]> git.cryptolib.org Git - avr-crypto-lib.git/blobdiff - main.c
arcfour got its own testsuit now + some modifications of the build process
[avr-crypto-lib.git] / main.c
diff --git a/main.c b/main.c
index cc8a72fccd6be550f3db42830175daceaa1816c8..f747ffe6ff464621c09de6e7b6d14a716fea9191 100644 (file)
--- a/main.c
+++ b/main.c
@@ -3,31 +3,6 @@
  * 
 */
 
-/* implemented:
- *  
- * xtea (C+ASM)
- * SHA256 (C+ASM)
- * ARCFOUR (C+ASM)
- * HMAC-SHA256 (C)
- * PRNG (C)
- * 
- */
-
-/* to implement:
- *  -aes
- *     -seal (broken?) 
- *  -serpent
- *  -cast
- *  -des (???)
- *     -twofish
- *     -blowfish
- *     -skipjack (???)
- *     -idea (???)
- *  -kasumi---
- *  -camellia
- * modes: cbc, ecb, ...
- *  need Hashes, asymetrics, signatures, ...
- */
 
 #include "config.h"
 #include "serial-tools.h"
@@ -36,7 +11,6 @@
 
 #include "sha256.h"
 #include "xtea.h"
-#include "arcfour.h"
 #include "prng.h"
 #include "cast5.h"
 
@@ -139,6 +113,8 @@ void testrun_xtea(void){
        uart_hexdump(block, 8); 
 }
 
+#if 0
+
 void testrun_arcfour(void){
        arcfour_ctx_t s;
        char *b;
@@ -178,6 +154,8 @@ void testrun_arcfour(void){
        uart_hexdump(a, 8);     
 }
 
+#endif
+
 void testrun_prng(void){
        uint8_t i,block[32];
        uart_putstr("\r\naddEntropy(32, 0x00000000)");
@@ -238,8 +216,8 @@ restart:
                                        uart_putstr("\r\n");
                                testrun_cast5();
                                        uart_putstr("\r\n");
-                               testrun_arcfour();
-                                       uart_putstr("\r\n");
+               //              testrun_arcfour();
+               //                      uart_putstr("\r\n");
                                testrun_sha256();
                        goto restart;
                }