Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 35351988 authored by Stephan Mueller's avatar Stephan Mueller Committed by Herbert Xu
Browse files

crypto: keywrap - add testmgr support



The testmanager code for symmetric ciphers is extended to allow
verification of the IV after a cipher operation.

In addition, test vectors for kw(aes) for encryption and decryption are
added.

Signed-off-by: default avatarStephan Mueller <smueller@chronox.de>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 1c49678e
Loading
Loading
Loading
Loading
+16 −0
Original line number Diff line number Diff line
@@ -3286,6 +3286,22 @@ static const struct alg_test_desc alg_test_descs[] = {
		.alg = "jitterentropy_rng",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "kw(aes)",
		.test = alg_test_skcipher,
		.fips_allowed = 1,
		.suite = {
			.cipher = {
				.enc = {
					.vecs = aes_kw_enc_tv_template,
					.count = ARRAY_SIZE(aes_kw_enc_tv_template)
				},
				.dec = {
					.vecs = aes_kw_dec_tv_template,
					.count = ARRAY_SIZE(aes_kw_dec_tv_template)
				}
			}
		}
	}, {
		.alg = "lrw(aes)",
		.test = alg_test_skcipher,
+40 −0
Original line number Diff line number Diff line
@@ -23832,6 +23832,46 @@ static struct aead_testvec rfc7539esp_dec_tv_template[] = {
	},
};
/*
 * All key wrapping test vectors taken from
 * http://csrc.nist.gov/groups/STM/cavp/documents/mac/kwtestvectors.zip
 *
 * Note: as documented in keywrap.c, the ivout for encryption is the first
 * semiblock of the ciphertext from the test vector. For decryption, iv is
 * the first semiblock of the ciphertext.
 */
static struct cipher_testvec aes_kw_enc_tv_template[] = {
	{
		.key	= "\x75\x75\xda\x3a\x93\x60\x7c\xc2"
			  "\xbf\xd8\xce\xc7\xaa\xdf\xd9\xa6",
		.klen	= 16,
		.input	= "\x42\x13\x6d\x3c\x38\x4a\x3e\xea"
			  "\xc9\x5a\x06\x6f\xd2\x8f\xed\x3f",
		.ilen	= 16,
		.result	= "\xf6\x85\x94\x81\x6f\x64\xca\xa3"
			  "\xf5\x6f\xab\xea\x25\x48\xf5\xfb",
		.rlen	= 16,
		.iv_out	= "\x03\x1f\x6b\xd7\xe6\x1e\x64\x3d",
	},
};
static struct cipher_testvec aes_kw_dec_tv_template[] = {
	{
		.key	= "\x80\xaa\x99\x73\x27\xa4\x80\x6b"
			  "\x6a\x7a\x41\xa5\x2b\x86\xc3\x71"
			  "\x03\x86\xf9\x32\x78\x6e\xf7\x96"
			  "\x76\xfa\xfb\x90\xb8\x26\x3c\x5f",
		.klen	= 32,
		.input	= "\xd3\x3d\x3d\x97\x7b\xf0\xa9\x15"
			  "\x59\xf9\x9c\x8a\xcd\x29\x3d\x43",
		.ilen	= 16,
		.result	= "\x0a\x25\x6b\xa7\x5c\xfa\x03\xaa"
			  "\xa0\x2b\xa9\x42\x03\xf1\x5b\xaa",
		.rlen	= 16,
		.iv	= "\x42\x3c\x96\x0d\x8a\x2a\xc4\xc1",
	},
};
/*
 * ANSI X9.31 Continuous Pseudo-Random Number Generator (AES mode)
 * test vectors, taken from Appendix B.2.9 and B.2.10: