xref: /optee_os/core/lib/libtomcrypt/src/ciphers/noekeon.c (revision 8411e6ad673d20c4742ed30c785e3f5cdea54dfa)
1*8411e6adSJerome Forissier /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2*8411e6adSJerome Forissier /* SPDX-License-Identifier: Unlicense */
35a913ee7SJerome Forissier /**
45a913ee7SJerome Forissier    @file noekeon.c
55a913ee7SJerome Forissier    Implementation of the Noekeon block cipher by Tom St Denis
65a913ee7SJerome Forissier */
75a913ee7SJerome Forissier #include "tomcrypt_private.h"
85a913ee7SJerome Forissier 
95a913ee7SJerome Forissier #ifdef LTC_NOEKEON
105a913ee7SJerome Forissier 
115a913ee7SJerome Forissier const struct ltc_cipher_descriptor noekeon_desc =
125a913ee7SJerome Forissier {
135a913ee7SJerome Forissier     "noekeon",
145a913ee7SJerome Forissier     16,
155a913ee7SJerome Forissier     16, 16, 16, 16,
165a913ee7SJerome Forissier     &noekeon_setup,
175a913ee7SJerome Forissier     &noekeon_ecb_encrypt,
185a913ee7SJerome Forissier     &noekeon_ecb_decrypt,
195a913ee7SJerome Forissier     &noekeon_test,
205a913ee7SJerome Forissier     &noekeon_done,
215a913ee7SJerome Forissier     &noekeon_keysize,
225a913ee7SJerome Forissier     NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
235a913ee7SJerome Forissier };
245a913ee7SJerome Forissier 
255a913ee7SJerome Forissier static const ulong32 RC[] = {
265a913ee7SJerome Forissier    0x00000080UL, 0x0000001bUL, 0x00000036UL, 0x0000006cUL,
275a913ee7SJerome Forissier    0x000000d8UL, 0x000000abUL, 0x0000004dUL, 0x0000009aUL,
285a913ee7SJerome Forissier    0x0000002fUL, 0x0000005eUL, 0x000000bcUL, 0x00000063UL,
295a913ee7SJerome Forissier    0x000000c6UL, 0x00000097UL, 0x00000035UL, 0x0000006aUL,
305a913ee7SJerome Forissier    0x000000d4UL
315a913ee7SJerome Forissier };
325a913ee7SJerome Forissier 
335a913ee7SJerome Forissier #define kTHETA(a, b, c, d)                                 \
345a913ee7SJerome Forissier     temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
355a913ee7SJerome Forissier     b ^= temp; d ^= temp;                                  \
365a913ee7SJerome Forissier     temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
375a913ee7SJerome Forissier     a ^= temp; c ^= temp;
385a913ee7SJerome Forissier 
395a913ee7SJerome Forissier #define THETA(k, a, b, c, d)                               \
405a913ee7SJerome Forissier     temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
415a913ee7SJerome Forissier     b ^= temp ^ k[1]; d ^= temp ^ k[3];                    \
425a913ee7SJerome Forissier     temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
435a913ee7SJerome Forissier     a ^= temp ^ k[0]; c ^= temp ^ k[2];
445a913ee7SJerome Forissier 
455a913ee7SJerome Forissier #define GAMMA(a, b, c, d)     \
465a913ee7SJerome Forissier     b ^= ~(d|c);              \
475a913ee7SJerome Forissier     a ^= c&b;                 \
485a913ee7SJerome Forissier     temp = d; d = a; a = temp;\
495a913ee7SJerome Forissier     c ^= a ^ b ^ d;           \
505a913ee7SJerome Forissier     b ^= ~(d|c);              \
515a913ee7SJerome Forissier     a ^= c&b;
525a913ee7SJerome Forissier 
535a913ee7SJerome Forissier #define PI1(a, b, c, d) \
545a913ee7SJerome Forissier     b = ROLc(b, 1); c = ROLc(c, 5); d = ROLc(d, 2);
555a913ee7SJerome Forissier 
565a913ee7SJerome Forissier #define PI2(a, b, c, d) \
575a913ee7SJerome Forissier     b = RORc(b, 1); c = RORc(c, 5); d = RORc(d, 2);
585a913ee7SJerome Forissier 
595a913ee7SJerome Forissier  /**
605a913ee7SJerome Forissier     Initialize the Noekeon block cipher
615a913ee7SJerome Forissier     @param key The symmetric key you wish to pass
625a913ee7SJerome Forissier     @param keylen The key length in bytes
635a913ee7SJerome Forissier     @param num_rounds The number of rounds desired (0 for default)
645a913ee7SJerome Forissier     @param skey The key in as scheduled by this function.
