Skip to content

Commit 030218d

Browse files
abajkherbertx
authored andcommitted
crypto: testmgr - Add test vectors for authenc(hmac(sha384),cbc(aes))
Test vectors were generated starting from existing CBC(AES) test vectors (RFC3602, NIST SP800-38A) and adding HMAC(SHA384) computed with Python script. Then, the results were double-checked on Mediatek MT7981 (safexcel) and NXP P2020 (talitos). Both platforms pass self-tests. Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
1 parent cc2f39d commit 030218d

2 files changed

Lines changed: 318 additions & 0 deletions

File tree

crypto/testmgr.c

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4178,6 +4178,13 @@ static const struct alg_test_desc alg_test_descs[] = {
41784178
.alg = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
41794179
.test = alg_test_null,
41804180
.fips_allowed = 1,
4181+
}, {
4182+
.alg = "authenc(hmac(sha384),cbc(aes))",
4183+
.generic_driver = "authenc(hmac-sha384-lib,cbc(aes-generic))",
4184+
.test = alg_test_aead,
4185+
.suite = {
4186+
.aead = __VECS(hmac_sha384_aes_cbc_tv_temp)
4187+
}
41814188
}, {
41824189
.alg = "authenc(hmac(sha384),cbc(des))",
41834190
.generic_driver = "authenc(hmac-sha384-lib,cbc(des-generic))",

crypto/testmgr.h

Lines changed: 311 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16574,6 +16574,317 @@ static const struct aead_testvec hmac_sha256_aes_cbc_tv_temp[] = {
1657416574
},
1657516575
};
1657616576

