progs/perftest.c: Use from Glibc syscall numbers.
[catacomb] / symm / Makefile.am
index 69c1013..e87d741 100644 (file)
@@ -32,6 +32,11 @@ nodist_libsymm_la_SOURCES =
 
 TEST_LIBS               = libsymm.la
 
+noinst_LTLIBRARIES     += libsymmtest.la
+libsymmtest_la_SOURCES  =
+libsymmtest_la_CFLAGS   = $(AM_CFLAGS) -DSRCDIR=\"$(srcdir)\"
+TEST_LIBS              += libsymmtest.la
+
 VPATH                  += $(srcdir)/modes
 
 ###--------------------------------------------------------------------------
@@ -63,16 +68,19 @@ $(srcdir)/modes.am: modes.am.in Makefile.am
                blkc="$(BLKCS)" \
                        blkcmode="$(BLKCMODES)" \
                        blkcciphermode="$(BLKCCIPHERMODES)" \
+                       blkcaeadmode="$(BLKCAEADMODES)" \
+                       blkcmacmode="$(BLKCMACMODES)" \
                hash="$(HASHES)" \
                        hashmode="$(HASHMODES)" \
                        hashciphermode="$(HASHCIPHERMODES)" \
                        hashmacmode="$(HASHMACMODES)"
 $(srcdir)/stubs.am: stubs.am.in Makefile.am
        $(AM_V_GEN)$(multigen) -g $(srcdir)/stubs.am.in $(srcdir)/stubs.am \
-               descr,hname,base="$(STUBS_HDR)" cname="$(STUBS_SRC)"
+               descr,hname,base="$(STUBS_HDR)" cname,cbase="$(STUBS_SRC)"
 
 ## Initialize lists of known classes.
 ALL_CIPHERS             = $(CIPHER_MODES)
+ALL_AEADS               = $(AEAD_MODES)
 ALL_HASHES              = $(HASHES)
 ALL_MACS                = $(MAC_MODES)
 
@@ -89,6 +97,12 @@ BLKCMODES             =
 BLKCCIPHERMODES                 =
 BLKCMODES              += $(BLKCCIPHERMODES)
 
+BLKCAEADMODES           =
+BLKCMODES              += $(BLKCAEADMODES)
+
+BLKCMACMODES            =
+BLKCMODES              += $(BLKCMACMODES)
+
 ## A tool for translating the AES-contest test vectors into a form our test
 ## rigs understand.
 EXTRA_DIST             += aes-trans
@@ -118,14 +132,15 @@ endif
 ## Adams and Tavares' `CAST' block ciphers.
 BLKCS                  += cast128 cast256
 libsymm_la_SOURCES     += cast-s.c cast-sk.c cast-base.h
-cast256.t$(EXEEXT): t/cast256
-EXTRA_DIST             += t/cast256.aes
+cast256.log: t/cast256
+EXTRA_DIST             += t/cast256.aes t/cast256.local
 MAINTAINERCLEANFILES   += $(srcdir)/t/cast256
-t/cast256: t/cast256.aes
-       $(AM_V_GEN)$(srcdir)/aes-trans CAST256 \
-               <$(srcdir)/t/cast256.aes \
-               >$(srcdir)/t/cast256.new && \
-       mv $(srcdir)/t/cast256.new $(srcdir)/t/cast256
+t/cast256: t/cast256.aes t/cast256.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./aes-trans CAST256 <t/cast256.aes && \
+                 cat t/cast256.local; \
+               } >t/cast256.new && \
+               mv t/cast256.new t/cast256
 
