/* SPDX-License-Identifier: GPL-2.0 */ /* * Copyright (C) 2021, Stephan Mueller */ #ifndef _CRYPTO_KDF_SELFTEST_H #define _CRYPTO_KDF_SELFTEST_H #include #include struct kdf_testvec { unsigned char *key; size_t keylen; unsigned char *ikm; size_t ikmlen; struct kvec info; unsigned char *expected; size_t expectedlen; }; static inline int kdf_test(const struct kdf_testvec *test, const char *name, int (*crypto_kdf_setkey)(struct crypto_shash *kmd, const u8 *key, size_t keylen, const u8 *ikm, size_t ikmlen), int (*crypto_kdf_generate)(struct crypto_shash *kmd, const struct kvec *info, unsigned int info_nvec, u8 *dst, unsigned int dlen)) { struct crypto_shash *kmd; int ret; u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL); if (!buf) return -ENOMEM; kmd = crypto_alloc_shash(name, 0, 0); if (IS_ERR(kmd)) { pr_err("alg: kdf: could not allocate hash handle for %s\n", name); kfree(buf); return -ENOMEM; } ret = crypto_kdf_setkey(kmd, test->key, test->keylen, test->ikm, test->ikmlen); if (ret) { pr_err("alg: kdf: could not set key derivation key\n"); goto err; } ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen); if (ret) { pr_err("alg: kdf: could not obtain key data\n"); goto err; } ret = memcmp(test->expected, buf, test->expectedlen); if (ret) ret = -EINVAL; err: crypto_free_shash(kmd); kfree(buf); return ret; } #endif /* _CRYPTO_KDF_SELFTEST_H */