655a913ee7SJerome Forissier     @return CRYPT_OK if successful
665a913ee7SJerome Forissier  */
noekeon_setup(const unsigned char * key,int keylen,int num_rounds,symmetric_key * skey)675a913ee7SJerome Forissier int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
685a913ee7SJerome Forissier {
695a913ee7SJerome Forissier    ulong32 temp;
705a913ee7SJerome Forissier 
715a913ee7SJerome Forissier    LTC_ARGCHK(key != NULL);
725a913ee7SJerome Forissier    LTC_ARGCHK(skey != NULL);
735a913ee7SJerome Forissier 
745a913ee7SJerome Forissier    if (keylen != 16) {
755a913ee7SJerome Forissier       return CRYPT_INVALID_KEYSIZE;
765a913ee7SJerome Forissier    }
775a913ee7SJerome Forissier 
785a913ee7SJerome Forissier    if (num_rounds != 16 && num_rounds != 0) {
795a913ee7SJerome Forissier       return CRYPT_INVALID_ROUNDS;
805a913ee7SJerome Forissier    }
815a913ee7SJerome Forissier 
825a913ee7SJerome Forissier    LOAD32H(skey->noekeon.K[0],&key[0]);
835a913ee7SJerome Forissier    LOAD32H(skey->noekeon.K[1],&key[4]);
845a913ee7SJerome Forissier    LOAD32H(skey->noekeon.K[2],&key[8]);
855a913ee7SJerome Forissier    LOAD32H(skey->noekeon.K[3],&key[12]);
865a913ee7SJerome Forissier 
875a913ee7SJerome Forissier    LOAD32H(skey->noekeon.dK[0],&key[0]);
885a913ee7SJerome Forissier    LOAD32H(skey->noekeon.dK[1],&key[4]);
895a913ee7SJerome Forissier    LOAD32H(skey->noekeon.dK[2],&key[8]);
905a913ee7SJerome Forissier    LOAD32H(skey->noekeon.dK[3],&key[12]);
915a913ee7SJerome Forissier 
925a913ee7SJerome Forissier    kTHETA(skey->noekeon.dK[0], skey->noekeon.dK[1], skey->noekeon.dK[2], skey->noekeon.dK[3]);
935a913ee7SJerome Forissier 
945a913ee7SJerome Forissier    return CRYPT_OK;
955a913ee7SJerome Forissier }
965a913ee7SJerome Forissier 
975a913ee7SJerome Forissier /**
985a913ee7SJerome Forissier   Encrypts a block of text with Noekeon
995a913ee7SJerome Forissier   @param pt The input plaintext (16 bytes)
1005a913ee7SJerome Forissier   @param ct The output ciphertext (16 bytes)
1015a913ee7SJerome Forissier   @param skey The key as scheduled
1025a913ee7SJerome Forissier   @return CRYPT_OK if successful
1035a913ee7SJerome Forissier */
1045a913ee7SJerome Forissier #ifdef LTC_CLEAN_STACK
s_noekeon_ecb_encrypt(const unsigned char * pt,unsigned char * ct,const symmetric_key * skey)105*8411e6adSJerome Forissier static int s_noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
1065a913ee7SJerome Forissier #else
1075a913ee7SJerome Forissier int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
1085a913ee7SJerome Forissier #endif