 ## IBM's `DES' block cipher, by Feistel, Coppersmith, and others.
 BLKCS                  += des des3
@@ -160,14 +175,15 @@ $(precomp)/symm/mars-tab.c:
        $(AM_V_GEN)./mars-mktab >$(precomp)/symm/mars-tab.c.new && \
                mv $(precomp)/symm/mars-tab.c.new $(precomp)/symm/mars-tab.c
 endif
-mars.t$(EXEEXT): t/mars
-EXTRA_DIST             += t/mars.aes
+mars.log: t/mars
+EXTRA_DIST             += t/mars.aes t/mars.local
 MAINTAINERCLEANFILES   += $(srcdir)/t/mars
-t/mars: t/mars.aes
-       $(AM_V_GEN)$(srcdir)/aes-trans Mars \
-               <$(srcdir)/t/mars.aes \
-               >$(srcdir)/t/mars.new && \
-       mv $(srcdir)/t/mars.new $(srcdir)/t/mars
+t/mars: t/mars.aes t/mars.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./aes-trans Mars <t/mars.aes && \
+                 cat t/mars.local; \
+               } >t/mars.new && \
+               mv t/mars.new t/mars
 
 ## Daemen, Peeters, Van Assche and Rijmen's `Noekeon'.
 BLKCS                  += noekeon
@@ -182,6 +198,20 @@ BLKCS                      += rc5
 ## Daemen and Rijmen's `Rijndael' block cipher, selected as AES.
 BLKCS                  += rijndael rijndael192 rijndael256
 libsymm_la_SOURCES     += rijndael-base.h rijndael-base.c
+if CPUFAM_X86
+libsymm_la_SOURCES     += rijndael-x86ish-aesni.S
+endif
+if CPUFAM_AMD64
+libsymm_la_SOURCES     += rijndael-x86ish-aesni.S
+endif
+if HAVE_AS_ARMV8_CRYPTO
+if CPUFAM_ARMEL
+libsymm_la_SOURCES     += rijndael-arm-crypto.S
+endif
+endif
+if CPUFAM_ARM64
+libsymm_la_SOURCES     += rijndael-arm64-crypto.S
+endif
 nodist_libsymm_la_SOURCES += ../precomp/symm/rijndael-tab.c
 PRECOMPS               += $(precomp)/symm/rijndael-tab.c
 PRECOMP_PROGS          += rijndael-mktab
@@ -193,14 +223,15 @@ $(precomp)/symm/rijndael-tab.c:
                mv $(precomp)/symm/rijndael-tab.c.new \
                        $(precomp)/symm/rijndael-tab.c
 endif
-rijndael.t$(EXEEXT): t/rijndael
-EXTRA_DIST             += t/rijndael.aes
+rijndael.log: t/rijndael
+EXTRA_DIST             += t/rijndael.aes t/rijndael.local
 MAINTAINERCLEANFILES   += $(srcdir)/t/rijndael
-t/rijndael: t/rijndael.aes
-       $(AM_V_GEN)$(srcdir)/aes-trans Rijndael \
-               <$(srcdir)/t/rijndael.aes \
-               >$(srcdir)/t/rijndael.new && \
-       mv $(srcdir)/t/rijndael.new $(srcdir)/t/rijndael
+t/rijndael: t/rijndael.aes t/rijndael.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./aes-trans Rijndael <t/rijndael.aes && \
+                 cat t/rijndael.local; \
+               } >t/rijndael.new && \
+               mv t/rijndael.new t/rijndael
 
 ## Massey's `SAFER' block ciphers.
 BLKCS                  += safer safersk
@@ -208,6 +239,7 @@ nodist_libsymm_la_SOURCES += ../precomp/symm/safer-tab.c
 PRECOMPS               += $(precomp)/symm/safer-tab.c
 PRECOMP_PROGS          += safer-mktab
 STUBS_HDR              += SAFER-SK,safersk,safer
+STUBS_SRC              += safersk,safer
 if !CROSS_COMPILING
 $(precomp)/symm/safer-tab.c:
        $(AM_V_at)$(MKDIR_P) $(precomp)/symm
@@ -222,14 +254,15 @@ BLKCS                     += serpent
 libsymm_la_SOURCES     += serpent-sbox.h
 check_PROGRAMS         += serpent-check
 TESTS                  += serpent-check
-serpent.t$(EXEEXT): t/serpent
-EXTRA_DIST             += t/serpent.aes
+serpent.log: t/serpent
+EXTRA_DIST             += t/serpent.aes t/serpent.local
 MAINTAINERCLEANFILES   += $(srcdir)/t/serpent
-t/serpent: t/serpent.aes
-       $(AM_V_GEN)$(srcdir)/aes-trans Serpent -v rev=1 \
-               <$(srcdir)/t/serpent.aes \
-               >$(srcdir)/t/serpent.new && \
-       mv $(srcdir)/t/serpent.new $(srcdir)/t/serpent
+t/serpent: t/serpent.aes t/serpent.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./aes-trans Serpent -v rev=1 <t/serpent.aes && \
+                 cat t/serpent.local; \
+               } >t/serpent.new && \
+               mv t/serpent.new t/serpent
 
