Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S272635AbTHPIL0 (ORCPT ); Sat, 16 Aug 2003 04:11:26 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S272638AbTHPIL0 (ORCPT ); Sat, 16 Aug 2003 04:11:26 -0400 Received: from law11-f29.law11.hotmail.com ([64.4.17.29]:40198 "EHLO hotmail.com") by vger.kernel.org with ESMTP id S272635AbTHPIKM (ORCPT ); Sat, 16 Aug 2003 04:10:12 -0400 X-Originating-IP: [220.224.16.244] X-Originating-Email: [kartik_me@hotmail.com] From: "kartikey bhatt" To: jmorris@intercode.com.au Cc: linux-kernel@vger.kernel.org Subject: Re: [PATCH] [CRYPTO] Add CAST6 (CAST-256) algorithm. Date: Sat, 16 Aug 2003 13:40:11 +0530 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 16 Aug 2003 08:10:11.0498 (UTC) FILETIME=[D08EF0A0:01C363CD] Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 34556 Lines: 913 thanks James. I have cced patch to alan and dave also. hope you'll also forward it. -Kartikey (cloud # 9). >From: James Morris >To: "David S. Miller" >CC: kartikey bhatt >Subject: [PATCH] [CRYPTO] Add CAST6 (CAST-256) algorithm. >Date: Sat, 16 Aug 2003 01:32:54 +1000 (EST) > >I made a few minor fixes, tested on sparc64 as well now. > >Thanks Kartikey. > >Please apply. > > >- James >-- >James Morris > > >diff -urN -X dontdiff linux-2.6.0-test3.pending/crypto/cast6.c >linux-2.6.0-test3.w1/crypto/cast6.c >--- linux-2.6.0-test3.pending/crypto/cast6.c 1970-01-01 10:00:00.000000000 >+1000 >+++ linux-2.6.0-test3.w1/crypto/cast6.c 2003-08-16 01:28:32.039515704 +1000 >@@ -0,0 +1,563 @@ >+/* Kernel cryptographic api. >+ * cast6.c - Cast6 cipher algorithm [rfc2612]. >+ * >+ * CAST-256 (*cast6*) is a DES like Substitution-Permutation Network (SPN) >+ * cryptosystem built upon the CAST-128 (*cast5*) [rfc2144] encryption >+ * algorithm. >+ * >+ * Copyright (C) 2003 Kartikey Mahendra Bhatt . >+ * >+ * This program is free software; you can redistribute it and/or modify it >+ * under the terms of GNU General Public License as published by the Free >+ * Software Foundation; either version 2 of the License, or (at your >option) >+ * any later version. >+ * >+ * You should have received a copy of the GNU General Public License >+ * along with this program; if not, write to the Free Software >+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, >USA >+ */ >+ >+ >+#include >+#include >+#include >+#include >+#include >+ >+#define CAST6_BLOCK_SIZE 16 >+#define CAST6_MIN_KEY_SIZE 16 >+#define CAST6_MAX_KEY_SIZE 32 >+ >+struct cast6_ctx { >+ u32 Km[12][4]; >+ u8 Kr[12][4]; >+}; >+ >+#define rol(n,x) ( ((x) << (n)) | ((x) >> (32-(n))) ) >+ >+#define F1(D,r,m) ( (I = ((m) + (D))), (I=rol((r),I)), \ >+ (((s1[I >> 24] ^ s2[(I>>16)&0xff]) - s3[(I>>8)&0xff]) + s4[I&0xff]) ) >+#define F2(D,r,m) ( (I = ((m) ^ (D))), (I=rol((r),I)), \ >+ (((s1[I >> 24] - s2[(I>>16)&0xff]) + s3[(I>>8)&0xff]) ^ s4[I&0xff]) ) >+#define F3(D,r,m) ( (I = ((m) - (D))), (I=rol((r),I)), \ >+ (((s1[I >> 24] + s2[(I>>16)&0xff]) ^ s3[(I>>8)&0xff]) - s4[I&0xff]) ) >+ >+static const u32 s1[256] = { >+ 0x30fb40d4, 0x9fa0ff0b, 0x6beccd2f, 0x3f258c7a, 0x1e213f2f, >+ 0x9c004dd3, 0x6003e540, 0xcf9fc949, >+ 0xbfd4af27, 0x88bbbdb5, 0xe2034090, 0x98d09675, 0x6e63a0e0, >+ 0x15c361d2, 0xc2e7661d, 0x22d4ff8e, >+ 0x28683b6f, 0xc07fd059, 0xff2379c8, 0x775f50e2, 0x43c340d3, >+ 0xdf2f8656, 0x887ca41a, 0xa2d2bd2d, >+ 0xa1c9e0d6, 0x346c4819, 0x61b76d87, 0x22540f2f, 0x2abe32e1, >+ 0xaa54166b, 0x22568e3a, 0xa2d341d0, >+ 0x66db40c8, 0xa784392f, 0x004dff2f, 0x2db9d2de, 0x97943fac, >+ 0x4a97c1d8, 0x527644b7, 0xb5f437a7, >+ 0xb82cbaef, 0xd751d159, 0x6ff7f0ed, 0x5a097a1f, 0x827b68d0, >+ 0x90ecf52e, 0x22b0c054, 0xbc8e5935, >+ 0x4b6d2f7f, 0x50bb64a2, 0xd2664910, 0xbee5812d, 0xb7332290, >+ 0xe93b159f, 0xb48ee411, 0x4bff345d, >+ 0xfd45c240, 0xad31973f, 0xc4f6d02e, 0x55fc8165, 0xd5b1caad, >+ 0xa1ac2dae, 0xa2d4b76d, 0xc19b0c50, >+ 0x882240f2, 0x0c6e4f38, 0xa4e4bfd7, 0x4f5ba272, 0x564c1d2f, >+ 0xc59c5319, 0xb949e354, 0xb04669fe, >+ 0xb1b6ab8a, 0xc71358dd, 0x6385c545, 0x110f935d, 0x57538ad5, >+ 0x6a390493, 0xe63d37e0, 0x2a54f6b3, >+ 0x3a787d5f, 0x6276a0b5, 0x19a6fcdf, 0x7a42206a, 0x29f9d4d5, >+ 0xf61b1891, 0xbb72275e, 0xaa508167, >+ 0x38901091, 0xc6b505eb, 0x84c7cb8c, 0x2ad75a0f, 0x874a1427, >+ 