1095a913ee7SJerome Forissier {
1105a913ee7SJerome Forissier    ulong32 a,b,c,d,temp;
1115a913ee7SJerome Forissier    int r;
1125a913ee7SJerome Forissier 
1135a913ee7SJerome Forissier    LTC_ARGCHK(skey != NULL);
1145a913ee7SJerome Forissier    LTC_ARGCHK(pt   != NULL);
1155a913ee7SJerome Forissier    LTC_ARGCHK(ct   != NULL);
1165a913ee7SJerome Forissier 
1175a913ee7SJerome Forissier    LOAD32H(a,&pt[0]); LOAD32H(b,&pt[4]);
1185a913ee7SJerome Forissier    LOAD32H(c,&pt[8]); LOAD32H(d,&pt[12]);
1195a913ee7SJerome Forissier 
1205a913ee7SJerome Forissier #define ROUND(i) \
1215a913ee7SJerome Forissier        a ^= RC[i]; \
1225a913ee7SJerome Forissier        THETA(skey->noekeon.K, a,b,c,d); \
1235a913ee7SJerome Forissier        PI1(a,b,c,d); \
1245a913ee7SJerome Forissier        GAMMA(a,b,c,d); \
1255a913ee7SJerome Forissier        PI2(a,b,c,d);
1265a913ee7SJerome Forissier 
1275a913ee7SJerome Forissier    for (r = 0; r < 16; ++r) {
1285a913ee7SJerome Forissier        ROUND(r);
1295a913ee7SJerome Forissier    }
1305a913ee7SJerome Forissier 
1315a913ee7SJerome Forissier #undef ROUND
1325a913ee7SJerome Forissier 
1335a913ee7SJerome Forissier    a ^= RC[16];
1345a913ee7SJerome Forissier    THETA(skey->noekeon.K, a, b, c, d);
1355a913ee7SJerome Forissier 
1365a913ee7SJerome Forissier    STORE32H(a,&ct[0]); STORE32H(b,&ct[4]);
1375a913ee7SJerome Forissier    STORE32H(c,&ct[8]); STORE32H(d,&ct[12]);
1385a913ee7SJerome Forissier 
1395a913ee7SJerome Forissier    return CRYPT_OK;
1405a913ee7SJerome Forissier }
1415a913ee7SJerome Forissier 
1425a913ee7SJerome Forissier #ifdef LTC_CLEAN_STACK
noekeon_ecb_encrypt(const unsigned char * pt,unsigned char * ct,const symmetric_key * skey)1435a913ee7SJerome Forissier int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
1445a913ee7SJerome Forissier {
145*8411e6adSJerome Forissier    int err = s_noekeon_ecb_encrypt(pt, ct, skey);
1465a913ee7SJerome Forissier    burn_stack(sizeof(ulong32) * 5 + sizeof(int));
1475a913ee7SJerome Forissier    return err;
1485a913ee7SJerome Forissier }
1495a913ee7SJerome Forissier #endif
1505a913ee7SJerome Forissier 
1515a913ee7SJerome Forissier /**
1525a913ee7SJerome Forissier   Decrypts a block of text with Noekeon
1535a913ee7SJerome Forissier   @param ct The input ciphertext (16 bytes)
1545a913ee7SJerome Forissier   @param pt The output plaintext (16 bytes)
1555a913ee7SJerome Forissier   @param skey The key as scheduled
1565a913ee7SJerome Forissier   @return CRYPT_OK if successful
1575a913ee7SJerome Forissier */
1585a913ee7SJerome Forissier #ifdef LTC_CLEAN_STACK
s_noekeon_ecb_decrypt(const unsigned char * ct,unsigned char * pt,const symmetric_key * skey)159*8411e6adSJerome Forissier static int s_noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
1605a913ee7SJerome Forissier #else
1615a913ee7SJerome Forissier int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
1625a913ee7SJerome Forissier #endif
1635a913ee7SJerome Forissier {
1645a913ee7SJerome Forissier    ulong32 a,b,c,d, temp;
1655a913ee7SJerome Forissier    int r;
1665a913ee7SJerome Forissier 
1675a913ee7SJerome Forissier    LTC_ARGCHK(skey != NULL);
1685a913ee7SJerome Forissier    LTC_ARGCHK(pt   != NULL);
1695a913ee7SJerome Forissier    LTC_ARGCHK(ct   != NULL);
1705a913ee7SJerome Forissier 
1715a913ee7SJerome Forissier    LOAD32H(a,&ct[0]); LOAD32H(b,&ct[4]);
1725a913ee7SJerome Forissier    LOAD32H(c,&ct[8]); LOAD32H(d,&ct[12]);
1735a913ee7SJerome Forissier 
1745a913ee7SJerome Forissier 
1755a913ee7SJerome Forissier #define ROUND(i) \
1765a913ee7SJerome Forissier        THETA(skey->noekeon.dK, a,b,c,d); \
1775a913ee7SJerome Forissier        a ^= RC[i]; \
1785a913ee7SJerome Forissier        PI1(a,b,c,d); \
1795a913ee7SJerome Forissier        GAMMA(a,b,c,d); \
1805a913ee7SJerome Forissier        PI2(a,b,c,d);
1815a913ee7SJerome Forissier 
1825a913ee7SJerome Forissier    for (r = 16; r > 0; --r) {
1835a913ee7SJerome Forissier        ROUND(r);
1845a913ee7SJerome Forissier    }
1855a913ee7SJerome Forissier 
1865a913ee7SJerome Forissier #undef ROUND
1875a913ee7SJerome Forissier 
1885a913ee7SJerome Forissier    THETA(skey->noekeon.dK, a,b,c,d);
1895a913ee7SJerome Forissier    a ^= RC[0];
1905a913ee7SJerome Forissier    STORE32H(a,&pt[0]); STORE32H(b, &pt[4]);
1915a913ee7SJerome Forissier    STORE32H(c,&pt[8]); STORE32H(d, &pt[12]);
1925a913ee7SJerome Forissier    return CRYPT_OK;
1935a913ee7SJerome Forissier }
1945a913ee7SJerome Forissier 
1955a913ee7SJerome Forissier #ifdef LTC_CLEAN_STACK
noekeon_ecb_decrypt(const unsigned char * ct,unsigned char * pt,const symmetric_key * skey)1965a913ee7SJerome Forissier int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
1975a913ee7SJerome Forissier {
198*8411e6adSJerome Forissier    int err = s_noekeon_ecb_decrypt(ct, pt, skey);
1995a913ee7SJerome Forissier    burn_stack(sizeof(ulong32) * 5 + sizeof(int));
2005a913ee7SJerome Forissier    return err;
2015a913ee7SJerome Forissier }
2025a913ee7SJerome Forissier #endif
2035a913ee7SJerome Forissier 
2045a913ee7SJerome Forissier /**
2055a913ee7SJerome Forissier   Performs a self-test of the Noekeon block cipher
2065a913ee7SJerome Forissier   @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
