| Index: srtp/crypto/test/stat_driver.c
 | 
| diff --git a/srtp/crypto/test/stat_driver.c b/srtp/crypto/test/stat_driver.c
 | 
| index 4ff2b142616395527e9a4f1cb5f1e8a12a76ed14..962f7484a913703bb3301be7191346c170838dd5 100644
 | 
| --- a/srtp/crypto/test/stat_driver.c
 | 
| +++ b/srtp/crypto/test/stat_driver.c
 | 
| @@ -43,10 +43,15 @@
 | 
|   *
 | 
|   */
 | 
|  
 | 
| +#ifdef HAVE_CONFIG_H
 | 
| +    #include <config.h>
 | 
| +#endif
 | 
| +
 | 
|  #include <stdio.h>         /* for printf() */
 | 
|  
 | 
|  #include "err.h"
 | 
|  #include "stat.h"
 | 
| +#include "srtp.h"
 | 
|  
 | 
|  #include "cipher.h"
 | 
|  
 | 
| @@ -67,10 +72,14 @@ err_check(err_status_t s) {
 | 
|  
 | 
|  int
 | 
|  main (int argc, char *argv[]) {
 | 
| -  uint8_t buffer[2500];
 | 
| +  uint8_t buffer[2532];
 | 
|    unsigned int buf_len = 2500;
 | 
|    int i, j;
 | 
|    extern cipher_type_t aes_icm;
 | 
| +#ifdef OPENSSL
 | 
| +  extern cipher_type_t aes_gcm_128_openssl;
 | 
| +  extern cipher_type_t aes_gcm_256_openssl;
 | 
| +#endif
 | 
|    cipher_t *c;
 | 
|    uint8_t key[46] = {
 | 
|      0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 
 | 
| @@ -86,6 +95,7 @@ main (int argc, char *argv[]) {
 | 
|  
 | 
|    printf("statistical tests driver\n");
 | 
|  
 | 
| +  v128_set_to_zero(&nonce);
 | 
|    for (i=0; i < 2500; i++)
 | 
|      buffer[i] = 0;
 | 
|  
 | 
| @@ -106,9 +116,9 @@ main (int argc, char *argv[]) {
 | 
|    /* set buffer to cipher output */
 | 
|    for (i=0; i < 2500; i++)
 | 
|      buffer[i] = 0;
 | 
| -  err_check(cipher_type_alloc(&aes_icm, &c, 30));
 | 
| -  err_check(cipher_init(c, key, direction_encrypt));
 | 
| -  err_check(cipher_set_iv(c, &nonce));
 | 
| +  err_check(cipher_type_alloc(&aes_icm, &c, 30, 0));
 | 
| +  err_check(cipher_init(c, key));
 | 
| +  err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
|    err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
|    /* run tests on cipher outout */
 | 
|    printf("monobit %d\n", stat_test_monobit(buffer));
 | 
| @@ -123,7 +133,7 @@ main (int argc, char *argv[]) {
 | 
|      for (i=0; i < 2500; i++)
 | 
|        buffer[i] = 0;
 | 
|      nonce.v32[3] = i;
 | 
| -    err_check(cipher_set_iv(c, &nonce));
 | 
| +    err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
|      err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
|      if (stat_test_runs(buffer)) {
 | 
|        num_fail++;
 | 
| @@ -140,9 +150,9 @@ main (int argc, char *argv[]) {
 | 
|    /* set buffer to cipher output */
 | 
|    for (i=0; i < 2500; i++)
 | 
|      buffer[i] = 0;
 | 
| -  err_check(cipher_type_alloc(&aes_icm, &c, 46));
 | 
| -  err_check(cipher_init(c, key, direction_encrypt));
 | 
| -  err_check(cipher_set_iv(c, &nonce));
 | 
| +  err_check(cipher_type_alloc(&aes_icm, &c, 46, 0));
 | 
| +  err_check(cipher_init(c, key));
 | 
| +  err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
|    err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
|    /* run tests on cipher outout */
 | 
|    printf("monobit %d\n", stat_test_monobit(buffer));
