Skip to content

Commit 387536d

Browse files
committed
re-privatizes urcrypt__reverse and links directly to .o file for use in tests
1 parent 7f6dbde commit 387536d

15 files changed

Lines changed: 93 additions & 92 deletions

File tree

Makefile.am

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -201,6 +201,7 @@ test_runner_CFLAGS = $(LIBCRYPTO_CFLAGS) \
201201
test_runner_LDFLAGS = -L/usr/local/lib -Wl,-rpath,/usr/local/lib
202202

203203
test_runner_LDADD = liburcrypt.la \
204+
urcrypt/liburcrypt_la-util.o \
204205
$(LIBCRYPTO_LIBS) \
205206
$(LIBSECP256K1_LIBS) \
206207
$(LIBAES_SIV_LIBS)

tests/test_argon2.c

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ static int test_argon2i_reference_vector_1(void) {
3838
/* Expected output (reversed from reference) */
3939
uint8_t expected[32];
4040
hex_to_bytes("f6c4db4a54e2a370627aff3db6176b94a2a209a62c8e36152711802f7b30c694", expected, 32);
41-
urcrypt_reverse(32, expected);
41+
urcrypt__reverse(32, expected);
4242

4343
error = urcrypt_argon2(
4444
urcrypt_argon2_i, 0x10, 1, 65536, 2,
@@ -69,7 +69,7 @@ static int test_argon2i_reference_vector_2(void) {
6969

7070
uint8_t expected[32];
7171
hex_to_bytes("fd4dd83d762c49bdeaf57c47bdcd0c2f1babf863fdeb490df63ede9975fccf06", expected, 32);
72-
urcrypt_reverse(32, expected);
72+
urcrypt__reverse(32, expected);
7373

7474
error = urcrypt_argon2(
7575
urcrypt_argon2_i, 0x10, 1, 256, 2,
@@ -100,7 +100,7 @@ static int test_argon2i_reference_vector_3(void) {
100100

101101
uint8_t expected[32];
102102
hex_to_bytes("b6c11560a6a9d61eac706b79a2f97d68b4463aa3ad87e00c07e2b01e90c564fb", expected, 32);
103-
urcrypt_reverse(32, expected);
103+
urcrypt__reverse(32, expected);
104104

105105
error = urcrypt_argon2(
106106
urcrypt_argon2_i, 0x10, 2, 256, 2,
@@ -131,7 +131,7 @@ static int test_argon2i_reference_vector_4(void) {
131131

132132
uint8_t expected[32];
133133
hex_to_bytes("e9c902074b6754531a3a0be519e5baf404b30ce69b3f01ac3bf21229960109a3", expected, 32);
134-
urcrypt_reverse(32, expected);
134+
urcrypt__reverse(32, expected);
135135

136136
error = urcrypt_argon2(
137137
urcrypt_argon2_i, 0x10, 1, 65536, 2,
@@ -162,7 +162,7 @@ static int test_argon2i_reference_vector_5(void) {
162162

163163
uint8_t expected[32];
164164
hex_to_bytes("79a103b90fe8aef8570cb31fc8b22259778916f8336b7bdac3892569d4f1c497", expected, 32);
165-
urcrypt_reverse(32, expected);
165+
urcrypt__reverse(32, expected);
166166

167167
error = urcrypt_argon2(
168168
urcrypt_argon2_i, 0x10, 1, 65536, 2,
@@ -299,7 +299,7 @@ static int test_blake2_reference_vector(void) {
299299
hex_to_bytes("786a02f742015903c6c6fd852552d272912f4740e15847618a86e217f71f5419"
300300
"d25e1031afee585313896444934eb04b903a685b1448b755d56f701afe9be2ce",
301301
expected, 64);
302-
urcrypt_reverse(64, expected);
302+
urcrypt__reverse(64, expected);
303303

304304
result = urcrypt_blake2(0, msg, 0, NULL, 64, out);
305305

@@ -319,7 +319,7 @@ static int test_blake2_with_key(void) {
319319
char msg[] = "hello";
320320
uint8_t key[16] = {0};
321321
reverse_string(msg, 5);
322-
urcrypt_reverse(16, key);
322+
urcrypt__reverse(16, key);
323323