 ## The National Security Agency's `Skipjack' block cipher.  You don't want to
 ## use this.
@@ -267,14 +300,15 @@ $(precomp)/symm/twofish-tab.c:
                mv $(precomp)/symm/twofish-tab.c.new \
                        $(precomp)/symm/twofish-tab.c
 endif
-twofish.t$(EXEEXT): t/twofish
-EXTRA_DIST             += t/twofish.aes
+twofish.log: t/twofish
+EXTRA_DIST             += t/twofish.aes t/twofish.local
 MAINTAINERCLEANFILES   += $(srcdir)/t/twofish
-t/twofish: t/twofish.aes
-       $(AM_V_GEN)$(srcdir)/aes-trans Twofish \
-               <$(srcdir)/t/twofish.aes \
-               >$(srcdir)/t/twofish.new && \
-       mv $(srcdir)/t/twofish.new $(srcdir)/t/twofish
+t/twofish: t/twofish.aes t/twofish.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./aes-trans Twofish <t/twofish.aes && \
+                 cat t/twofish.local; \
+               } >t/twofish.new && \
+               mv t/twofish.new t/twofish
 
 ## The old NIST modes for DES.
 BLKCCIPHERMODES                += cbc cfb ecb ofb
@@ -282,6 +316,29 @@ BLKCCIPHERMODES            += cbc cfb ecb ofb
 ## Counter mode.
 BLKCCIPHERMODES                += counter
 
+## CMAC mode.
+BLKCMACMODES           += cmac pmac1
+
+## Various AEAD modes.
+pkginclude_HEADERS     += ocb.h
+BLKCAEADMODES          += ccm eax gcm ocb1 ocb3
+libsymm_la_SOURCES     += ccm.c gcm.c ocb.c
+if CPUFAM_X86
+libsymm_la_SOURCES     += gcm-x86ish-pclmul.S
+endif
+if CPUFAM_AMD64
+libsymm_la_SOURCES     += gcm-x86ish-pclmul.S
+endif
+if CPUFAM_ARMEL
+libsymm_la_SOURCES     += gcm-arm-crypto.S
+endif
+if CPUFAM_ARM64
+libsymm_la_SOURCES     += gcm-arm64-pmull.S
+endif
+
+TESTS                  += gcm.t$(EXEEXT)
+EXTRA_DIST             += t/gcm
+
 ###--------------------------------------------------------------------------
 ### Hash functions.
 
@@ -316,9 +373,15 @@ HASHES                     += sha
 
 ## The National Security Agency's `SHA-2' suite.
 HASHES                 += sha224 sha256
-HASHES                 += sha384 sha512
+HASHES                 += sha384 sha512 sha512/224 sha512/256
 STUBS_HDR              += SHA-224,sha224,sha256
 STUBS_HDR              += SHA-384,sha384,sha512
+STUBS_HDR              += SHA-512/256,sha512-256,sha512
+STUBS_HDR              += SHA-512/224,sha512-224,sha512
+STUBS_SRC              += sha224,sha256
+STUBS_SRC              += sha384,sha512
+STUBS_SRC              += sha512-256,sha512
+STUBS_SRC              += sha512-224,sha512
 
