Lines Matching +full:aes +full:- +full:cmac

8 #define CMAC "AES128CMAC"
23 void VerifyLocalCMAC(struct key *cmac);
24 void VerifyOpenSSLCMAC(struct key *cmac);
34 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1;
38 u_char actual[sizeof(EXPECTED_DIGEST) - 1];
43 sk.key_len = sizeof(KEY) - 1;
106 struct key cmac;
108 cmac.next = NULL;
109 cmac.key_id = 30;
110 cmac.key_len = CMAC_LENGTH;
111 memcpy(&cmac.key_seq, "aes-128-cmac-seq", cmac.key_len);
112 memcpy(&cmac.typen, CMAC, strlen(CMAC) + 1);
115 make_mac(PKT_DATA, PKT_LEN, &cmac, actual, CMAC_LENGTH));
121 TEST_IGNORE_MESSAGE("CMAC not enabled, skipping...");
133 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1;
137 const size_t DIGEST_LEN = sizeof(EXPECTED_DIGEST) - 1;
145 sk.key_len = sizeof(KEY) - 1;
154 TEST_ASSERT_TRUE(sizeof(PKT_DATA) == p - PKT_DATA);
172 "\0\0\0\0" /* Key-ID (unused) */
198 struct key cmac;
200 cmac.next = NULL;
201 cmac.key_id = 0;
202 cmac.key_len = CMAC_LENGTH;
203 memcpy(&cmac.key_seq, "aes-128-cmac-key", cmac.key_len);
204 memcpy(&cmac.typen, CMAC, strlen(CMAC) + 1);
206 VerifyOpenSSLCMAC(&cmac);
207 VerifyLocalCMAC(&cmac);
212 VerifyOpenSSLCMAC(struct key *cmac)
217 // TEST_ASSERT_TRUE(auth_md5(PKT_DATA, PKT_LEN, CMAC_LENGTH, cmac));
222 TEST_IGNORE_MESSAGE("CMAC not enabled, skipping...");
230 VerifyLocalCMAC(struct key *cmac)
234 // TEST_ASSERT_TRUE(auth_md5(PKT_DATA, PKT_LEN, CMAC_LENGTH, cmac));
236 TEST_IGNORE_MESSAGE("Hook in the local AES-128-CMAC check!");
253 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1;
257 const size_t DIGEST_LEN = sizeof(EXPECTED_DIGEST) - 1;
265 sk.key_len = sizeof(KEY) - 1;
274 TEST_ASSERT_TRUE(sizeof(PKT_DATA) == p - PKT_DATA);
296 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1;
300 u_char actual[sizeof(EXPECTED_DIGEST) - 1];
305 sk.key_len = sizeof(KEY) - 1;