324324
result = urcrypt_blake2(5, (uint8_t*)msg, 16, key, 32, out);
325325

@@ -342,8 +342,8 @@ static int test_blake2_determinism(void) {
342342

343343
reverse_string(msg1, 12);
344344
reverse_string(msg2, 12);
345-
urcrypt_reverse(8, key1);
346-
urcrypt_reverse(8, key2);
345+
urcrypt__reverse(8, key1);
346+
urcrypt__reverse(8, key2);
347347

348348
result = urcrypt_blake2(12, (uint8_t*)msg1, 8, key1, 64, out1);
349349
ASSERT(result == 0, "first blake2 run should succeed");

tests/test_keccak.c

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ static int test_keccak_224_empty(void) {
2929

3030
/* Ethereum test vector for empty string */
3131
hex_to_bytes("f71837502ba8e10837bdd8d365adb85591895602fc552b48b7390abd", expected, 28);
32-
urcrypt_reverse(28, expected);
32+
urcrypt__reverse(28, expected);
3333

3434
int ret = urcrypt_keccak_224(NULL, 0, out);
3535

@@ -49,7 +49,7 @@ static int test_keccak_224_41(void) {
4949

5050
/* Ethereum test vector for 0x41 */
5151
hex_to_bytes("ef40b16ff375c834e91412489889f36538748c5454f4b02ba750b65e", expected, 28);
52-
urcrypt_reverse(28, expected);
52+
urcrypt__reverse(28, expected);
5353

5454
int ret = urcrypt_keccak_224(&input, 1, out);
5555

@@ -69,7 +69,7 @@ static int test_keccak_224_asd(void) {
6969

7070
/* Ethereum test vector for "asd" */
7171
hex_to_bytes("c8cc732c0fa9004eb33d5d833ca22fbd27f21f1c53ef5670bc6779ca", expected, 28);
72-
urcrypt_reverse(28, expected);
72+
urcrypt__reverse(28, expected);
7373

7474
int ret = urcrypt_keccak_224((const uint8_t*)message, strlen(message), out);
7575

@@ -88,7 +88,7 @@ static int test_keccak_256_empty(void) {
8888

8989
/* Ethereum test vector for empty string */
9090
hex_to_bytes("c5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470", expected, 32);
91-
urcrypt_reverse(32, expected);
91+
urcrypt__reverse(32, expected);
9292

9393
int ret = urcrypt_keccak_256(NULL, 0, out);
9494

@@ -108,7 +108,7 @@ static int test_keccak_256_41(void) {
108108

109109
/* Ethereum test vector for 0x41 */
110110
hex_to_bytes("03783fac2efed8fbc9ad443e592ee30e61d65f471140c10ca155e937b435b760", expected, 32);
111-
urcrypt_reverse(32, expected);
111+
urcrypt__reverse(32, expected);
112112

113113
int ret = urcrypt_keccak_256(&input, 1, out);
114114

@@ -128,7 +128,7 @@ static int test_keccak_256_asd(void) {
128128

129129
/* Ethereum test vector for "asd" */
130130
hex_to_bytes("87c2d362de99f75a4f2755cdaaad2d11bf6cc65dc71356593c445535ff28f43d", expected, 32);
131-
urcrypt_reverse(32, expected);
131+
urcrypt__reverse(32, expected);
132132

133133
int ret = urcrypt_keccak_256((const uint8_t*)message, strlen(message), out);
134134

@@ -147,7 +147,7 @@ static int test_keccak_384_empty(void) {
147147

148148
/* Ethereum test vector for empty string */
149149
hex_to_bytes("2c23146a63a29acf99e73b88f8c24eaa7dc60aa771780ccc006afbfa8fe2479b2dd2b21362337441ac12b515911957ff", expected, 48);
150-
urcrypt_reverse(48, expected);
150+
urcrypt__reverse(48, expected);
151151