0xa2d1936b, 0x2ad286af, 0xaa56d291, >+ 0xd7894360, 0x425c750d, 0x93b39e26, 0x187184c9, 0x6c00b32d, >+ 0x73e2bb14, 0xa0bebc3c, 0x54623779, >+ 0x64459eab, 0x3f328b82, 0x7718cf82, 0x59a2cea6, 0x04ee002e, >+ 0x89fe78e6, 0x3fab0950, 0x325ff6c2, >+ 0x81383f05, 0x6963c5c8, 0x76cb5ad6, 0xd49974c9, 0xca180dcf, >+ 0x380782d5, 0xc7fa5cf6, 0x8ac31511, >+ 0x35e79e13, 0x47da91d0, 0xf40f9086, 0xa7e2419e, 0x31366241, >+ 0x051ef495, 0xaa573b04, 0x4a805d8d, >+ 0x548300d0, 0x00322a3c, 0xbf64cddf, 0xba57a68e, 0x75c6372b, >+ 0x50afd341, 0xa7c13275, 0x915a0bf5, >+ 0x6b54bfab, 0x2b0b1426, 0xab4cc9d7, 0x449ccd82, 0xf7fbf265, >+ 0xab85c5f3, 0x1b55db94, 0xaad4e324, >+ 0xcfa4bd3f, 0x2deaa3e2, 0x9e204d02, 0xc8bd25ac, 0xeadf55b3, >+ 0xd5bd9e98, 0xe31231b2, 0x2ad5ad6c, >+ 0x954329de, 0xadbe4528, 0xd8710f69, 0xaa51c90f, 0xaa786bf6, >+ 0x22513f1e, 0xaa51a79b, 0x2ad344cc, >+ 0x7b5a41f0, 0xd37cfbad, 0x1b069505, 0x41ece491, 0xb4c332e6, >+ 0x032268d4, 0xc9600acc, 0xce387e6d, >+ 0xbf6bb16c, 0x6a70fb78, 0x0d03d9c9, 0xd4df39de, 0xe01063da, >+ 0x4736f464, 0x5ad328d8, 0xb347cc96, >+ 0x75bb0fc3, 0x98511bfb, 0x4ffbcc35, 0xb58bcf6a, 0xe11f0abc, >+ 0xbfc5fe4a, 0xa70aec10, 0xac39570a, >+ 0x3f04442f, 0x6188b153, 0xe0397a2e, 0x5727cb79, 0x9ceb418f, >+ 0x1cacd68d, 0x2ad37c96, 0x0175cb9d, >+ 0xc69dff09, 0xc75b65f0, 0xd9db40d8, 0xec0e7779, 0x4744ead4, >+ 0xb11c3274, 0xdd24cb9e, 0x7e1c54bd, >+ 0xf01144f9, 0xd2240eb1, 0x9675b3fd, 0xa3ac3755, 0xd47c27af, >+ 0x51c85f4d, 0x56907596, 0xa5bb15e6, >+ 0x580304f0, 0xca042cf1, 0x011a37ea, 0x8dbfaadb, 0x35ba3e4a, >+ 0x3526ffa0, 0xc37b4d09, 0xbc306ed9, >+ 0x98a52666, 0x5648f725, 0xff5e569d, 0x0ced63d0, 0x7c63b2cf, >+ 0x700b45e1, 0xd5ea50f1, 0x85a92872, >+ 0xaf1fbda7, 0xd4234870, 0xa7870bf3, 0x2d3b4d79, 0x42e04198, >+ 0x0cd0ede7, 0x26470db8, 0xf881814c, >+ 0x474d6ad7, 0x7c0c5e5c, 0xd1231959, 0x381b7298, 0xf5d2f4db, >+ 0xab838653, 0x6e2f1e23, 0x83719c9e, >+ 0xbd91e046, 0x9a56456e, 0xdc39200c, 0x20c8c571, 0x962bda1c, >+ 0xe1e696ff, 0xb141ab08, 0x7cca89b9, >+ 0x1a69e783, 0x02cc4843, 0xa2f7c579, 0x429ef47d, 0x427b169c, >+ 0x5ac9f049, 0xdd8f0f00, 0x5c8165bf >+}; >+ >+static const u32 s2[256] = { >+ 0x1f201094, 0xef0ba75b, 0x69e3cf7e, 0x393f4380, 0xfe61cf7a, >+ 0xeec5207a, 0x55889c94, 0x72fc0651, >+ 0xada7ef79, 0x4e1d7235, 0xd55a63ce, 0xde0436ba, 0x99c430ef, >+ 0x5f0c0794, 0x18dcdb7d, 0xa1d6eff3, >+ 0xa0b52f7b, 0x59e83605, 0xee15b094, 0xe9ffd909, 0xdc440086, >+ 0xef944459, 0xba83ccb3, 0xe0c3cdfb, >+ 0xd1da4181, 0x3b092ab1, 0xf997f1c1, 0xa5e6cf7b, 0x01420ddb, >+ 0xe4e7ef5b, 0x25a1ff41, 0xe180f806, >+ 0x1fc41080, 0x179bee7a, 0xd37ac6a9, 0xfe5830a4, 0x98de8b7f, >+ 0x77e83f4e, 0x79929269, 0x24fa9f7b, >+ 0xe113c85b, 0xacc40083, 0xd7503525, 0xf7ea615f, 0x62143154, >+ 0x0d554b63, 0x5d681121, 0xc866c359, >+ 0x3d63cf73, 0xcee234c0, 0xd4d87e87, 0x5c672b21, 0x071f6181, >+ 0x39f7627f, 0x361e3084, 0xe4eb573b, >+ 0x602f64a4, 0xd63acd9c, 0x1bbc4635, 0x9e81032d, 0x2701f50c, >+ 0x99847ab4, 0xa0e3df79, 0xba6cf38c, >+ 0x10843094, 0x2537a95e, 0xf46f6ffe, 0xa1ff3b1f, 0x208cfb6a, >+ 0x8f458c74, 0xd9e0a227, 0x4ec73a34, >+ 0xfc884f69, 0x3e4de8df, 0xef0e0088, 0x3559648d, 0x8a45388c, >+ 0x1d804366, 0x721d9bfd, 0xa58684bb, >+ 0xe8256333, 0x844e8212, 0x128d8098, 0xfed33fb4, 0xce280ae1, >+ 0x27e19ba5, 0xd5a6c252, 0xe49754bd, >+ 0xc5d655dd, 0xeb667064, 0x77840b4d, 0xa1b6a801, 0x84db26a9, >+ 0xe0b56714, 0x21f043b7, 0xe5d05860, >+ 0x54f03084, 0x066ff472, 0xa31aa153, 0xdadc4755, 0xb5625dbf, >+ 0x68561be6, 0x83ca6b94, 0x2d6ed23b, >+ 0xeccf01db, 0xa6d3d0ba, 0xb6803d5c, 0xaf77a709, 0x33b4a34c, >+ 0x397bc8d6, 0x5ee22b95, 0x5f0e5304, >+ 0x81ed6f61, 0x20e74364, 0xb45e1378, 0xde18639b, 0x881ca122, >+ 0xb96726d1, 0x8049a7e8, 0x22b7da7b, >+ 0x5e552d25, 0x5272d237, 0x79d2951c, 0xc60d894c, 0x488cb402, >+ 0x1ba4fe5b, 0xa4b09f6b, 0x1ca815cf, >+ 0xa20c3005, 0x8871df63, 0xb9de2fcb, 0x0cc6c9e9, 0x0beeff53, >+ 0xe3214517, 0xb4542835, 0x9f63293c, >+ 0xee41e729, 0x6e1d2d7c, 0x50045286, 0x1e6685f3, 0xf33401c6, >+ 0x30a22c95, 0x31a70850, 0x60930f13, >+ 0x73f98417, 0xa1269859, 0xec645c44, 0x52c877a9, 0xcdff33a6, >+ 0xa02b1741, 0x7cbad9a2, 0x2180036f, >+ 0x50d99c08, 0xcb3f4861, 0xc26bd765, 0x64a3f6ab, 0x80342676, >+ 0x25a75e7b, 0xe4e6d1fc, 0x20c710e6, >+ 0xcdf0b680, 0x17844d3b, 0x31eef84d, 0x7e0824e4, 