Path: blob/master/include/crypto/internal/kdf_selftest.h
26292 views
/* SPDX-License-Identifier: GPL-2.0 */12/*3* Copyright (C) 2021, Stephan Mueller <[email protected]>4*/56#ifndef _CRYPTO_KDF_SELFTEST_H7#define _CRYPTO_KDF_SELFTEST_H89#include <crypto/hash.h>10#include <linux/uio.h>1112struct kdf_testvec {13unsigned char *key;14size_t keylen;15unsigned char *ikm;16size_t ikmlen;17struct kvec info;18unsigned char *expected;19size_t expectedlen;20};2122static inline int23kdf_test(const struct kdf_testvec *test, const char *name,24int (*crypto_kdf_setkey)(struct crypto_shash *kmd,25const u8 *key, size_t keylen,26const u8 *ikm, size_t ikmlen),27int (*crypto_kdf_generate)(struct crypto_shash *kmd,28const struct kvec *info,29unsigned int info_nvec,30u8 *dst, unsigned int dlen))31{32struct crypto_shash *kmd;33int ret;34u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL);3536if (!buf)37return -ENOMEM;3839kmd = crypto_alloc_shash(name, 0, 0);40if (IS_ERR(kmd)) {41pr_err("alg: kdf: could not allocate hash handle for %s\n",42name);43kfree(buf);44return -ENOMEM;45}4647ret = crypto_kdf_setkey(kmd, test->key, test->keylen,48test->ikm, test->ikmlen);49if (ret) {50pr_err("alg: kdf: could not set key derivation key\n");51goto err;52}5354ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen);55if (ret) {56pr_err("alg: kdf: could not obtain key data\n");57goto err;58}5960ret = memcmp(test->expected, buf, test->expectedlen);61if (ret)62ret = -EINVAL;6364err:65crypto_free_shash(kmd);66kfree(buf);67return ret;68}6970#endif /* _CRYPTO_KDF_SELFTEST_H */717273