16577+
static const struct aead_testvec hmac_sha384_aes_cbc_tv_temp[] = {
16578+
{ /* RFC 3602 Case 1 */
16579+
#ifdef __LITTLE_ENDIAN
16580+
.key = "\x08\x00" /* rta length */
16581+
"\x01\x00" /* rta type */
16582+
#else
16583+
.key = "\x00\x08" /* rta length */
16584+
"\x00\x01" /* rta type */
16585+
#endif
16586+
"\x00\x00\x00\x10" /* enc key length */
16587+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16588+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16589+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16590+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16591+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16592+
"\x00\x00\x00\x00\x00\x00\x00\x00"
16593+
"\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
16594+
"\x51\x2e\x03\xd5\x34\x12\x00\x06",
16595+
.klen = 8 + 48 + 16,
16596+
.iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
16597+
"\xb4\x22\xda\x80\x2c\x9f\xac\x41",
16598+
.assoc = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
16599+
"\xb4\x22\xda\x80\x2c\x9f\xac\x41",
16600+
.alen = 16,
16601+
.ptext = "Single block msg",
16602+
.plen = 16,
16603+
.ctext = "\xe3\x53\x77\x9c\x10\x79\xae\xb8"
16604+
"\x27\x08\x94\x2d\xbe\x77\x18\x1a"
16605+
"\x79\x1c\xf1\x22\x95\x80\xe0\x60"
16606+
"\x7f\xf9\x92\x60\x83\xbd\x60\x9c"
16607+
"\xf6\x62\x8b\xa9\x7d\x56\xe2\xaf"
16608+
"\x80\x43\xbc\x41\x4a\x63\x0b\xa0"
16609+
"\x16\x25\xe2\xfe\x0a\x96\xf6\xa5"
16610+
"\x6c\x0b\xc2\x53\xb4\x27\xd9\x42",
16611+
.clen = 16 + 48,
16612+
}, { /* RFC 3602 Case 2 */
16613+
#ifdef __LITTLE_ENDIAN
16614+
.key = "\x08\x00" /* rta length */
16615+
"\x01\x00" /* rta type */
16616+
#else
16617+
.key = "\x00\x08" /* rta length */
16618+
"\x00\x01" /* rta type */
16619+
#endif
16620+
"\x00\x00\x00\x10" /* enc key length */
16621+
"\x20\x21\x22\x23\x24\x25\x26\x27"
16622+
"\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f"
16623+
"\x30\x31\x32\x33\x34\x35\x36\x37"
16624+
"\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f"
16625+
"\x40\x41\x42\x43\x44\x45\x46\x47"
16626+
"\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"
16627+
"\xc2\x86\x69\x6d\x88\x7c\x9a\xa0"
16628+
"\x61\x1b\xbb\x3e\x20\x25\xa4\x5a",
16629+
.klen = 8 + 48 + 16,
16630+
.iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28"
16631+
"\xdd\xb3\xba\x69\x5a\x2e\x6f\x58",
16632+
.assoc = "\x56\x2e\x17\x99\x6d\x09\x3d\x28"
16633+
"\xdd\xb3\xba\x69\x5a\x2e\x6f\x58",
16634+
.alen = 16,
16635+
.ptext = "\x00\x01\x02\x03\x04\x05\x06\x07"
16636+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
16637+
"\x10\x11\x12\x13\x14\x15\x16\x17"
16638+
"\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f",
16639+
.plen = 32,
16640+
.ctext = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a"
16641+
"\x3a\x86\x30\x28\xb5\xe1\xdc\x0a"
16642+
"\x75\x86\x60\x2d\x25\x3c\xff\xf9"
16643+