152152
int ret = urcrypt_keccak_384(NULL, 0, out);
153153

@@ -167,7 +167,7 @@ static int test_keccak_384_41(void) {
167167

168168
/* Ethereum test vector for 0x41 */
169169
hex_to_bytes("5c744cf4b4e3fb8967189e9744261a74f0ef31cdd8850554c737803585ac109039b73c22c50ea866c94debf1061f37a4", expected, 48);
170-
urcrypt_reverse(48, expected);
170+
urcrypt__reverse(48, expected);
171171

172172
int ret = urcrypt_keccak_384(&input, 1, out);
173173

@@ -187,7 +187,7 @@ static int test_keccak_384_asd(void) {
187187

188188
/* Ethereum test vector for "asd" */
189189
hex_to_bytes("50efbfa7d5aa41e132c3cfba2bc503d0014eb5bf6d214420851bff0f284bc9a5383a49327600e2efc3ad9db3621decaf", expected, 48);
190-
urcrypt_reverse(48, expected);
190+
urcrypt__reverse(48, expected);
191191

192192
int ret = urcrypt_keccak_384((const uint8_t*)message, strlen(message), out);
193193

@@ -206,7 +206,7 @@ static int test_keccak_512_empty(void) {
206206

207207
/* Ethereum test vector for empty string */
208208
hex_to_bytes("0eab42de4c3ceb9235fc91acffe746b29c29a8c366b7c60e4e67c466f36a4304c00fa9caf9d87976ba469bcbe06713b435f091ef2769fb160cdab33d3670680e", expected, 64);
209-
urcrypt_reverse(64, expected);
209+
urcrypt__reverse(64, expected);
210210

211211
int ret = urcrypt_keccak_512(NULL, 0, out);
212212

@@ -226,7 +226,7 @@ static int test_keccak_512_41(void) {
226226

227227
/* Ethereum test vector for 0x41 */
228228
hex_to_bytes("421a35a60054e5f383b6137e43d44e998f496748cc77258240ccfaa8730b51f40cf47c1bc09c728a8cd4f096731298d51463f15af89543fed478053346260c38", expected, 64);
229-
urcrypt_reverse(64, expected);
229+
urcrypt__reverse(64, expected);
230230

231231
int ret = urcrypt_keccak_512(&input, 1, out);
232232

@@ -246,7 +246,7 @@ static int test_keccak_512_asd(void) {
246246

247247
/* Ethereum test vector for "asd" */
248248
hex_to_bytes("3fb67c8b512d8ce73324db02dda2d19ebfb9d6a923c48fb503be3e0c7c752eb84e4da0818665133a27638dce8e9e8696a51b64b6b247354764609f22b4e65d35", expected, 64);
249-
urcrypt_reverse(64, expected);
249+
urcrypt__reverse(64, expected);
250250

251251
int ret = urcrypt_keccak_512((const uint8_t*)message, strlen(message), out);
252252

tests/test_ripemd.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ static int test_ripemd160_empty(void) {
2525
/* RIPEMD-160("") = 9c1185a5c5e9fc54612808977ee8f548b2258d31 (big-endian)
2626
* urcrypt reverses input and output, so we reverse the expected vector */
2727
hex_to_bytes("9c1185a5c5e9fc54612808977ee8f548b2258d31", expected, 20);
28-
urcrypt_reverse(20, expected);
28+
urcrypt__reverse(20, expected);
2929

3030
int ret = urcrypt_ripemd160(message, 0, out);
3131

tests/test_sha.c

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ static int test_sha1_empty(void) {
3131
/* SHA-1("") = da39a3ee5e6b4b0d3255bfef95601890afd80709 (big-endian)
3232
* urcrypt reverses input and output, so we reverse the expected vector */
3333
hex_to_bytes("da39a3ee5e6b4b0d3255bfef95601890afd80709", expected, 20);
34-
urcrypt_reverse(20, expected);
34+
urcrypt__reverse(20, expected);
3535

3636
urcrypt_sha1(message, 0, out);
3737

@@ -45,9 +45,9 @@ static int test_sha1_abc(void) {
4545
uint8_t out[20];
4646
uint8_t expected[20];
4747

48-
urcrypt_reverse(3, message);
48+
urcrypt__reverse(3, message);
4949
hex_to_bytes("a9993e364706816aba3e25717850c26c9cd0d89d", expected, 20);
50-
urcrypt_reverse(20, expected);
50+
urcrypt__reverse(20, expected);
5151