2075a913ee7SJerome Forissier */
noekeon_test(void)2085a913ee7SJerome Forissier int noekeon_test(void)
2095a913ee7SJerome Forissier {
2105a913ee7SJerome Forissier  #ifndef LTC_TEST
2115a913ee7SJerome Forissier     return CRYPT_NOP;
2125a913ee7SJerome Forissier  #else
2135a913ee7SJerome Forissier  static const struct {
2145a913ee7SJerome Forissier      int keylen;
2155a913ee7SJerome Forissier      unsigned char key[16], pt[16], ct[16];
2165a913ee7SJerome Forissier  } tests[] = {
2175a913ee7SJerome Forissier    {
2185a913ee7SJerome Forissier       16,
2195a913ee7SJerome Forissier       { 0xAA, 0x3C, 0x8C, 0x86, 0xD9, 0x8B, 0xF8, 0xBE, 0x21, 0xE0, 0x36, 0x09, 0x78, 0xFB, 0xE4, 0x90 },
2205a913ee7SJerome Forissier       { 0xE4, 0x96, 0x6C, 0xD3, 0x13, 0xA0, 0x6C, 0xAF, 0xD0, 0x23, 0xC9, 0xFD, 0x45, 0x32, 0x23, 0x16 },
2215a913ee7SJerome Forissier       { 0xA6, 0xEC, 0xB8, 0xA8, 0x61, 0xFD, 0x62, 0xD9, 0x13, 0x02, 0xFE, 0x9E, 0x47, 0x01, 0x3F, 0xC3 }
2225a913ee7SJerome Forissier    },
2235a913ee7SJerome Forissier    {
2245a913ee7SJerome Forissier       16,
2255a913ee7SJerome Forissier       { 0xED, 0x43, 0xD1, 0x87, 0x21, 0x7E, 0xE0, 0x97, 0x3D, 0x76, 0xC3, 0x37, 0x2E, 0x7D, 0xAE, 0xD3 },
2265a913ee7SJerome Forissier       { 0xE3, 0x38, 0x32, 0xCC, 0xF2, 0x2F, 0x2F, 0x0A, 0x4A, 0x8B, 0x8F, 0x18, 0x12, 0x20, 0x17, 0xD3 },
2275a913ee7SJerome Forissier       { 0x94, 0xA5, 0xDF, 0xF5, 0xAE, 0x1C, 0xBB, 0x22, 0xAD, 0xEB, 0xA7, 0x0D, 0xB7, 0x82, 0x90, 0xA0 }
2285a913ee7SJerome Forissier    },
2295a913ee7SJerome Forissier    {
2305a913ee7SJerome Forissier       16,
2315a913ee7SJerome Forissier       { 0x6F, 0xDC, 0x23, 0x38, 0xF2, 0x10, 0xFB, 0xD3, 0xC1, 0x8C, 0x02, 0xF6, 0xB4, 0x6A, 0xD5, 0xA8 },
2325a913ee7SJerome Forissier       { 0xDB, 0x29, 0xED, 0xB5, 0x5F, 0xB3, 0x60, 0x3A, 0x92, 0xA8, 0xEB, 0x9C, 0x6D, 0x9D, 0x3E, 0x8F },
2335a913ee7SJerome Forissier       { 0x78, 0xF3, 0x6F, 0xF8, 0x9E, 0xBB, 0x8C, 0x6A, 0xE8, 0x10, 0xF7, 0x00, 0x22, 0x15, 0x30, 0x3D }
2345a913ee7SJerome Forissier    },
2355a913ee7SJerome Forissier    {
2365a913ee7SJerome Forissier       16,
2375a913ee7SJerome Forissier       { 0x2C, 0x0C, 0x02, 0xEF, 0x6B, 0xC4, 0xF2, 0x0B, 0x2E, 0xB9, 0xE0, 0xBF, 0xD9, 0x36, 0xC2, 0x4E },
2385a913ee7SJerome Forissier       { 0x84, 0xE2, 0xFE, 0x64, 0xB1, 0xB9, 0xFE, 0x76, 0xA8, 0x3F, 0x45, 0xC7, 0x40, 0x7A, 0xAF, 0xEE },
2395a913ee7SJerome Forissier       { 0x2A, 0x08, 0xD6, 0xA2, 0x1C, 0x63, 0x08, 0xB0, 0xF8, 0xBC, 0xB3, 0xA1, 0x66, 0xF7, 0xAE, 0xCF }
2405a913ee7SJerome Forissier    },