 ## Anderson and Biham's `Tiger' hash function.
 HASHES                 += tiger
@@ -341,6 +404,7 @@ nodist_libsymm_la_SOURCES += ../precomp/symm/whirlpool-tab.c
 PRECOMPS               += $(precomp)/symm/whirlpool-tab.c
 PRECOMP_PROGS          += whirlpool-mktab
 STUBS_HDR              += Whirlpool-256,whirlpool256,whirlpool
+STUBS_SRC              += whirlpool256,whirlpool
 if !CROSS_COMPILING
 $(precomp)/symm/whirlpool-tab.c:
        $(AM_V_at)$(MKDIR_P) $(precomp)/symm
@@ -351,6 +415,73 @@ $(precomp)/symm/whirlpool-tab.c:
                        $(precomp)/symm/whirlpool-tab.c
 endif
 
+## Bertoni, Daemen, Peeters, and Van Assche's `Keccak', selected as the basis
+## for SHA-3.
+pkginclude_HEADERS     += keccak1600.h
+libsymm_la_SOURCES     += keccak1600.c
+TESTS                  += keccak1600.t$(EXEEXT)
+EXTRA_DIST             += t/keccak1600
+
+pkginclude_HEADERS     += sha3.h
+libsymm_la_SOURCES     += sha3.c
+
+HASHES                 += sha3-224 sha3-256 sha3-384 sha3-512
+STUBS_HDR              += SHA3-224,sha3-224,sha3
+STUBS_HDR              += SHA3-256,sha3-256,sha3
+STUBS_HDR              += SHA3-384,sha3-384,sha3
+STUBS_HDR              += SHA3-512,sha3-512,sha3
+STUBS_SRC              += sha3-224,sha3
+STUBS_SRC              += sha3-256,sha3
+STUBS_SRC              += sha3-384,sha3
+STUBS_SRC              += sha3-512,sha3
+
+STUBS_HDR              += SHAKE128,shake128,sha3
+STUBS_HDR              += SHAKE256,shake256,sha3
+
+STUBS_HDR              += SHAKE128-XOF,shake128-xof,sha3
+STUBS_HDR              += SHAKE256-XOF,shake256-xof,sha3
+
+STUBS_HDR              += KMAC128,kmac128,sha3
+STUBS_HDR              += KMAC256,kmac256,sha3
+
+ALL_HASHES             += shake128 shake256
+ALL_CIPHERS            += shake128-xof shake256-xof
+ALL_MACS               += kmac128 kmac256
+
+TESTS                  += sha3.t$(EXEEXT)
+SHA3_TESTS              = t/SHA3_224ShortMsg.rsp
+SHA3_TESTS             += t/SHA3_224LongMsg.rsp
+SHA3_TESTS             += t/SHA3_256ShortMsg.rsp
+SHA3_TESTS             += t/SHA3_256LongMsg.rsp
+SHA3_TESTS             += t/SHA3_384ShortMsg.rsp
+SHA3_TESTS             += t/SHA3_384LongMsg.rsp
+SHA3_TESTS             += t/SHA3_512ShortMsg.rsp
+SHA3_TESTS             += t/SHA3_512LongMsg.rsp
+SHA3_TESTS             += t/SHA3_224Monte.rsp
+SHA3_TESTS             += t/SHA3_256Monte.rsp
+SHA3_TESTS             += t/SHA3_384Monte.rsp
+SHA3_TESTS             += t/SHA3_512Monte.rsp
+SHA3_TESTS             += t/SHAKE128ShortMsg.rsp
+SHA3_TESTS             += t/SHAKE128LongMsg.rsp
+SHA3_TESTS             += t/SHAKE128VariableOut.rsp
+SHA3_TESTS             += t/SHAKE256ShortMsg.rsp
+SHA3_TESTS             += t/SHAKE256LongMsg.rsp
+SHA3_TESTS             += t/SHAKE256VariableOut.rsp
+EXTRA_DIST             += $(SHA3_TESTS) sha3-trans t/sha3.local t/sha3
+MAINTAINERCLEANFILES   += $(srcdir)/t/sha3
+sha3.log: t/sha3
+$(srcdir)/t/sha3: $(SHA3_TESTS) sha3-trans t/sha3.local
+       $(AM_V_GEN)cd $(srcdir) && \
+               { ./sha3-trans $(SHA3_TESTS); \
+                 cat t/sha3.local; } >t/sha3.new && \
+               mv t/sha3.new t/sha3
+
+## Mike Hamburg's STROBE protocol framework.
+pkginclude_HEADERS     += strobe.h
+libsymm_la_SOURCES     += strobe.c
+TESTS                  += strobe.t$(EXEEXT)
+EXTRA_DIST             += t/strobe
+
 ## Bellare, Canetti and Krawczyk's `HMAC' mode for message authentication.
 HASHMACMODES           += hmac
 