5252
urcrypt_sha1(message, 3, out);
5353

@@ -64,9 +64,9 @@ static int test_sha1_longer(void) {
6464
uint8_t out[20];
6565
uint8_t expected[20];
6666

67-
urcrypt_reverse(56, message);
67+
urcrypt__reverse(56, message);
6868
hex_to_bytes("84983e441c3bd26ebaae4aa1f95129e5e54670f1", expected, 20);
69-
urcrypt_reverse(20, expected);
69+
urcrypt__reverse(20, expected);
7070

7171
urcrypt_sha1(message, 56, out);
7272

@@ -83,9 +83,9 @@ static int test_sha1_longer2(void) {
8383
uint8_t out[20];
8484
uint8_t expected[20];
8585

86-
urcrypt_reverse(112, message);
86+
urcrypt__reverse(112, message);
8787
hex_to_bytes("a49b2446a02c645bf419f995b67091253a04a259", expected, 20);
88-
urcrypt_reverse(20, expected);
88+
urcrypt__reverse(20, expected);
8989

9090
urcrypt_sha1(message, 112, out);
9191

urcrypt/aes_cbc.c

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,10 @@ urcrypt__cbc_help(uint8_t **message_ptr,
5252
else {
5353
uint8_t *out = *message_ptr;
5454
size_t length = *length_ptr;
55-
urcrypt_reverse(16, ivec);
56-
urcrypt_reverse(length, out);
55+
urcrypt__reverse(16, ivec);
56+
urcrypt__reverse(length, out);
5757
AES_cbc_encrypt(out, out, length, key, ivec, enc);
58-
urcrypt_reverse(length, out);
58+
urcrypt__reverse(length, out);
5959
return 0;
6060
}
6161
}
@@ -69,7 +69,7 @@ urcrypt_aes_cbca_en(uint8_t **message_ptr,
6969
{
7070
AES_KEY aes_key;
7171

72-
urcrypt_reverse(16, key);
72+
urcrypt__reverse(16, key);
7373

7474
if ( 0 != AES_set_encrypt_key(key, 128, &aes_key) ) {
7575
return -1;
@@ -89,7 +89,7 @@ urcrypt_aes_cbca_de(uint8_t **message_ptr,
8989
{
9090
AES_KEY aes_key;
9191

92-
urcrypt_reverse(16, key);
92+
urcrypt__reverse(16, key);
9393

9494
if ( 0 != AES_set_decrypt_key(key, 128, &aes_key) ) {
9595
return -1;
@@ -109,7 +109,7 @@ urcrypt_aes_cbcb_en(uint8_t **message_ptr,
109109
{
110110
AES_KEY aes_key;
111111

112-
urcrypt_reverse(24, key);
112+
urcrypt__reverse(24, key);
113113

114114
if ( 0 != AES_set_encrypt_key(key, 192, &aes_key) ) {
115115
return -1;
@@ -129,7 +129,7 @@ urcrypt_aes_cbcb_de(uint8_t **message_ptr,
129129
{
130130
AES_KEY aes_key;
131131

132-
urcrypt_reverse(24, key);
132+
urcrypt__reverse(24, key);
133133

134134
if ( 0 != AES_set_decrypt_key(key, 192, &aes_key) ) {
135135
return -1;
@@ -149,7 +149,7 @@ urcrypt_aes_cbcc_en(uint8_t **message_ptr,
149149
{
150150
AES_KEY aes_key;
151151

152-
urcrypt_reverse(32, key);
152+
urcrypt__reverse(32, key);
153153

154154
if ( 0 != AES_set_encrypt_key(key, 256, &aes_key) ) {
155155
return -1;
@@ -169,7 +169,7 @@ urcrypt_aes_cbcc_de(uint8_t **message_ptr,
169169
{
170170
AES_KEY aes_key;
171171

172-
urcrypt_reverse(32, key);
172+
urcrypt__reverse(32, key);
173173

174174
if ( 0 != AES_set_decrypt_key(key, 256, &aes_key) ) {
175175
return -1;

0 commit comments

Comments
 (0)