0x2ccb49eb, >+ 0x846a3bae, 0x8ff77888, 0xee5d60f6, >+ 0x7af75673, 0x2fdd5cdb, 0xa11631c1, 0x30f66f43, 0xb3faec54, >+ 0x157fd7fa, 0xef8579cc, 0xd152de58, >+ 0xdb2ffd5e, 0x8f32ce19, 0x306af97a, 0x02f03ef8, 0x99319ad5, >+ 0xc242fa0f, 0xa7e3ebb0, 0xc68e4906, >+ 0xb8da230c, 0x80823028, 0xdcdef3c8, 0xd35fb171, 0x088a1bc8, >+ 0xbec0c560, 0x61a3c9e8, 0xbca8f54d, >+ 0xc72feffa, 0x22822e99, 0x82c570b4, 0xd8d94e89, 0x8b1c34bc, >+ 0x301e16e6, 0x273be979, 0xb0ffeaa6, >+ 0x61d9b8c6, 0x00b24869, 0xb7ffce3f, 0x08dc283b, 0x43daf65a, >+ 0xf7e19798, 0x7619b72f, 0x8f1c9ba4, >+ 0xdc8637a0, 0x16a7d3b1, 0x9fc393b7, 0xa7136eeb, 0xc6bcc63e, >+ 0x1a513742, 0xef6828bc, 0x520365d6, >+ 0x2d6a77ab, 0x3527ed4b, 0x821fd216, 0x095c6e2e, 0xdb92f2fb, >+ 0x5eea29cb, 0x145892f5, 0x91584f7f, >+ 0x5483697b, 0x2667a8cc, 0x85196048, 0x8c4bacea, 0x833860d4, >+ 0x0d23e0f9, 0x6c387e8a, 0x0ae6d249, >+ 0xb284600c, 0xd835731d, 0xdcb1c647, 0xac4c56ea, 0x3ebd81b3, >+ 0x230eabb0, 0x6438bc87, 0xf0b5b1fa, >+ 0x8f5ea2b3, 0xfc184642, 0x0a036b7a, 0x4fb089bd, 0x649da589, >+ 0xa345415e, 0x5c038323, 0x3e5d3bb9, >+ 0x43d79572, 0x7e6dd07c, 0x06dfdf1e, 0x6c6cc4ef, 0x7160a539, >+ 0x73bfbe70, 0x83877605, 0x4523ecf1 >+}; >+ >+static const u32 s3[256] = { >+ 0x8defc240, 0x25fa5d9f, 0xeb903dbf, 0xe810c907, 0x47607fff, >+ 0x369fe44b, 0x8c1fc644, 0xaececa90, >+ 0xbeb1f9bf, 0xeefbcaea, 0xe8cf1950, 0x51df07ae, 0x920e8806, >+ 0xf0ad0548, 0xe13c8d83, 0x927010d5, >+ 0x11107d9f, 0x07647db9, 0xb2e3e4d4, 0x3d4f285e, 0xb9afa820, >+ 0xfade82e0, 0xa067268b, 0x8272792e, >+ 0x553fb2c0, 0x489ae22b, 0xd4ef9794, 0x125e3fbc, 0x21fffcee, >+ 0x825b1bfd, 0x9255c5ed, 0x1257a240, >+ 0x4e1a8302, 0xbae07fff, 0x528246e7, 0x8e57140e, 0x3373f7bf, >+ 0x8c9f8188, 0xa6fc4ee8, 0xc982b5a5, >+ 0xa8c01db7, 0x579fc264, 0x67094f31, 0xf2bd3f5f, 0x40fff7c1, >+ 0x1fb78dfc, 0x8e6bd2c1, 0x437be59b, >+ 0x99b03dbf, 0xb5dbc64b, 0x638dc0e6, 0x55819d99, 0xa197c81c, >+ 0x4a012d6e, 0xc5884a28, 0xccc36f71, >+ 0xb843c213, 0x6c0743f1, 0x8309893c, 0x0feddd5f, 0x2f7fe850, >+ 0xd7c07f7e, 0x02507fbf, 0x5afb9a04, >+ 0xa747d2d0, 0x1651192e, 0xaf70bf3e, 0x58c31380, 0x5f98302e, >+ 0x727cc3c4, 0x0a0fb402, 0x0f7fef82, >+ 0x8c96fdad, 0x5d2c2aae, 0x8ee99a49, 0x50da88b8, 0x8427f4a0, >+ 0x1eac5790, 0x796fb449, 0x8252dc15, >+ 0xefbd7d9b, 0xa672597d, 0xada840d8, 0x45f54504, 0xfa5d7403, >+ 0xe83ec305, 0x4f91751a, 0x925669c2, >+ 0x23efe941, 0xa903f12e, 0x60270df2, 0x0276e4b6, 0x94fd6574, >+ 0x927985b2, 0x8276dbcb, 0x02778176, >+ 0xf8af918d, 0x4e48f79e, 0x8f616ddf, 0xe29d840e, 0x842f7d83, >+ 0x340ce5c8, 0x96bbb682, 0x93b4b148, >+ 0xef303cab, 0x984faf28, 0x779faf9b, 0x92dc560d, 0x224d1e20, >+ 0x8437aa88, 0x7d29dc96, 0x2756d3dc, >+ 0x8b907cee, 0xb51fd240, 0xe7c07ce3, 0xe566b4a1, 0xc3e9615e, >+ 0x3cf8209d, 0x6094d1e3, 0xcd9ca341, >+ 0x5c76460e, 0x00ea983b, 0xd4d67881, 0xfd47572c, 0xf76cedd9, >+ 0xbda8229c, 0x127dadaa, 0x438a074e, >+ 0x1f97c090, 0x081bdb8a, 0x93a07ebe, 0xb938ca15, 0x97b03cff, >+ 0x3dc2c0f8, 0x8d1ab2ec, 0x64380e51, >+ 0x68cc7bfb, 0xd90f2788, 0x12490181, 0x5de5ffd4, 0xdd7ef86a, >+ 0x76a2e214, 0xb9a40368, 0x925d958f, >+ 0x4b39fffa, 0xba39aee9, 0xa4ffd30b, 0xfaf7933b, 0x6d498623, >+ 0x193cbcfa, 0x27627545, 0x825cf47a, >+ 0x61bd8ba0, 0xd11e42d1, 0xcead04f4, 0x127ea392, 0x10428db7, >+ 0x8272a972, 0x9270c4a8, 0x127de50b, >+ 0x285ba1c8, 0x3c62f44f, 0x35c0eaa5, 0xe805d231, 0x428929fb, >+ 0xb4fcdf82, 0x4fb66a53, 0x0e7dc15b, >+ 0x1f081fab, 0x108618ae, 0xfcfd086d, 0xf9ff2889, 0x694bcc11, >+ 0x236a5cae, 0x12deca4d, 0x2c3f8cc5, >+ 0xd2d02dfe, 0xf8ef5896, 0xe4cf52da, 0x95155b67, 0x494a488c, >+ 0xb9b6a80c, 0x5c8f82bc, 0x89d36b45, >+ 0x3a609437, 0xec00c9a9, 0x44715253, 0x0a874b49, 0xd773bc40, >+ 0x7c34671c, 0x02717ef6, 0x4feb5536, >+ 0xa2d02fff, 0xd2bf60c4, 0xd43f03c0, 0x50b4ef6d, 0x07478cd1, >+ 0x006e1888, 0xa2e53f55, 0xb9e6d4bc, >+ 0xa2048016, 0x97573833, 0xd7207d67, 0xde0f8f3d, 0x72f87b33, >+ 0xabcc4f33, 0x7688c55d, 0x7b00a6b0, >+ 0x947b0001, 0x570075d2, 0xf9bb88f8, 0x8942019e, 0x4264a5ff, >+ 0x856302e0, 0x72dbd92b, 0xee971b69, >+ 0x6ea22fde, 0x5f08ae2b, 0xaf7a616d, 0xe5c98767, 0xcf1febd2, >+ 0x61efc8c2, 0xf1ac2571, 0xcc8239c2, >+ 0x67214cb8, 0xb1e583d1, 0xb7dc3e62, 0x7f10bdce, 0xf90a5c38, >+ 0x0ff0443d, 0x606e6dc6, 0x60543a49, >+ 0x5727c148, 0x2be98a1d, 0x8ab41738, 