@@ -388,17 +519,33 @@ ALL_CIPHERS               += seal
 EXTRA_DIST             += salsa20-tvconv
 pkginclude_HEADERS     += salsa20.h salsa20-core.h
 libsymm_la_SOURCES     += salsa20.c
+if CPUFAM_X86
+libsymm_la_SOURCES     += salsa20-x86ish-sse2.S
+endif
+if CPUFAM_AMD64
+libsymm_la_SOURCES     += salsa20-x86ish-sse2.S
+endif
+if CPUFAM_ARMEL
+libsymm_la_SOURCES     += salsa20-arm-neon.S
+endif
+if CPUFAM_ARM64
+libsymm_la_SOURCES     += salsa20-arm64.S
+endif
 TESTS                  += salsa20.t$(EXEEXT)
 ALL_CIPHERS            += salsa20 salsa2012 salsa208
+ALL_CIPHERS            += salsa20-ietf salsa2012-ietf salsa208-ietf
 ALL_CIPHERS            += xsalsa20 xsalsa2012 xsalsa208
 STUBS_HDR              += Salsa20/12,salsa2012,salsa20
 STUBS_HDR              += Salsa20/8,salsa208,salsa20
+STUBS_HDR              += Salsa20-IETF,salsa20-ietf,salsa20
+STUBS_HDR              += Salsa20/12-IETF,salsa2012-ietf,salsa20
+STUBS_HDR              += Salsa20/8-IETF,salsa208-ietf,salsa20
 STUBS_HDR              += XSalsa20,xsalsa20,salsa20
 STUBS_HDR              += XSalsa20/12,xsalsa2012,salsa20
 STUBS_HDR              += XSalsa20/8,xsalsa208,salsa20
 EXTRA_DIST             += t/salsa20
 MAINTAINERCLEANFILES   += t/salsa20
-salsa20.t$(EXEEXT): t/salsa20
+salsa20.log: t/salsa20
 SALSA20_ESTREAM_TV      = t/salsa20.estream
 SALSA20_ESTREAM_TV     += t/salsa2012.estream
 SALSA20_ESTREAM_TV     += t/salsa208.estream
@@ -414,17 +561,74 @@ t/salsa20: salsa20-tvconv t/salsa20.local $(SALSA20_ESTREAM_TV)
 ## Bernstein's `ChaCha' stream cipher.
 pkginclude_HEADERS     += chacha.h chacha-core.h
 libsymm_la_SOURCES     += chacha.c
+if CPUFAM_X86
+libsymm_la_SOURCES     += chacha-x86ish-sse2.S
+endif
+if CPUFAM_AMD64
+libsymm_la_SOURCES     += chacha-x86ish-sse2.S
+endif
+if CPUFAM_ARMEL
+libsymm_la_SOURCES     += chacha-arm-neon.S
+endif
+if CPUFAM_ARM64
+libsymm_la_SOURCES     += chacha-arm64.S
+endif
 TESTS                  += chacha.t$(EXEEXT)
 EXTRA_DIST             += t/chacha
 ALL_CIPHERS            += chacha20 chacha12 chacha8
+ALL_CIPHERS            += chacha20-ietf chacha12-ietf chacha8-ietf
 ALL_CIPHERS            += xchacha20 xchacha12 xchacha8
 STUBS_HDR              += ChaCha20,chacha20,chacha
 STUBS_HDR              += ChaCha12,chacha12,chacha
 STUBS_HDR              += ChaCha8,chacha8,chacha
+STUBS_HDR              += ChaCha20-IETF,chacha20-ietf,chacha
+STUBS_HDR              += ChaCha12-IETF,chacha12-ietf,chacha
+STUBS_HDR              += ChaCha8-IETF,chacha8-ietf,chacha
 STUBS_HDR              += XChaCha20,xchacha20,chacha
 STUBS_HDR              += XChaCha12,xchacha12,chacha
 STUBS_HDR              += XChaCha8,xchacha8,chacha
 