"\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1"
16644+
"\x4e\x5b\xa8\x65\x51\xc6\x58\xaf"
16645+
"\x31\x57\x50\x3d\x01\xa1\xa4\x3f"
16646+
"\x42\xd1\xd7\x31\x76\x8d\xf8\xc8"
16647+
"\xe4\xd2\x7e\xc5\x23\xe7\xc6\x2e"
16648+
"\x2d\xfd\x9d\xc1\xac\x50\x1e\xcf"
16649+
"\xa0\x10\xeb\x1a\x9c\xb7\xe1\xca",
16650+
.clen = 32 + 48,
16651+
}, { /* RFC 3602 Case 3 */
16652+
#ifdef __LITTLE_ENDIAN
16653+
.key = "\x08\x00" /* rta length */
16654+
"\x01\x00" /* rta type */
16655+
#else
16656+
.key = "\x00\x08" /* rta length */
16657+
"\x00\x01" /* rta type */
16658+
#endif
16659+
"\x00\x00\x00\x10" /* enc key length */
16660+
"\x11\x22\x33\x44\x55\x66\x77\x88"
16661+
"\x99\xaa\xbb\xcc\xdd\xee\xff\x11"
16662+
"\x22\x33\x44\x55\x66\x77\x88\x99"
16663+
"\xaa\xbb\xcc\xdd\xee\xff\x11\x22"
16664+
"\x33\x44\x55\x66\x77\x88\x99\xaa"
16665+
"\xbb\xcc\xdd\xee\xff\x11\x22\x33"
16666+
"\x6c\x3e\xa0\x47\x76\x30\xce\x21"
16667+
"\xa2\xce\x33\x4a\xa7\x46\xc2\xcd",
16668+
.klen = 8 + 48 + 16,
16669+
.iv = "\xc7\x82\xdc\x4c\x09\x8c\x66\xcb"
16670+
"\xd9\xcd\x27\xd8\x25\x68\x2c\x81",
16671+
.assoc = "\xc7\x82\xdc\x4c\x09\x8c\x66\xcb"
16672+
"\xd9\xcd\x27\xd8\x25\x68\x2c\x81",
16673+
.alen = 16,
16674+
.ptext = "This is a 48-byte message (exactly 3 AES blocks)",
16675+
.plen = 48,
16676+
.ctext = "\xd0\xa0\x2b\x38\x36\x45\x17\x53"
16677+
"\xd4\x93\x66\x5d\x33\xf0\xe8\x86"
16678+
"\x2d\xea\x54\xcd\xb2\x93\xab\xc7"
16679+
"\x50\x69\x39\x27\x67\x72\xf8\xd5"
16680+
"\x02\x1c\x19\x21\x6b\xad\x52\x5c"
16681+
"\x85\x79\x69\x5d\x83\xba\x26\x84"
16682+
"\xa1\x52\xe7\xda\xf7\x05\xb6\xca"
16683+
"\xad\x0f\x51\xed\x5a\xd3\x0f\xdf"
16684+
"\xde\xeb\x3f\x31\xed\x3a\x43\x93"
16685+
"\x3b\xb7\xca\xc8\x1b\xe7\x3b\x61"
16686+
"\x6a\x05\xfd\x2d\x6a\x5c\xb1\x0d"
16687+
"\x6e\x7a\xeb\x1c\x84\xec\xdb\xde",
16688+
.clen = 48 + 48,
16689+
}, { /* RFC 3602 Case 4 */
16690+
#ifdef __LITTLE_ENDIAN
16691+
.key = "\x08\x00" /* rta length */
16692+
"\x01\x00" /* rta type */
16693+
#else
16694+
.key = "\x00\x08" /* rta length */
16695+
"\x00\x01" /* rta type */
16696+
#endif
16697+
"\x00\x00\x00\x10" /* enc key length */
16698+
"\x11\x22\x33\x44\x55\x66\x77\x88"
16699+
"\x99\xaa\xbb\xcc\xdd\xee\xff\x11"
16700+
"\x22\x33\x44\x55\x66\x77\x88\x99"
16701+
"\xaa\xbb\xcc\xdd\xee\xff\x11\x22"
16702+
"\x33\x44\x55\x66\x77\x88\x99\xaa"
16703+
"\xbb\xcc\xdd\xee\xff\x11\x22\x33"
16704+
"\x56\xe4\x7a\x38\xc5\x59\x89\x74"
16705+
"\xbc\x46\x90\x3d\xba\x29\x03\x49",
16706+
.klen = 8 + 48 + 16,
16707+
.iv = "\x8c\xe8\x2e\xef\xbe\xa0\xda\x3c"
16708+
"\x44\x69\x9e\xd7\xdb\x51\xb7\xd9",
16709+
.assoc = "\x8c\xe8\x2e\xef\xbe\xa0\xda\x3c"
16710+
"\x44\x69\x9e\xd7\xdb\x51\xb7\xd9",
16711+
.alen = 16,
16712+
.ptext = "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7"
16713+
"\xa8\xa9\xaa\xab\xac\xad\xae\xaf"
16714+
"\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7"
16715+