0x20e1be24, 0xaf96da0f, >+ 0x68458425, 0x99833be5, 0x600d457d, >+ 0x282f9350, 0x8334b362, 0xd91d1120, 0x2b6d8da0, 0x642b1e31, >+ 0x9c305a00, 0x52bce688, 0x1b03588a, >+ 0xf7baefd5, 0x4142ed9c, 0xa4315c11, 0x83323ec5, 0xdfef4636, >+ 0xa133c501, 0xe9d3531c, 0xee353783 >+}; >+ >+static const u32 s4[256] = { >+ 0x9db30420, 0x1fb6e9de, 0xa7be7bef, 0xd273a298, 0x4a4f7bdb, >+ 0x64ad8c57, 0x85510443, 0xfa020ed1, >+ 0x7e287aff, 0xe60fb663, 0x095f35a1, 0x79ebf120, 0xfd059d43, >+ 0x6497b7b1, 0xf3641f63, 0x241e4adf, >+ 0x28147f5f, 0x4fa2b8cd, 0xc9430040, 0x0cc32220, 0xfdd30b30, >+ 0xc0a5374f, 0x1d2d00d9, 0x24147b15, >+ 0xee4d111a, 0x0fca5167, 0x71ff904c, 0x2d195ffe, 0x1a05645f, >+ 0x0c13fefe, 0x081b08ca, 0x05170121, >+ 0x80530100, 0xe83e5efe, 0xac9af4f8, 0x7fe72701, 0xd2b8ee5f, >+ 0x06df4261, 0xbb9e9b8a, 0x7293ea25, >+ 0xce84ffdf, 0xf5718801, 0x3dd64b04, 0xa26f263b, 0x7ed48400, >+ 0x547eebe6, 0x446d4ca0, 0x6cf3d6f5, >+ 0x2649abdf, 0xaea0c7f5, 0x36338cc1, 0x503f7e93, 0xd3772061, >+ 0x11b638e1, 0x72500e03, 0xf80eb2bb, >+ 0xabe0502e, 0xec8d77de, 0x57971e81, 0xe14f6746, 0xc9335400, >+ 0x6920318f, 0x081dbb99, 0xffc304a5, >+ 0x4d351805, 0x7f3d5ce3, 0xa6c866c6, 0x5d5bcca9, 0xdaec6fea, >+ 0x9f926f91, 0x9f46222f, 0x3991467d, >+ 0xa5bf6d8e, 0x1143c44f, 0x43958302, 0xd0214eeb, 0x022083b8, >+ 0x3fb6180c, 0x18f8931e, 0x281658e6, >+ 0x26486e3e, 0x8bd78a70, 0x7477e4c1, 0xb506e07c, 0xf32d0a25, >+ 0x79098b02, 0xe4eabb81, 0x28123b23, >+ 0x69dead38, 0x1574ca16, 0xdf871b62, 0x211c40b7, 0xa51a9ef9, >+ 0x0014377b, 0x041e8ac8, 0x09114003, >+ 0xbd59e4d2, 0xe3d156d5, 0x4fe876d5, 0x2f91a340, 0x557be8de, >+ 0x00eae4a7, 0x0ce5c2ec, 0x4db4bba6, >+ 0xe756bdff, 0xdd3369ac, 0xec17b035, 0x06572327, 0x99afc8b0, >+ 0x56c8c391, 0x6b65811c, 0x5e146119, >+ 0x6e85cb75, 0xbe07c002, 0xc2325577, 0x893ff4ec, 0x5bbfc92d, >+ 0xd0ec3b25, 0xb7801ab7, 0x8d6d3b24, >+ 0x20c763ef, 0xc366a5fc, 0x9c382880, 0x0ace3205, 0xaac9548a, >+ 0xeca1d7c7, 0x041afa32, 0x1d16625a, >+ 0x6701902c, 0x9b757a54, 0x31d477f7, 0x9126b031, 0x36cc6fdb, >+ 0xc70b8b46, 0xd9e66a48, 0x56e55a79, >+ 0x026a4ceb, 0x52437eff, 0x2f8f76b4, 0x0df980a5, 0x8674cde3, >+ 0xedda04eb, 0x17a9be04, 0x2c18f4df, >+ 0xb7747f9d, 0xab2af7b4, 0xefc34d20, 0x2e096b7c, 0x1741a254, >+ 0xe5b6a035, 0x213d42f6, 0x2c1c7c26, >+ 0x61c2f50f, 0x6552daf9, 0xd2c231f8, 0x25130f69, 0xd8167fa2, >+ 0x0418f2c8, 0x001a96a6, 0x0d1526ab, >+ 0x63315c21, 0x5e0a72ec, 0x49bafefd, 0x187908d9, 0x8d0dbd86, >+ 0x311170a7, 0x3e9b640c, 0xcc3e10d7, >+ 0xd5cad3b6, 0x0caec388, 0xf73001e1, 0x6c728aff, 0x71eae2a1, >+ 0x1f9af36e, 0xcfcbd12f, 0xc1de8417, >+ 0xac07be6b, 0xcb44a1d8, 0x8b9b0f56, 0x013988c3, 0xb1c52fca, >+ 0xb4be31cd, 0xd8782806, 0x12a3a4e2, >+ 0x6f7de532, 0x58fd7eb6, 0xd01ee900, 0x24adffc2, 0xf4990fc5, >+ 0x9711aac5, 0x001d7b95, 0x82e5e7d2, >+ 0x109873f6, 0x00613096, 0xc32d9521, 0xada121ff, 0x29908415, >+ 0x7fbb977f, 0xaf9eb3db, 0x29c9ed2a, >+ 0x5ce2a465, 0xa730f32c, 0xd0aa3fe8, 0x8a5cc091, 0xd49e2ce7, >+ 0x0ce454a9, 0xd60acd86, 0x015f1919, >+ 0x77079103, 0xdea03af6, 0x78a8565e, 0xdee356df, 0x21f05cbe, >+ 0x8b75e387, 0xb3c50651, 0xb8a5c3ef, >+ 0xd8eeb6d2, 0xe523be77, 0xc2154529, 0x2f69efdf, 0xafe67afb, >+ 0xf470c4b2, 0xf3e0eb5b, 0xd6cc9876, >+ 0x39e4460c, 0x1fda8538, 0x1987832f, 0xca007367, 0xa99144f8, >+ 0x296b299e, 0x492fc295, 0x9266beab, >+ 0xb5676e69, 0x9bd3ddda, 0xdf7e052f, 0xdb25701c, 0x1b5e51ee, >+ 0xf65324e6, 0x6afce36c, 0x0316cc04, >+ 0x8644213e, 0xb7dc59d0, 0x7965291f, 0xccd6fd43, 0x41823979, >+ 0x932bcdf6, 0xb657c34d, 0x4edfd282, >+ 0x7ae5290c, 0x3cb9536b, 0x851e20fe, 0x9833557e, 0x13ecf0b0, >+ 0xd3ffb372, 0x3f85c5c1, 0x0aef7ed2 >+}; >+ >+static const u32 Tm[24][8] = { >+ { 0x5a827999, 0xc95c653a, 0x383650db, 0xa7103c7c, 0x15ea281d, >+ 0x84c413be, 0xf39dff5f, 0x6277eb00 } , >+ { 0xd151d6a1, 0x402bc242, 0xaf05ade3, 0x1ddf9984, 0x8cb98525, >+ 0xfb9370c6, 0x6a6d5c67, 0xd9474808 } , >+ { 0x482133a9, 0xb6fb1f4a, 0x25d50aeb, 0x94aef68c, 0x0388e22d, >+ 0x7262cdce, 0xe13cb96f, 0x5016a510 } , >+ { 0xbef090b1, 0x2dca7c52, 0x9ca467f3, 0x0b7e5394, 0x7a583f35, >+ 0xe9322ad6, 0x580c1677, 0xc6e60218 } , >+ { 0x35bfedb9, 0xa499d95a, 0x1373c4fb, 0x824db09c, 0xf1279c3d, >+ 0x600187de, 0xcedb737f, 0x3db55f20 } , >+ { 0xac8f4ac1, 0x1b693662, 0x8a432203, 0xf91d0da4, 