@@ -9,36 +9,6 @@
#include "odp_cunit_common.h"
-/* test functions: */
-void crypto_test_enc_alg_null(void);
-void crypto_test_dec_alg_null(void);
-void crypto_test_enc_alg_3des_cbc(void);
-void crypto_test_enc_alg_3des_cbc_ovr_iv(void);
-void crypto_test_dec_alg_3des_cbc(void);
-void crypto_test_dec_alg_3des_cbc_ovr_iv(void);
-void crypto_test_enc_alg_aes_cbc(void);
-void crypto_test_enc_alg_aes_cbc_ovr_iv(void);
-void crypto_test_dec_alg_aes_cbc(void);
-void crypto_test_dec_alg_aes_cbc_ovr_iv(void);
-void crypto_test_enc_alg_aes_ctr(void);
-void crypto_test_enc_alg_aes_ctr_ovr_iv(void);
-void crypto_test_dec_alg_aes_ctr(void);
-void crypto_test_dec_alg_aes_ctr_ovr_iv(void);
-void crypto_test_enc_alg_aes_gcm(void);
-void crypto_test_enc_alg_aes_gcm_ovr_iv(void);
-void crypto_test_dec_alg_aes_gcm(void);
-void crypto_test_dec_alg_aes_gcm_ovr_iv(void);
-void crypto_test_gen_alg_hmac_md5(void);
-void crypto_test_check_alg_hmac_md5(void);
-void crypto_test_gen_alg_hmac_sha1(void);
-void crypto_test_check_alg_hmac_sha1(void);
-void crypto_test_gen_alg_hmac_sha256(void);
-void crypto_test_check_alg_hmac_sha256(void);
-void crypto_test_gen_alg_hmac_sha512(void);
-void crypto_test_check_alg_hmac_sha512(void);
-void crypto_test_gen_alg_aes_gmac(void);
-void crypto_test_check_alg_aes_gmac(void);
-
/* test arrays: */
extern odp_testinfo_t crypto_suite[];
@@ -628,7 +628,7 @@ static int check_alg_null(void)
return check_alg_support(ODP_CIPHER_ALG_NULL, ODP_AUTH_ALG_NULL);
}
-void crypto_test_enc_alg_null(void)
+static void crypto_test_enc_alg_null(void)
{
unsigned int test_vec_num = (sizeof(null_reference) /
sizeof(null_reference[0]));
@@ -642,7 +642,7 @@ void crypto_test_enc_alg_null(void)
false);
}
-void crypto_test_dec_alg_null(void)
+static void crypto_test_dec_alg_null(void)
{
unsigned int test_vec_num = (sizeof(null_reference) /
sizeof(null_reference[0]));
@@ -665,7 +665,7 @@ static int check_alg_3des_cbc(void)
* operation for 3DES_CBC algorithm. IV for the operation is the session IV.
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.*/
-void crypto_test_enc_alg_3des_cbc(void)
+static void crypto_test_enc_alg_3des_cbc(void)
{
unsigned int test_vec_num = (sizeof(tdes_cbc_reference) /
sizeof(tdes_cbc_reference[0]));
@@ -682,7 +682,7 @@ void crypto_test_enc_alg_3des_cbc(void)
/* This test verifies the correctness of encode (plaintext -> ciphertext)
* operation for 3DES_CBC algorithm. IV for the operation is the operation IV.
* */
-void crypto_test_enc_alg_3des_cbc_ovr_iv(void)
+static void crypto_test_enc_alg_3des_cbc_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(tdes_cbc_reference) /
sizeof(tdes_cbc_reference[0]));
@@ -701,7 +701,7 @@ void crypto_test_enc_alg_3des_cbc_ovr_iv(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_3des_cbc(void)
+static void crypto_test_dec_alg_3des_cbc(void)
{
unsigned int test_vec_num = (sizeof(tdes_cbc_reference) /
sizeof(tdes_cbc_reference[0]));
@@ -720,7 +720,7 @@ void crypto_test_dec_alg_3des_cbc(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_3des_cbc_ovr_iv(void)
+static void crypto_test_dec_alg_3des_cbc_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(tdes_cbc_reference) /
sizeof(tdes_cbc_reference[0]));
@@ -743,7 +743,7 @@ static int check_alg_aes_gcm(void)
* operation for AES128_GCM algorithm. IV for the operation is the session IV.