"\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf"
16716+
"\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7"
16717+
"\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf"
16718+
"\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7"
16719+
"\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf",
16720+
.plen = 64,
16721+
.ctext = "\xc3\x0e\x32\xff\xed\xc0\x77\x4e"
16722+
"\x6a\xff\x6a\xf0\x86\x9f\x71\xaa"
16723+
"\x0f\x3a\xf0\x7a\x9a\x31\xa9\xc6"
16724+
"\x84\xdb\x20\x7e\xb0\xef\x8e\x4e"
16725+
"\x35\x90\x7a\xa6\x32\xc3\xff\xdf"
16726+
"\x86\x8b\xb7\xb2\x9d\x3d\x46\xad"
16727+
"\x83\xce\x9f\x9a\x10\x2e\xe9\x9d"
16728+
"\x49\xa5\x3e\x87\xf4\xc3\xda\x55"
16729+
"\x85\x7b\x91\xe0\x29\xeb\xd3\x59"
16730+
"\x7c\xe3\x67\x14\xbe\x71\x2a\xd2"
16731+
"\x8a\x1a\xd2\x35\x78\x6b\x69\xba"
16732+
"\x64\xa5\x04\x00\x19\xc3\x4c\xae"
16733+
"\x71\xff\x76\x9f\xbb\xc3\x29\x22"
16734+
"\xc2\xc6\x51\xf1\xe6\x29\x5e\xa5",
16735+
.clen = 64 + 48,
16736+
}, { /* RFC 3602 Case 5 */
16737+
#ifdef __LITTLE_ENDIAN
16738+
.key = "\x08\x00" /* rta length */
16739+
"\x01\x00" /* rta type */
16740+
#else
16741+
.key = "\x00\x08" /* rta length */
16742+
"\x00\x01" /* rta type */
16743+
#endif
16744+
"\x00\x00\x00\x10" /* enc key length */
16745+
"\x11\x22\x33\x44\x55\x66\x77\x88"
16746+
"\x99\xaa\xbb\xcc\xdd\xee\xff\x11"
16747+
"\x22\x33\x44\x55\x66\x77\x88\x99"
16748+
"\xaa\xbb\xcc\xdd\xee\xff\x11\x22"
16749+
"\x33\x44\x55\x66\x77\x88\x99\xaa"
16750+
"\xbb\xcc\xdd\xee\xff\x11\x22\x33"
16751+
"\x90\xd3\x82\xb4\x10\xee\xba\x7a"
16752+
"\xd9\x38\xc4\x6c\xec\x1a\x82\xbf",
16753+
.klen = 8 + 48 + 16,
16754+
.iv = "\xe9\x6e\x8c\x08\xab\x46\x57\x63"
16755+
"\xfd\x09\x8d\x45\xdd\x3f\xf8\x93",
16756+
.assoc = "\x00\x00\x43\x21\x00\x00\x00\x01"
16757+
"\xe9\x6e\x8c\x08\xab\x46\x57\x63"
16758+
"\xfd\x09\x8d\x45\xdd\x3f\xf8\x93",
16759+
.alen = 24,
16760+
.ptext = "\x08\x00\x0e\xbd\xa7\x0a\x00\x00"
16761+
"\x8e\x9c\x08\x3d\xb9\x5b\x07\x00"
16762+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
16763+
"\x10\x11\x12\x13\x14\x15\x16\x17"
16764+
"\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"
16765+
"\x20\x21\x22\x23\x24\x25\x26\x27"
16766+
"\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f"
16767+
"\x30\x31\x32\x33\x34\x35\x36\x37"
16768+
"\x01\x02\x03\x04\x05\x06\x07\x08"
16769+
"\x09\x0a\x0b\x0c\x0d\x0e\x0e\x01",
16770+
.plen = 80,
16771+
.ctext = "\xf6\x63\xc2\x5d\x32\x5c\x18\xc6"
16772+
"\xa9\x45\x3e\x19\x4e\x12\x08\x49"
16773+
"\xa4\x87\x0b\x66\xcc\x6b\x99\x65"
16774+
"\x33\x00\x13\xb4\x89\x8d\xc8\x56"
16775+
"\xa4\x69\x9e\x52\x3a\x55\xdb\x08"
16776+
"\x0b\x59\xec\x3a\x8e\x4b\x7e\x52"
16777+
"\x77\x5b\x07\xd1\xdb\x34\xed\x9c"
16778+
"\x53\x8a\xb5\x0c\x55\x1b\x87\x4a"
16779+
"\xa2\x69\xad\xd0\x47\xad\x2d\x59"
16780+
"\x13\xac\x19\xb7\xcf\xba\xd4\xa6"
16781+
"\x57\x5f\xb4\xd7\x74\x6f\x18\x97"