+## Bernstein's `Poly1305' message authentication code.
+pkginclude_HEADERS     += poly1305.h
+libsymm_la_SOURCES     += poly1305.c
+TESTS                  += poly1305.t$(EXEEXT)
+TESTS                  += poly1305-p11.t$(EXEEXT)
+EXTRA_DIST             += t/poly1305 t/poly1305.slow
+
+check_PROGRAMS         += poly1305-p11.t
+poly1305_p11_t_SOURCES  = poly1305.c
+poly1305_p11_t_CPPFLAGS         = $(AM_CPPFLAGS) -DTEST_RIG -DSRCDIR="\"$(srcdir)\""
+poly1305_p11_t_CPPFLAGS        += -DPOLY1305_IMPL=11
+poly1305_p11_t_LDFLAGS  = $(TEST_LDFLAGS)
+poly1305_p11_t_LDADD    = $(TEST_LIBS) $(top_builddir)/libcatacomb.la
+poly1305_p11_t_LDADD   += $(mLib_LIBS) $(CATACOMB_LIBS) $(LIBS)
+
+## Combining Salsa20/ChaCha with Poly1305.
+pkginclude_HEADERS     += latinpoly.h latinpoly-def.h
+libsymm_la_SOURCES     += latinpoly.c chacha-poly1305.c salsa20-poly1305.c
+libsymmtest_la_SOURCES += latinpoly-test.c latinpoly-test.h
+
+ALL_AEADS              += chacha20-poly1305 salsa20-poly1305
+ALL_AEADS              += chacha12-poly1305 salsa2012-poly1305
+ALL_AEADS              += chacha8-poly1305 salsa208-poly1305
+ALL_AEADS              += chacha20-naclbox salsa20-naclbox
+ALL_AEADS              += chacha12-naclbox salsa2012-naclbox
+ALL_AEADS              += chacha8-naclbox salsa208-naclbox
+STUBS_HDR              += ChaCha20-Poly1305,chacha20-poly1305,latinpoly
+STUBS_HDR              += ChaCha12-Poly1305,chacha12-poly1305,latinpoly
+STUBS_HDR              += ChaCha8-Poly1305,chacha8-poly1305,latinpoly
+STUBS_HDR              += Salsa20-Poly1305,salsa20-poly1305,latinpoly
+STUBS_HDR              += Salsa20/12-Poly1305,salsa2012-poly1305,latinpoly
+STUBS_HDR              += Salsa20/8-Poly1305,salsa208-poly1305,latinpoly
+STUBS_HDR              += ChaCha20-NaClBox,chacha20-naclbox,latinpoly
+STUBS_HDR              += ChaCha12-NaClBox,chacha12-naclbox,latinpoly
+STUBS_HDR              += ChaCha8-NaClBox,chacha8-naclbox,latinpoly
+STUBS_HDR              += Salsa20-NaClBox,salsa20-naclbox,latinpoly
+STUBS_HDR              += Salsa20/12-NaClBox,salsa2012-naclbox,latinpoly
+STUBS_HDR              += Salsa20/8-NaClBox,salsa208-naclbox,latinpoly
+TESTS                  += chacha-poly1305.t$(EXEEXT)
+TESTS                  += salsa20-poly1305.t$(EXEEXT)
+
 ###--------------------------------------------------------------------------
 ### Autogenerated mode implementations.
 