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.*/
-void crypto_test_enc_alg_aes_gcm(void)
+static void crypto_test_enc_alg_aes_gcm(void)
{
unsigned int test_vec_num = (sizeof(aes_gcm_reference) /
sizeof(aes_gcm_reference[0]));
@@ -762,7 +762,7 @@ void crypto_test_enc_alg_aes_gcm(void)
* operation for AES128_GCM algorithm. IV for the operation is the session IV.
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.*/
-void crypto_test_enc_alg_aes_gcm_ovr_iv(void)
+static void crypto_test_enc_alg_aes_gcm_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_gcm_reference) /
sizeof(aes_gcm_reference[0]));
@@ -782,7 +782,7 @@ void crypto_test_enc_alg_aes_gcm_ovr_iv(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_gcm(void)
+static void crypto_test_dec_alg_aes_gcm(void)
{
unsigned int test_vec_num = (sizeof(aes_gcm_reference) /
sizeof(aes_gcm_reference[0]));
@@ -802,7 +802,7 @@ void crypto_test_dec_alg_aes_gcm(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_gcm_ovr_iv(void)
+static void crypto_test_dec_alg_aes_gcm_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_gcm_reference) /
sizeof(aes_gcm_reference[0]));
@@ -826,7 +826,7 @@ static int check_alg_aes_cbc(void)
* operation for AES128_CBC algorithm. IV for the operation is the session IV.
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.*/
-void crypto_test_enc_alg_aes_cbc(void)
+static void crypto_test_enc_alg_aes_cbc(void)
{
unsigned int test_vec_num = (sizeof(aes_cbc_reference) /
sizeof(aes_cbc_reference[0]));
@@ -844,7 +844,7 @@ void crypto_test_enc_alg_aes_cbc(void)
/* This test verifies the correctness of encode (plaintext -> ciphertext)
* operation for AES128_CBC algorithm. IV for the operation is the operation IV.
* */
-void crypto_test_enc_alg_aes_cbc_ovr_iv(void)
+static void crypto_test_enc_alg_aes_cbc_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_cbc_reference) /
sizeof(aes_cbc_reference[0]));
@@ -864,7 +864,7 @@ void crypto_test_enc_alg_aes_cbc_ovr_iv(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_cbc(void)
+static void crypto_test_dec_alg_aes_cbc(void)
{
unsigned int test_vec_num = (sizeof(aes_cbc_reference) /
sizeof(aes_cbc_reference[0]));
@@ -884,7 +884,7 @@ void crypto_test_dec_alg_aes_cbc(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_cbc_ovr_iv(void)
+static void crypto_test_dec_alg_aes_cbc_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_cbc_reference) /
sizeof(aes_cbc_reference[0]));
@@ -908,7 +908,7 @@ static int check_alg_aes_ctr(void)
* operation for AES128_CTR algorithm. IV for the operation is the session IV.
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.*/
-void crypto_test_enc_alg_aes_ctr(void)
+static void crypto_test_enc_alg_aes_ctr(void)
{
unsigned int test_vec_num = (sizeof(aes_ctr_reference) /
sizeof(aes_ctr_reference[0]));
@@ -926,7 +926,7 @@ void crypto_test_enc_alg_aes_ctr(void)
/* This test verifies the correctness of encode (plaintext -> ciphertext)
* operation for AES128_CTR algorithm. IV for the operation is the operation IV.