0x67f6f945, >+ 0xd6d0e4e6, 0x45aad087, 0xb484bc28 } , >+ { 0x235ea7c9, 0x9238936a, 0x01127f0b, 0x6fec6aac, 0xdec6564d, >+ 0x4da041ee, 0xbc7a2d8f, 0x2b541930 } , >+ { 0x9a2e04d1, 0x0907f072, 0x77e1dc13, 0xe6bbc7b4, 0x5595b355, >+ 0xc46f9ef6, 0x33498a97, 0xa2237638 } , >+ { 0x10fd61d9, 0x7fd74d7a, 0xeeb1391b, 0x5d8b24bc, 0xcc65105d, >+ 0x3b3efbfe, 0xaa18e79f, 0x18f2d340 } , >+ { 0x87ccbee1, 0xf6a6aa82, 0x65809623, 0xd45a81c4, 0x43346d65, >+ 0xb20e5906, 0x20e844a7, 0x8fc23048 } , >+ { 0xfe9c1be9, 0x6d76078a, 0xdc4ff32b, 0x4b29decc, 0xba03ca6d, >+ 0x28ddb60e, 0x97b7a1af, 0x06918d50 } , >+ { 0x756b78f1, 0xe4456492, 0x531f5033, 0xc1f93bd4, 0x30d32775, >+ 0x9fad1316, 0x0e86feb7, 0x7d60ea58 } , >+ { 0xec3ad5f9, 0x5b14c19a, 0xc9eead3b, 0x38c898dc, 0xa7a2847d, >+ 0x167c701e, 0x85565bbf, 0xf4304760 } , >+ { 0x630a3301, 0xd1e41ea2, 0x40be0a43, 0xaf97f5e4, 0x1e71e185, >+ 0x8d4bcd26, 0xfc25b8c7, 0x6affa468 } , >+ { 0xd9d99009, 0x48b37baa, 0xb78d674b, 0x266752ec, 0x95413e8d, >+ 0x041b2a2e, 0x72f515cf, 0xe1cf0170 } , >+ { 0x50a8ed11, 0xbf82d8b2, 0x2e5cc453, 0x9d36aff4, 0x0c109b95, >+ 0x7aea8736, 0xe9c472d7, 0x589e5e78 } , >+ { 0xc7784a19, 0x365235ba, 0xa52c215b, 0x14060cfc, 0x82dff89d, >+ 0xf1b9e43e, 0x6093cfdf, 0xcf6dbb80 } , >+ { 0x3e47a721, 0xad2192c2, 0x1bfb7e63, 0x8ad56a04, 0xf9af55a5, >+ 0x68894146, 0xd7632ce7, 0x463d1888 } , >+ { 0xb5170429, 0x23f0efca, 0x92cadb6b, 0x01a4c70c, 0x707eb2ad, >+ 0xdf589e4e, 0x4e3289ef, 0xbd0c7590 } , >+ { 0x2be66131, 0x9ac04cd2, 0x099a3873, 0x78742414, 0xe74e0fb5, >+ 0x5627fb56, 0xc501e6f7, 0x33dbd298 } , >+ { 0xa2b5be39, 0x118fa9da, 0x8069957b, 0xef43811c, 0x5e1d6cbd, >+ 0xccf7585e, 0x3bd143ff, 0xaaab2fa0 } , >+ { 0x19851b41, 0x885f06e2, 0xf738f283, 0x6612de24, 0xd4ecc9c5, >+ 0x43c6b566, 0xb2a0a107, 0x217a8ca8 } , >+ { 0x90547849, 0xff2e63ea, 0x6e084f8b, 0xdce23b2c, 0x4bbc26cd, >+ 0xba96126e, 0x296ffe0f, 0x9849e9b0 } , >+ { 0x0723d551, 0x75fdc0f2, 0xe4d7ac93, 0x53b19834, 0xc28b83d5, >+ 0x31656f76, 0xa03f5b17, 0x0f1946b8 } >+}; >+ >+static const u8 Tr[4][8] = { >+ { 0x13, 0x04, 0x15, 0x06, 0x17, 0x08, 0x19, 0x0a } , >+ { 0x1b, 0x0c, 0x1d, 0x0e, 0x1f, 0x10, 0x01, 0x12 } , >+ { 0x03, 0x14, 0x05, 0x16, 0x07, 0x18, 0x09, 0x1a } , >+ { 0x0b, 0x1c, 0x0d, 0x1e, 0x0f, 0x00, 0x11, 0x02 } >+}; >+ >+/* forward octave */ >+static inline void W(u32 *key, unsigned int i) { >+ u32 I; >+ key[6] ^= F1(key[7], Tr[i % 4][0], Tm[i][0]); >+ key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]); >+ key[4] ^= F3(key[5], Tr[i % 4][2], Tm[i][2]); >+ key[3] ^= F1(key[4], Tr[i % 4][3], Tm[i][3]); >+ key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]); >+ key[1] ^= F3(key[2], Tr[i % 4][5], Tm[i][5]); >+ key[0] ^= F1(key[1], Tr[i % 4][6], Tm[i][6]); >+ key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]); >+} >+ >+static int >+cast6_setkey(void *ctx, const u8 * in_key, unsigned key_len, u32 * flags) >+{ >+ int i; >+ u32 key[8]; >+ u8 p_key[32]; /* padded key */ >+ struct cast6_ctx *c = (struct cast6_ctx *) ctx; >+ >+ if (key_len < 16 || key_len > 32 || key_len % 4 != 0) { >+ *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; >+ return -EINVAL; >+ } >+ >+ memset (p_key, 0, 32); >+ memcpy (p_key, in_key, key_len); >+ >+ key[0] = p_key[0] << 24 | p_key[1] << 16 | p_key[2] << 8 | p_key[3]; /* >A */ >+ key[1] = p_key[4] << 24 | p_key[5] << 16 | p_key[6] << 8 | p_key[7]; /* >B */ >+ key[2] = p_key[8] << 24 | p_key[9] << 16 | p_key[10] << 8 | >p_key[11]; /* C */ >+ key[3] = p_key[12] << 24 | p_key[13] << 16 | p_key[14] << 8 | >p_key[15]; /* D */ >+ key[4] = p_key[16] << 24 | p_key[17] << 16 | p_key[18] << 8 | >p_key[19]; /* E */ >+ key[5] = p_key[20] << 24 | p_key[21] << 16 | p_key[22] << 8 | >p_key[23]; /* F */ >+ key[6] = p_key[24] << 24 | p_key[25] << 16 | p_key[26] << 8 | >p_key[27]; /* G */ >+ key[7] = p_key[28] << 24 | p_key[29] << 16 | p_key[30] << 8 | >p_key[31]; /* H */ >+ >+ >+ >+ for (i = 0; i < 12; i++) { >+ W (key, 2 * i); >+ W (key, 2 * i + 1); >+ >+ c->Kr[i][0] = key[0] & 0x1f; >+ c->Kr[i][1] = key[2] & 0x1f; >+ c->Kr[i][2] = key[4] & 0x1f; >+ c->Kr[i][3] = key[6] & 0x1f; >+ >+ c->Km[i][0] = key[7]; >+ c->Km[i][1] = key[5]; >+ c->Km[i][2] = key[3]; >+ c->Km[i][3] = key[1]; >+ } >+ >+ return 0; >+} >+ >+/*forward quad round*/ >+static inline void Q (u32 * block, u8 * Kr, u32 * Km) { >+ u32 I; >+ block[2] ^= F1(block[3], Kr[0], Km[0]); >+ block[1] ^= F2(block[2], Kr[1], Km[1]); >+ block[0] ^= F3(block[1], Kr[2], Km[2]); >+ block[3] ^= F1(block[0], Kr[3], Km[3]); >+} >+ >+/*reverse quad round*/ >+static inline void QBAR (u32 * block, u8 * Kr, u32 * Km) { >+ u32 I; >+ block[3] ^= F1(block[0], Kr[3], Km[3]); >+ block[0] ^= F3(block[1], Kr[2], Km[2]); >+ block[1] ^= F2(block[2], Kr[1], Km[1]); >+ block[2] ^= F1(block[3], Kr[0], Km[0]); >+} >+ >+static void cast6_encrypt (void * ctx, u8 * outbuf, const u8 * inbuf) { >+ struct cast6_ctx * c = (struct cast6_ctx *)ctx; >+ u32 block[4]; >+ u32 * Km; >+ u8 * Kr; >+ >+ block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; >+ block[1] = inbuf[4] << 24 | inbuf[5] << 16 | inbuf[6] << 8 | inbuf[7]; >+ block[2] = inbuf[8] << 24 | inbuf[9] << 16 | inbuf[10] << 8 | inbuf[11]; >+ block[3] = inbuf[12] << 24 | inbuf[13] << 16 | inbuf[14] << 8 | >inbuf[15]; >+ >+ Km = c->Km[0]; Kr = c->Kr[0]; Q (block, Kr, Km); >+ Km = c->Km[1]; Kr = c->Kr[1]; Q (block, Kr, Km); >+ Km = c->Km[2]; Kr = c->Kr[2]; Q (block, Kr, Km); >+ Km = c->Km[3]; Kr = c->Kr[3]; Q (block, Kr, Km); >+ Km = c->Km[4]; Kr = c->Kr[4]; Q (block, Kr, Km); >+ Km = c->Km[5]; Kr = c->Kr[5]; Q (block, Kr, Km); >+ Km = c->Km[6]; Kr = c->Kr[6]; QBAR (block, Kr, Km); >+ Km = c->Km[7]; Kr = c->Kr[7]; QBAR (block, Kr, Km); >+ Km = c->Km[8]; Kr = c->Kr[8]; QBAR (block, Kr, Km); >+ Km = c->Km[9]; Kr = c->Kr[9]; QBAR (block, Kr, Km); >+ Km = c->Km[10]; Kr = c->Kr[10]; QBAR (block, Kr, Km); >+ Km = c->Km[11]; Kr = c->Kr[11]; QBAR (block, Kr, Km); >+ >+ outbuf[0] = (block[0] >> 24) & 0xff; >+ outbuf[1] = (block[0] >> 16) & 0xff; >+ outbuf[2] = (block[0] >> 8) & 0xff; >+ outbuf[3] = block[0] & 0xff; >+ outbuf[4] = (block[1] >> 24) & 0xff; >+ outbuf[5] = (block[1] >> 16) & 0xff; >+ outbuf[6] = (block[1] >> 8) & 0xff; >+ outbuf[7] = block[1] & 0xff; >+ outbuf[8] = (block[2] >> 24) & 0xff; >+ outbuf[9] = (block[2] >> 16) & 0xff; >+ outbuf[10] = (block[2] >> 8) & 0xff; >+ outbuf[11] = block[2] & 0xff; >+ outbuf[12] = (block[3] >> 24) & 0xff; >+ outbuf[13] = (block[3] >> 16) & 0xff; >+ outbuf[14] = (block[3] >> 8) & 0xff; >+ outbuf[15] = block[3] & 0xff; >+} >+ >+static void cast6_decrypt (void * ctx, u8 * outbuf, const u8 * inbuf) { >+ struct cast6_ctx * c = (struct cast6_ctx *)ctx; >+ u32 block[4]; >+ u32 * Km; >+ u8 * Kr; >+ >+ block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; >+ block[1] = inbuf[4] << 24 | inbuf[5] << 16 | inbuf[6] << 8 | inbuf[7]; >+ block[2] = inbuf[8] << 24 | inbuf[9] << 16 | inbuf[10] << 8 | inbuf[11]; >+ block[3] = inbuf[12] << 24 | inbuf[13] << 16 | inbuf[14] << 8 | >inbuf[15]; >+ >+ Km = c->Km[11]; Kr = c->Kr[11]; Q (block, Kr, Km); >+ Km = c->Km[10]; Kr = c->Kr[10]; Q (block, Kr, Km); >+ Km = c->Km[9]; Kr = c->Kr[9]; Q (block, Kr, Km); >+ Km = c->Km[8]; Kr = c->Kr[8]; Q (block, Kr, Km); >+ Km = c->Km[7]; Kr = c->Kr[7]; Q (block, Kr, Km); >+ Km = c->Km[6]; Kr = c->Kr[6]; Q (block, Kr, Km); >+ Km = c->Km[5]; Kr = c->Kr[5]; QBAR (block, Kr, Km); >+ Km = c->Km[4]; Kr = c->Kr[4]; QBAR (block, Kr, Km); >+ Km = c->Km[3]; Kr = c->Kr[3]; QBAR (block, Kr, Km); >+ Km = c->Km[2]; Kr = c->Kr[2]; QBAR (block, Kr, Km); >+ Km = c->Km[1]; Kr = c->Kr[1]; QBAR (block, Kr, Km); >+ Km = c->Km[0]; Kr = c->Kr[0]; QBAR (block, Kr, Km); >+ >+ outbuf[0] = (block[0] >> 24) & 0xff; >+ outbuf[1] = (block[0] >> 16) & 0xff; >+ outbuf[2] = (block[0] >> 8) & 0xff; >+ outbuf[3] = block[0] & 0xff; >+ outbuf[4] = (block[1] >> 24) & 0xff; >+ outbuf[5] = (block[1] >> 16) & 0xff; >+ outbuf[6] = (block[1] >> 8) & 0xff; >+ outbuf[7] = block[1] & 0xff; >+ outbuf[8] = (block[2] >> 24) & 0xff; >+ outbuf[9] = (block[2] >> 16) & 0xff; >+ outbuf[10] = (block[2] >> 8) & 0xff; >+ outbuf[11] = block[2] & 0xff; >+ outbuf[12] = (block[3] >> 24) & 0xff; >+ outbuf[13] = (block[3] >> 16) & 0xff; >+ outbuf[14] = (block[3] >> 8) & 0xff; >+ outbuf[15] = block[3] & 0xff; >+} >+ >+static struct crypto_alg alg = { >+ .cra_name = "cast6", >+ .cra_flags = CRYPTO_ALG_TYPE_CIPHER, >+ .cra_blocksize = CAST6_BLOCK_SIZE, >+ .cra_ctxsize = sizeof(struct cast6_ctx), >+ .cra_module = THIS_MODULE, >+ .cra_list = LIST_HEAD_INIT(alg.cra_list), >+ .cra_u = { >+ .cipher = { >+ .cia_min_keysize = CAST6_MIN_KEY_SIZE, >+ .cia_max_keysize = CAST6_MAX_KEY_SIZE, >+ .cia_ivsize = CAST6_BLOCK_SIZE, >+ .cia_setkey = cast6_setkey, >+ .cia_encrypt = cast6_encrypt, >+ .cia_decrypt = cast6_decrypt} >+ } >+}; >+ >+static int __init init(void) >+{ >+ return crypto_register_alg(&alg); >+} >+ >+static void __exit fini(void) >+{ >+ crypto_unregister_alg(&alg); >+} >+ >+module_init(init); >+module_exit(fini); >+ >+MODULE_LICENSE("GPL"); >+MODULE_DESCRIPTION("Cast6 Cipher Algorithm"); >diff -urN -X dontdiff linux-2.6.0-test3.pending/crypto/Kconfig >linux-2.6.0-test3.w1/crypto/Kconfig >--- linux-2.6.0-test3.pending/crypto/Kconfig 2003-08-15 13:27:18.000000000 >+1000 >+++ linux-2.6.0-test3.w1/crypto/Kconfig 2003-08-15 23:52:47.000000000 +1000 >@@ -133,6 +133,13 @@ > The CAST5 encryption algorithm (synonymous with CAST-128) is > described in RFC2144. > >+config CRYPTO_CAST6 >+ tristate "CAST6 (CAST-256) cipher algorithm" >+ depends on CRYPTO >+ help >+ The CAST6 encryption algorithm (synonymous with CAST-256) is >+ described in RFC2612. >+ > config CRYPTO_DEFLATE > tristate "Deflate compression algorithm" > depends on CRYPTO >diff -urN -X dontdiff linux-2.6.0-test3.pending/crypto/Makefile >linux-2.6.0-test3.w1/crypto/Makefile >--- linux-2.6.0-test3.pending/crypto/Makefile 2003-08-15 13:27:18.000000000 >+1000 >+++ linux-2.6.0-test3.w1/crypto/Makefile 2003-08-15 23:53:01.000000000 >+1000 >@@ -21,6 +21,7 @@ > obj-$(CONFIG_CRYPTO_SERPENT) += serpent.o > obj-$(CONFIG_CRYPTO_AES) += aes.o > obj-$(CONFIG_CRYPTO_CAST5) += cast5.o >+obj-$(CONFIG_CRYPTO_CAST6) += cast6.o > obj-$(CONFIG_CRYPTO_DEFLATE) += deflate.o > > obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o >diff -urN -X dontdiff linux-2.6.0-test3.pending/crypto/tcrypt.c >linux-2.6.0-test3.w1/crypto/tcrypt.c >--- linux-2.6.0-test3.pending/crypto/tcrypt.c 2003-08-15 13:27:18.000000000 >+1000 >+++ linux-2.6.0-test3.w1/crypto/tcrypt.c 2003-08-15 23:55:23.000000000 >+1000 >@@ -48,8 +48,8 @@ > > static char *check[] = { > "des", "md5", "des3_ede", "rot13", "sha1", "sha256", "blowfish", >- "twofish", "serpent", "sha384", "sha512", "md4", "aes", "deflate", >- NULL >+ "twofish", "serpent", "sha384", "sha512", "md4", "aes", "cast6", >+ "deflate", NULL > }; > > static void >@@ -2087,6 +2087,105 @@ > crypto_free_tfm(tfm); > } > >+static void >+test_cast6(void) >+{ >+ unsigned int ret, i, tsize; >+ u8 *p, *q, *key; >+ struct crypto_tfm *tfm; >+ struct cast6_tv *cast_tv; >+ struct scatterlist sg[1]; >+ >+ printk("\ntesting cast6 encryption\n"); >+ >+ tfm = crypto_alloc_tfm("cast6", 0); >+ if (tfm == NULL) { >+ printk("failed to load transform for cast6 (default ecb)\n"); >+ return; >+ } >+ >+ tsize = sizeof (cast6_enc_tv_template); >+ if (tsize > TVMEMSIZE) { >+ printk("template (%u) too big for tvmem (%u)\n", tsize, >+ TVMEMSIZE); >+ return; >+ } >+ >+ memcpy(tvmem, cast6_enc_tv_template, tsize); >+ cast_tv = (void *) tvmem; >+ for (i = 0; i < CAST6_ENC_TEST_VECTORS; i++) { >+ printk("test %u (%d bit key):\n", i + 1, cast_tv[i].keylen * 8); >+ key = cast_tv[i].key; >+ >+ ret = crypto_cipher_setkey(tfm, key, cast_tv[i].keylen); >+ if (ret) { >+ printk("setkey() failed flags=%x\n", tfm->crt_flags); >+ >+ if (!cast_tv[i].fail) >+ goto out; >+ } >+ >+ p = cast_tv[i].plaintext; >+ sg[0].page = virt_to_page(p); >+ sg[0].offset = ((long) p & ~PAGE_MASK); >+ sg[0].length = sizeof(cast_tv[i].plaintext); >+ ret = crypto_cipher_encrypt(tfm, sg, sg, sg[0].length); >+ if (ret) { >+ printk("encrypt() failed flags=%x\n", tfm->crt_flags); >+ goto out; >+ } >+ >+ q = kmap(sg[0].page) + sg[0].offset; >+ hexdump(q, sizeof(cast_tv[i].result)); >+ >+ printk("%s\n", memcmp(q, cast_tv[i].result, >+ sizeof(cast_tv[i].result)) ? "fail" : "pass"); >+ } >+ >+ printk("\ntesting cast6 decryption\n"); >+ >+ tsize = sizeof (cast6_dec_tv_template); >+ if (tsize > TVMEMSIZE) { >+ printk("template (%u) too big for tvmem (%u)\n", tsize, >+ TVMEMSIZE); >+ return; >+ } >+ >+ memcpy(tvmem, cast6_dec_tv_template, tsize); >+ cast_tv = (void *) tvmem; >+ for (i = 0; i < CAST6_DEC_TEST_VECTORS; i++) { >+ printk("test %u (%d bit