@@ -435,16 +639,16 @@ MAINTAINERCLEANFILES      += modes/gen-stamp
 modes/gen-stamp: Makefile.am
        $(AM_V_at)$(MKDIR_P) $(srcdir)/modes
        $(AM_V_GEN)$(multigen) -g $(srcdir)/mode.c.in \
-               $(srcdir)/modes/@base-@mode.c \
+               $(srcdir)/modes/@{base:f}-@mode.c \
                base="$(BLKCS)" mode="$(BLKCMODES)"
        $(AM_V_at)$(multigen) -g $(srcdir)/mode.h.in \
-               $(srcdir)/modes/@base-@mode.h \
+               $(srcdir)/modes/@{base:f}-@mode.h \
                base="$(BLKCS)" mode="$(BLKCMODES)"
        $(AM_V_at)$(multigen) -g $(srcdir)/mode.c.in \
-               $(srcdir)/modes/@base-@mode.c \
+               $(srcdir)/modes/@{base:f}-@mode.c \
                base="$(HASHES)" mode="$(HASHMODES)"
        $(AM_V_at)$(multigen) -g $(srcdir)/mode.h.in \
-               $(srcdir)/modes/@base-@mode.h \
+               $(srcdir)/modes/@{base:f}-@mode.h \
                base="$(HASHES)" mode="$(HASHMODES)"
        $(AM_V_at)touch $(srcdir)/modes/gen-stamp
 
@@ -463,6 +667,9 @@ MAINTAINERCLEANFILES        += $(GENMODES_H)
 pkginclude_HEADERS     += $(GENMODES_H)
 $(GENMODES_H): modes/gen-stamp
 
+## Additional test machinery.
+libsymmtest_la_SOURCES += modes-test.c modes-test.h
+
 ###--------------------------------------------------------------------------
 ### Autogenerated stub headers.
 
@@ -475,7 +682,7 @@ stubs.gen-stamp: Makefile.am
        $(AM_V_GEN)$(multigen) -g $(srcdir)/stub.h.in \
                $(srcdir)/@name.h descr,name,base="$(STUBS_HDR)"
        $(AM_V_GEN)$(multigen) -g $(srcdir)/stub.c.in \
-               $(srcdir)/@name.c name="$(STUBS_SRC)"
+               $(srcdir)/@name.c name,base="$(STUBS_SRC)"
        $(AM_V_at)touch $(srcdir)/stubs.gen-stamp
 
 ## Generated stub headers.
@@ -498,6 +705,15 @@ gciphertab.c: gthingtab.c.in Makefile.am
        $(AM_V_GEN)$(multigen) -g $(srcdir)/gthingtab.c.in gciphertab.c \
                what=gcipher cls=gccipher thing="$(ALL_CIPHERS)"
 
+## Table of AEAD classes.
+pkginclude_HEADERS     += gaead.h
+CLEANFILES             += gaeadtab.c
+libsymm_la_SOURCES     += gaead.c
+nodist_libsymm_la_SOURCES += gaeadtab.c
+gaeadtab.c: gthingtab.c.in Makefile.am
+       $(AM_V_GEN)$(multigen) -g $(srcdir)/gthingtab.c.in gaeadtab.c \
+               what=gaead cls=gcaead thing="$(ALL_AEADS)"
+
 ## Table of hash classes.
 pkginclude_HEADERS     += ghash.h ghash-def.h
 CLEANFILES             += ghashtab.c
@@ -520,9 +736,13 @@ gmactab.c: gthingtab.c.in Makefile.am
 ## Run the test programs.
 TESTS                  += $(SYMM_TESTS)
 EXTRA_DIST             += $(SYMM_TEST_FILES)
+EXTRA_DIST             += $(REGRESSION_TEST_FILES)
 
-## A piece of sample text for round-trip testing encryption modes.
-EXTRA_DIST             += daftstory.h
+t/modes/%.regress:
+       $(MAKE) modes/$*.t && \
+               mkdir -p $(srcdir)/t/modes/ && \
+               modes/$*.t -o$(srcdir)/$@.new && \
+               mv $(srcdir)/$@.new $(srcdir)/$@
 
 ## Clean the debris from the `modes' subdirectory.
 CLEANFILES             += modes/*.to modes/*.t$(EXEEXT)