* */
-void crypto_test_enc_alg_aes_ctr_ovr_iv(void)
+static void crypto_test_enc_alg_aes_ctr_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_ctr_reference) /
sizeof(aes_ctr_reference[0]));
@@ -946,7 +946,7 @@ void crypto_test_enc_alg_aes_ctr_ovr_iv(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_ctr(void)
+static void crypto_test_dec_alg_aes_ctr(void)
{
unsigned int test_vec_num = (sizeof(aes_ctr_reference) /
sizeof(aes_ctr_reference[0]));
@@ -966,7 +966,7 @@ void crypto_test_dec_alg_aes_ctr(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_dec_alg_aes_ctr_ovr_iv(void)
+static void crypto_test_dec_alg_aes_ctr_ovr_iv(void)
{
unsigned int test_vec_num = (sizeof(aes_ctr_reference) /
sizeof(aes_ctr_reference[0]));
@@ -993,7 +993,7 @@ static int check_alg_hmac_md5(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_gen_alg_hmac_md5(void)
+static void crypto_test_gen_alg_hmac_md5(void)
{
unsigned int test_vec_num = (sizeof(hmac_md5_reference) /
sizeof(hmac_md5_reference[0]));
@@ -1007,7 +1007,7 @@ void crypto_test_gen_alg_hmac_md5(void)
false);
}
-void crypto_test_check_alg_hmac_md5(void)
+static void crypto_test_check_alg_hmac_md5(void)
{
unsigned int test_vec_num = (sizeof(hmac_md5_reference) /
sizeof(hmac_md5_reference[0]));
@@ -1033,7 +1033,7 @@ static int check_alg_hmac_sha1(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_gen_alg_hmac_sha1(void)
+static void crypto_test_gen_alg_hmac_sha1(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha1_reference) /
sizeof(hmac_sha1_reference[0]));
@@ -1047,7 +1047,7 @@ void crypto_test_gen_alg_hmac_sha1(void)
false);
}
-void crypto_test_check_alg_hmac_sha1(void)
+static void crypto_test_check_alg_hmac_sha1(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha1_reference) /
sizeof(hmac_sha1_reference[0]));
@@ -1073,7 +1073,7 @@ static int check_alg_hmac_sha256(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_gen_alg_hmac_sha256(void)
+static void crypto_test_gen_alg_hmac_sha256(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha256_reference) /
sizeof(hmac_sha256_reference[0]));
@@ -1087,7 +1087,7 @@ void crypto_test_gen_alg_hmac_sha256(void)
false);
}
-void crypto_test_check_alg_hmac_sha256(void)
+static void crypto_test_check_alg_hmac_sha256(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha256_reference) /
sizeof(hmac_sha256_reference[0]));
@@ -1113,7 +1113,7 @@ static int check_alg_hmac_sha512(void)
* In addition the test verifies if the implementation can use the
* packet buffer as completion event buffer.
* */
-void crypto_test_gen_alg_hmac_sha512(void)
+static void crypto_test_gen_alg_hmac_sha512(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha512_reference) /
sizeof(hmac_sha512_reference[0]));
@@ -1127,7 +1127,7 @@ void crypto_test_gen_alg_hmac_sha512(void)
false);
}
-void crypto_test_check_alg_hmac_sha512(void)
+static void crypto_test_check_alg_hmac_sha512(void)
{
unsigned int test_vec_num = (sizeof(hmac_sha512_reference) /
sizeof(hmac_sha512_reference[0]));
@@ -1146,7 +1146,7 @@ static int check_alg_aes_gmac(void)
return check_alg_support(ODP_CIPHER_ALG_NULL, ODP_AUTH_ALG_AES_GMAC);
}
-void crypto_test_gen_alg_aes_gmac(void)
+static void crypto_test_gen_alg_aes_gmac(void)
{
unsigned int test_vec_num = (sizeof(aes_gmac_reference) /
sizeof(aes_gmac_reference[0]));
@@ -1160,7 +1160,7 @@ void crypto_test_gen_alg_aes_gmac(void)
false);
}
-void crypto_test_check_alg_aes_gmac(void)
+static void crypto_test_check_alg_aes_gmac(void)
{
unsigned int test_vec_num = (sizeof(aes_gmac_reference) /
sizeof(aes_gmac_reference[0]));