| Server IP : 54.94.228.101 / Your IP : 172.28.1.13 Web Server : Apache System : Linux ip-172-28-29-189 6.5.0-1014-aws #14~22.04.1-Ubuntu SMP Thu Feb 15 15:27:06 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 7.2.34-43+ubuntu22.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /lib/modules/6.5.0-1014-aws/build/include/crypto/internal/ |
Upload File : |
/* SPDX-License-Identifier: GPL-2.0 */
/*
* Copyright (C) 2021, Stephan Mueller <smueller@chronox.de>
*/
#ifndef _CRYPTO_KDF_SELFTEST_H
#define _CRYPTO_KDF_SELFTEST_H
#include <crypto/hash.h>
#include <linux/uio.h>
struct kdf_testvec {
unsigned char *key;
size_t keylen;
unsigned char *ikm;
size_t ikmlen;
struct kvec info;
unsigned char *expected;
size_t expectedlen;
};
static inline int
kdf_test(const struct kdf_testvec *test, const char *name,
int (*crypto_kdf_setkey)(struct crypto_shash *kmd,
const u8 *key, size_t keylen,
const u8 *ikm, size_t ikmlen),
int (*crypto_kdf_generate)(struct crypto_shash *kmd,
const struct kvec *info,
unsigned int info_nvec,
u8 *dst, unsigned int dlen))
{
struct crypto_shash *kmd;
int ret;
u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL);
if (!buf)
return -ENOMEM;
kmd = crypto_alloc_shash(name, 0, 0);
if (IS_ERR(kmd)) {
pr_err("alg: kdf: could not allocate hash handle for %s\n",
name);
kfree(buf);
return -ENOMEM;
}
ret = crypto_kdf_setkey(kmd, test->key, test->keylen,
test->ikm, test->ikmlen);
if (ret) {
pr_err("alg: kdf: could not set key derivation key\n");
goto err;
}
ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen);
if (ret) {
pr_err("alg: kdf: could not obtain key data\n");
goto err;
}
ret = memcmp(test->expected, buf, test->expectedlen);
if (ret)
ret = -EINVAL;
err:
crypto_free_shash(kmd);
kfree(buf);
return ret;
}
#endif /* _CRYPTO_KDF_SELFTEST_H */