2415a913ee7SJerome Forissier    {
2425a913ee7SJerome Forissier       16,
2435a913ee7SJerome Forissier       { 0x6F, 0x30, 0xF8, 0x9F, 0xDA, 0x6E, 0xA0, 0x91, 0x04, 0x0F, 0x6C, 0x8B, 0x7D, 0xF7, 0x2A, 0x4B },
2445a913ee7SJerome Forissier       { 0x65, 0xB6, 0xA6, 0xD0, 0x42, 0x14, 0x08, 0x60, 0x34, 0x8D, 0x37, 0x2F, 0x01, 0xF0, 0x46, 0xBE },
2455a913ee7SJerome Forissier       { 0x66, 0xAC, 0x0B, 0x62, 0x1D, 0x68, 0x11, 0xF5, 0x27, 0xB1, 0x13, 0x5D, 0xF3, 0x2A, 0xE9, 0x18 }
2465a913ee7SJerome Forissier    },
2475a913ee7SJerome Forissier    {
2485a913ee7SJerome Forissier       16,
2495a913ee7SJerome Forissier       { 0xCA, 0xA4, 0x16, 0xB7, 0x1C, 0x92, 0x2E, 0xAD, 0xEB, 0xA7, 0xDB, 0x69, 0x92, 0xCB, 0x35, 0xEF },
2505a913ee7SJerome Forissier       { 0x81, 0x6F, 0x8E, 0x4D, 0x96, 0xC6, 0xB3, 0x67, 0x83, 0xF5, 0x63, 0xC7, 0x20, 0x6D, 0x40, 0x23 },
2515a913ee7SJerome Forissier       { 0x44, 0xF7, 0x63, 0x62, 0xF0, 0x43, 0xBB, 0x67, 0x4A, 0x75, 0x12, 0x42, 0x46, 0x29, 0x28, 0x19 }
2525a913ee7SJerome Forissier    },
2535a913ee7SJerome Forissier    {
2545a913ee7SJerome Forissier       16,
2555a913ee7SJerome Forissier       { 0x6B, 0xCF, 0x22, 0x2F, 0xE0, 0x1B, 0xB0, 0xAA, 0xD8, 0x3C, 0x91, 0x99, 0x18, 0xB2, 0x28, 0xE8 },
2565a913ee7SJerome Forissier       { 0x7C, 0x37, 0xC7, 0xD0, 0xAC, 0x92, 0x29, 0xF1, 0x60, 0x82, 0x93, 0x89, 0xAA, 0x61, 0xAA, 0xA9 },
2575a913ee7SJerome Forissier       { 0xE5, 0x89, 0x1B, 0xB3, 0xFE, 0x8B, 0x0C, 0xA1, 0xA6, 0xC7, 0xBE, 0x12, 0x73, 0x0F, 0xC1, 0x19 }
2585a913ee7SJerome Forissier    },
2595a913ee7SJerome Forissier    {
2605a913ee7SJerome Forissier       16,
2615a913ee7SJerome Forissier       { 0xE6, 0xD0, 0xF1, 0x03, 0x2E, 0xDE, 0x70, 0x8D, 0xD8, 0x9E, 0x36, 0x5C, 0x05, 0x52, 0xE7, 0x0D },
2625a913ee7SJerome Forissier       { 0xE2, 0x42, 0xE7, 0x92, 0x0E, 0xF7, 0x82, 0xA2, 0xB8, 0x21, 0x8D, 0x26, 0xBA, 0x2D, 0xE6, 0x32 },
2635a913ee7SJerome Forissier       { 0x1E, 0xDD, 0x75, 0x22, 0xB9, 0x36, 0x8A, 0x0F, 0x32, 0xFD, 0xD4, 0x48, 0x65, 0x12, 0x5A, 0x2F }
2645a913ee7SJerome Forissier    }
2655a913ee7SJerome Forissier  };
2665a913ee7SJerome Forissier  symmetric_key key;
2675a913ee7SJerome Forissier  unsigned char tmp[2][16];
2685a913ee7SJerome Forissier  int err, i, y;
2695a913ee7SJerome Forissier 
2705a913ee7SJerome Forissier  for (i = 0; i < (int)(sizeof(tests)/sizeof(tests[0])); i++) {
2715a913ee7SJerome Forissier     zeromem(&key, sizeof(key));
2725a913ee7SJerome Forissier     if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
2735a913ee7SJerome Forissier        return err;
2745a913ee7SJerome Forissier     }
2755a913ee7SJerome Forissier 
2765a913ee7SJerome Forissier     noekeon_ecb_encrypt(tests[i].pt, tmp[0], &key);
2775a913ee7SJerome Forissier     noekeon_ecb_decrypt(tmp[0], tmp[1], &key);
2785a913ee7SJerome Forissier     if (compare_testvector(tmp[0], 16, tests[i].ct, 16, "Noekeon Encrypt", i) ||
2795a913ee7SJerome Forissier           compare_testvector(tmp[1], 16, tests[i].pt, 16, "Noekeon Decrypt", i)) {
2805a913ee7SJerome Forissier         return CRYPT_FAIL_TESTVECTOR;
2815a913ee7SJerome Forissier     }
2825a913ee7SJerome Forissier 
2835a913ee7SJerome Forissier     /* now see if we can encrypt all zero bytes 1000 times, decrypt and come back where we started */
2845a913ee7SJerome Forissier     for (y = 0; y < 16; y++) tmp[0][y] = 0;
2855a913ee7SJerome Forissier     for (y = 0; y < 1000; y++) noekeon_ecb_encrypt(tmp[0], tmp[0], &key);
2865a913ee7SJerome Forissier     for (y = 0; y < 1000; y++) noekeon_ecb_decrypt(tmp[0], tmp[0], &key);
2875a913ee7SJerome Forissier     for (y = 0; y < 16; y++) if (tmp[0][y] != 0) return CRYPT_FAIL_TESTVECTOR;
2885a913ee7SJerome Forissier  }
2895a913ee7SJerome Forissier  return CRYPT_OK;
2905a913ee7SJerome Forissier  #endif
2915a913ee7SJerome Forissier }
2925a913ee7SJerome Forissier 
2935a913ee7SJerome Forissier /** Terminate the context
2945a913ee7SJerome Forissier    @param skey    The scheduled key
2955a913ee7SJerome Forissier */
noekeon_done(symmetric_key * skey)2965a913ee7SJerome Forissier void noekeon_done(symmetric_key *skey)
2975a913ee7SJerome Forissier {
2985a913ee7SJerome Forissier   LTC_UNUSED_PARAM(skey);
2995a913ee7SJerome Forissier }
3005a913ee7SJerome Forissier 
3015a913ee7SJerome Forissier /**
3025a913ee7SJerome Forissier   Gets suitable key size
3035a913ee7SJerome Forissier   @param keysize [in/out] The length of the recommended key (in bytes).  This function will store the suitable size back in this variable.
3045a913ee7SJerome Forissier   @return CRYPT_OK if the input key size is acceptable.
3055a913ee7SJerome Forissier */
noekeon_keysize(int * keysize)3065a913ee7SJerome Forissier int noekeon_keysize(int *keysize)
3075a913ee7SJerome Forissier {
3085a913ee7SJerome Forissier    LTC_ARGCHK(keysize != NULL);
3095a913ee7SJerome Forissier    if (*keysize < 16) {
3105a913ee7SJerome Forissier       return CRYPT_INVALID_KEYSIZE;
3115a913ee7SJerome Forissier    }
3125a913ee7SJerome Forissier    *keysize = 16;
3135a913ee7SJerome Forissier    return CRYPT_OK;
3145a913ee7SJerome Forissier }
3155a913ee7SJerome Forissier 
3165a913ee7SJerome Forissier #endif
3175a913ee7SJerome Forissier 
318