8_t decrypted[64];
uint8_t *p; uint8_t *p;
uint32_t length; uint32_t length;
int result = TC_PASS; int result = TC_PASS;
(void)tc_aes128_set_encrypt_key(&a, key); (void)tc_aes128_set_encrypt_key(&a, key);
(void)memcpy(iv_buffer, iv, TC_AES_BLOCK_SIZE); (void)memcpy(iv_buffer, iv, TC_AES_BLOCK_SIZE);
TC_PRINT("CBC test #1 (encryption SP 800-38a tests):\n"); TC_PRINT("CBC test #1 (encryption SP 800-38a tests):\n");
if (tc_cbc_mode_encrypt(encrypted, if (tc_cbc_mode_encrypt(encrypted,
sizeof(plaintext) + TC_AES_BLOCK_SIZE, sizeof(plaintext) + TC_AES_BLOCK_SIZE,
plaintext, sizeof(plaintext), plaintext, sizeof(plaintext),
iv_buffer, &a) == 0) { iv_buffer, &a) == 0) {
TC_ERROR("CBC test #1 (encryption SP 800-38a tests) failed in %s.\n", __func__); TC_ERROR
result = TC_FAIL; ("CBC test #1 (encryption SP 800-38a tests) failed in %s.\n",
goto exitTest1; __func__);
} result = TC_FAIL;
goto exitTest1;
}
result = check_result(1, ciphertext, sizeof(encrypted), result = check_result(1, ciphertext, sizeof(encrypted),
encrypted, sizeof(encrypted), 1); encrypted, sizeof(encrypted), 1);
TC_END_RESULT(result); TC_END_RESULT(result);
TC_PRINT("CBC test #2 (decryption SP 800-38a tests):\n"); TC_PRINT("CBC test #2 (decryption SP 800-38a tests):\n");
(void)tc_aes128_set_decrypt_key(&a, key); (void)tc_aes128_set_decrypt_key(&a, key);
p = &encrypted[TC_AES_BLOCK_SIZE]; p = &encrypted[TC_AES_BLOCK_SIZE];
length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE; length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE;
if (tc_cbc_mode_decrypt(decrypted, length - TC_AES_BLOCK_SIZE, p, if (tc_cbc_mode_decrypt(decrypted, length - TC_AES_BLOCK_SIZE, p,
length, encrypted, &a) == 0) { length, encrypted, &a) == 0) {
TC_ERROR("CBC test #2 (decryption SP 800-38a tests) failed in.\n", __func__); TC_ERROR
result = TC_FAIL; ("CBC test #2 (decryption SP 800-38a tests) failed in.\n",
goto exitTest1; __func__);
} result = TC_FAIL;
goto exitTest1;
}
result = check_result(2, plaintext, sizeof(decrypted), result = check_result(2, plaintext, sizeof(decrypted),
decrypted, sizeof(decrypted), 1); decrypted, sizeof(decrypted), 1);
exitTest1: exitTest1:
TC_END_RESULT(result); TC_END_RESULT(result);
return result; return result;
} }
/* /*
@ -153,21 +160,20 @@ uint32_t test_1_and_2(void)
void main(void) void main(void)
{ {
uint32_t result = TC_PASS; uint32_t result = TC_PASS;
TC_START("Performing AES128 tests:"); TC_START("Performing AES128 tests:");
TC_PRINT("Performing CBC tests:\n"); TC_PRINT("Performing CBC tests:\n");
result = test_1_and_2(); result = test_1_and_2();
if (result == TC_FAIL) { /* terminate test */ if (result == TC_FAIL) { /* terminate test */
TC_ERROR("CBC test #1 failed.\n"); TC_ERROR("CBC test #1 failed.\n");
goto exitTest; goto exitTest;
} }
TC_PRINT("All CBC tests succeeded!\n"); TC_PRINT("All CBC tests succeeded!\n");
exitTest: exitTest:
TC_END_RESULT(result); TC_END_RESULT(result);
TC_END_REPORT(result); TC_END_REPORT(result);
} }