key):\n", i + 1, cast_tv[i].keylen * 8); >+ key = cast_tv[i].key; >+ >+ ret = crypto_cipher_setkey(tfm, key, cast_tv[i].keylen); >+ if (ret) { >+ printk("setkey() failed flags=%x\n", tfm->crt_flags); >+ >+ if (!cast_tv[i].fail) >+ goto out; >+ } >+ >+ p = cast_tv[i].plaintext; >+ sg[0].page = virt_to_page(p); >+ sg[0].offset = ((long) p & ~PAGE_MASK); >+ sg[0].length = sizeof(cast_tv[i].plaintext); >+ ret = crypto_cipher_decrypt(tfm, sg, sg, sg[0].length); >+ if (ret) { >+ printk("decrypt() failed flags=%x\n", tfm->crt_flags); >+ goto out; >+ } >+ >+ q = kmap(sg[0].page) + sg[0].offset; >+ hexdump(q, sizeof(cast_tv[i].result)); >+ >+ printk("%s\n", memcmp(q, cast_tv[i].result, >+ sizeof(cast_tv[i].result)) ? "fail" : "pass"); >+ } >+ >+out: >+ crypto_free_tfm(tfm); >+} >+ > void > test_aes(void) > { >@@ -2396,11 +2495,13 @@ > test_blowfish(); > test_twofish(); > test_serpent(); >+ test_cast6(); > test_aes(); > test_sha384(); > test_sha512(); > test_deflate(); > test_cast5(); >+ test_cast6(); > #ifdef CONFIG_CRYPTO_HMAC > test_hmac_md5(); > test_hmac_sha1(); >@@ -2464,6 +2565,10 @@ > test_cast5(); > break; > >+ case 15: >+ test_cast6(); >+ break; >+ > #ifdef CONFIG_CRYPTO_HMAC > case 100: > test_hmac_md5(); >diff -urN -X dontdiff linux-2.6.0-test3.pending/crypto/tcrypt.h >linux-2.6.0-test3.w1/crypto/tcrypt.h >--- linux-2.6.0-test3.pending/crypto/tcrypt.h 2003-08-15 13:27:18.000000000 >+1000 >+++ linux-2.6.0-test3.w1/crypto/tcrypt.h 2003-08-16 00:07:50.184589536 >+1000 >@@ -1589,6 +1589,93 @@ > } > }; > >+/* Cast6 test vectors from RFC 2612 */ >+#define CAST6_ENC_TEST_VECTORS 3 >+#define CAST6_DEC_TEST_VECTORS 3 >+ >+struct cast6_tv { >+ unsigned keylen; >+ unsigned fail; >+ u8 key[32]; >+ u8 plaintext[16]; >+ u8 result[16]; >+}; >+ >+struct cast6_tv cast6_enc_tv_template[] = >+{ >+ { >+ 16, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, >+ 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, >+ }, >+ { >+ 24, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, >+ 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, >+ 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, >+ }, >+ { >+ 32, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, >+ 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, >+ 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, >+ 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, >+ } >+}; >+ >+struct cast6_tv cast6_dec_tv_template[] = >+{ >+ { >+ 16, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, >+ { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, >+ 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ }, >+ { >+ 24, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, >+ 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, >+ { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, >+ 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ }, >+ { >+ 32, >+ 0, >+ { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, >+ 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, >+ 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, >+ 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, >+ { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, >+ 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, >+ { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, >+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, >+ } >+}; >+ >+ > /* > * AES test vectors. > */ >diff -urN -X dontdiff >linux-2.6.0-test3.pending/Documentation/crypto/api-intro.txt >linux-2.6.0-test3.w1/Documentation/crypto/api-intro.txt >--- linux-2.6.0-test3.pending/Documentation/crypto/api-intro.txt 2003-08-15 >13:27:18.000000000 +1000 >+++ linux-2.6.0-test3.w1/Documentation/crypto/api-intro.txt 2003-08-15 >23:54:21.000000000 +1000 >@@ -213,7 +213,7 @@ > Kyle McMartin > Adam J. Richter > >-CAST5 algorithm contributors: >+CAST5/CAST6 algorithm contributors: > Kartikey Mahendra Bhatt (original developers unknown, FSF copyright). > > Generic scatterwalk code by Adam J. Richter > _________________________________________________________________ Polyphonic ringtones. Latest movie trailors. http://server1.msn.co.in/sp03/gprs/index.asp On your mobile! - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/