Server IP : 15.235.198.142 / Your IP : 216.73.216.74 Web Server : Apache/2.4.58 (Ubuntu) System : Linux ballsack 6.8.0-45-generic #45-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 30 12:02:04 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 8.3.6 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /usr/src/linux-headers-6.8.0-45/include/crypto/internal/ |
Upload File : |
/* SPDX-License-Identifier: GPL-2.0 */ /* * Copyright (C) 2021, Stephan Mueller <smueller@chronox.de> */ #ifndef _CRYPTO_KDF_SELFTEST_H #define _CRYPTO_KDF_SELFTEST_H #include <crypto/hash.h> #include <linux/uio.h> struct kdf_testvec { unsigned char *key; size_t keylen; unsigned char *ikm; size_t ikmlen; struct kvec info; unsigned char *expected; size_t expectedlen; }; static inline int kdf_test(const struct kdf_testvec *test, const char *name, int (*crypto_kdf_setkey)(struct crypto_shash *kmd, const u8 *key, size_t keylen, const u8 *ikm, size_t ikmlen), int (*crypto_kdf_generate)(struct crypto_shash *kmd, const struct kvec *info, unsigned int info_nvec, u8 *dst, unsigned int dlen)) { struct crypto_shash *kmd; int ret; u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL); if (!buf) return -ENOMEM; kmd = crypto_alloc_shash(name, 0, 0); if (IS_ERR(kmd)) { pr_err("alg: kdf: could not allocate hash handle for %s\n", name); kfree(buf); return -ENOMEM; } ret = crypto_kdf_setkey(kmd, test->key, test->keylen, test->ikm, test->ikmlen); if (ret) { pr_err("alg: kdf: could not set key derivation key\n"); goto err; } ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen); if (ret) { pr_err("alg: kdf: could not obtain key data\n"); goto err; } ret = memcmp(test->expected, buf, test->expectedlen); if (ret) ret = -EINVAL; err: crypto_free_shash(kmd); kfree(buf); return ret; } #endif /* _CRYPTO_KDF_SELFTEST_H */