 | 
| @@ -157,13 +167,75 @@ main (int argc, char *argv[]) {
 | 
|      for (i=0; i < 2500; i++)
 | 
|        buffer[i] = 0;
 | 
|      nonce.v32[3] = i;
 | 
| -    err_check(cipher_set_iv(c, &nonce));
 | 
| +    err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
|      err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
|      if (stat_test_runs(buffer)) {
 | 
|        num_fail++;
 | 
|      }
 | 
|    }
 | 
|  
 | 
| +#ifdef OPENSSL
 | 
| +  {
 | 
| +    printf("running stat_tests on AES-128-GCM, expecting success\n");
 | 
| +    /* set buffer to cipher output */
 | 
| +    for (i=0; i < 2500; i++) {
 | 
| +	buffer[i] = 0;
 | 
| +    }
 | 
| +    err_check(cipher_type_alloc(&aes_gcm_128_openssl, &c, AES_128_GCM_KEYSIZE_WSALT, 8));
 | 
| +    err_check(cipher_init(c, key));
 | 
| +    err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
| +    err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
| +    /* run tests on cipher outout */
 | 
| +    printf("monobit %d\n", stat_test_monobit(buffer));
 | 
| +    printf("poker   %d\n", stat_test_poker(buffer));
 | 
| +    printf("runs    %d\n", stat_test_runs(buffer));
 | 
| +    fflush(stdout);
 | 
| +    num_fail = 0;
 | 
| +    v128_set_to_zero(&nonce);
 | 
| +    for(j=0; j < num_trials; j++) {
 | 
| +	for (i=0; i < 2500; i++) {
 | 
| +	    buffer[i] = 0;
 | 
| +	}
 | 
| +	nonce.v32[3] = i;
 | 
| +	err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
| +	err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
| +	buf_len = 2500;
 | 
| +	if (stat_test_runs(buffer)) {
 | 
| +	    num_fail++;
 | 
| +	}
 | 
| +    }
 | 
| +
 | 
| +    printf("running stat_tests on AES-256-GCM, expecting success\n");
 | 
| +    /* set buffer to cipher output */
 | 
| +    for (i=0; i < 2500; i++) {
 | 
| +	buffer[i] = 0;
 | 
| +    }
 | 
| +    err_check(cipher_type_alloc(&aes_gcm_256_openssl, &c, AES_256_GCM_KEYSIZE_WSALT, 16));
 | 
| +    err_check(cipher_init(c, key));
 | 
| +    err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
| +    err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
| +    /* run tests on cipher outout */
 | 
| +    printf("monobit %d\n", stat_test_monobit(buffer));
 | 
| +    printf("poker   %d\n", stat_test_poker(buffer));
 | 
| +    printf("runs    %d\n", stat_test_runs(buffer));
 | 
| +    fflush(stdout);
 | 
| +    num_fail = 0;
 | 
| +    v128_set_to_zero(&nonce);
 | 
| +    for(j=0; j < num_trials; j++) {
 | 
| +	for (i=0; i < 2500; i++) {
 | 
| +	    buffer[i] = 0;
 | 
| +	}
 | 
| +	nonce.v32[3] = i;
 | 
| +	err_check(cipher_set_iv(c, &nonce, direction_encrypt));
 | 
| +	err_check(cipher_encrypt(c, buffer, &buf_len));
 | 
| +	buf_len = 2500;
 | 
| +	if (stat_test_runs(buffer)) {
 | 
| +	    num_fail++;
 | 
| +	}
 | 
| +    }
 | 
| +  }
 | 
| +#endif
 | 
| +
 | 
|    printf("%d failures in %d tests\n", num_fail, num_trials);
 | 
|    printf("(nota bene: a small fraction of stat_test failures does not \n"
 | 
|  	 "indicate that the random source is invalid)\n");
 | 
| 
 |