16782+
"\xb7\xde\xfc\xf3\x4e\x0d\x29\x4d"
16783+
"\xa0\xff\x39\x9e\x2d\xbf\x27\xac"
16784+
"\x54\xb9\x8a\x3e\xab\x3b\xac\xd3"
16785+
"\x36\x43\x74\xfc\xc2\x64\x81\x8a"
16786+
"\x2c\x15\x72\xdf\x3f\x9d\x5b\xa4",
16787+
.clen = 80 + 48,
16788+
}, { /* NIST SP800-38A F.2.3 CBC-AES192.Encrypt */
16789+
#ifdef __LITTLE_ENDIAN
16790+
.key = "\x08\x00" /* rta length */
16791+
"\x01\x00" /* rta type */
16792+
#else
16793+
.key = "\x00\x08" /* rta length */
16794+
"\x00\x01" /* rta type */
16795+
#endif
16796+
"\x00\x00\x00\x18" /* enc key length */
16797+
"\x11\x22\x33\x44\x55\x66\x77\x88"
16798+
"\x99\xaa\xbb\xcc\xdd\xee\xff\x11"
16799+
"\x22\x33\x44\x55\x66\x77\x88\x99"
16800+
"\xaa\xbb\xcc\xdd\xee\xff\x11\x22"
16801+
"\x33\x44\x55\x66\x77\x88\x99\xaa"
16802+
"\xbb\xcc\xdd\xee\xff\x11\x22\x33"
16803+
"\x8e\x73\xb0\xf7\xda\x0e\x64\x52"
16804+
"\xc8\x10\xf3\x2b\x80\x90\x79\xe5"
16805+
"\x62\xf8\xea\xd2\x52\x2c\x6b\x7b",
16806+
.klen = 8 + 48 + 24,
16807+
.iv = "\x00\x01\x02\x03\x04\x05\x06\x07"
16808+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
16809+
.assoc = "\x00\x01\x02\x03\x04\x05\x06\x07"
16810+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
16811+
.alen = 16,
16812+
.ptext = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96"
16813+
"\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
16814+
"\xae\x2d\x8a\x57\x1e\x03\xac\x9c"
16815+
"\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"
16816+
"\x30\xc8\x1c\x46\xa3\x5c\xe4\x11"
16817+
"\xe5\xfb\xc1\x19\x1a\x0a\x52\xef"
16818+
"\xf6\x9f\x24\x45\xdf\x4f\x9b\x17"
16819+
"\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
16820+
.plen = 64,
16821+
.ctext = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d"
16822+
"\x71\x78\x18\x3a\x9f\xa0\x71\xe8"
16823+
"\xb4\xd9\xad\xa9\xad\x7d\xed\xf4"
16824+
"\xe5\xe7\x38\x76\x3f\x69\x14\x5a"
16825+
"\x57\x1b\x24\x20\x12\xfb\x7a\xe0"
16826+
"\x7f\xa9\xba\xac\x3d\xf1\x02\xe0"
16827+
"\x08\xb0\xe2\x79\x88\x59\x88\x81"
16828+
"\xd9\x20\xa9\xe6\x4f\x56\x15\xcd"
16829+
"\x29\x9b\x42\x47\x0b\xbf\xf3\x54"
16830+
"\x54\x95\xb0\x89\xd5\xa0\xc3\x78"
16831+
"\x60\x6c\x18\x39\x6d\xc9\xfb\x2a"
16832+
"\x34\x1c\xed\x95\x10\x1e\x43\x0a"
16833+
"\x72\xce\x26\xbc\x74\xd9\x6f\xa2"
16834+
"\xf1\xd9\xd0\xb1\xdf\x3d\x93\x14",
16835+
.clen = 64 + 48,
16836+
}, { /* NIST SP800-38A F.2.5 CBC-AES256.Encrypt */
16837+
#ifdef __LITTLE_ENDIAN
16838+
.key = "\x08\x00" /* rta length */
16839+
"\x01\x00" /* rta type */
16840+
#else
16841+
.key = "\x00\x08" /* rta length */
16842+
"\x00\x01" /* rta type */
16843+
#endif
16844+
"\x00\x00\x00\x20" /* enc key length */
16845+
"\x11\x22\x33\x44\x55\x66\x77\x88"
16846+
"\x99\xaa\xbb\xcc\xdd\xee\xff\x11"
16847+
"\x22\x33\x44\x55\x66\x77\x88\x99"
16848+
"\xaa\xbb\xcc\xdd\xee\xff\x11\x22"
16849+
"\x33\x44\x55\x66\x77\x88\x99\xaa"
16850+
"\xbb\xcc\xdd\xee\xff\x11\x22\x33"
16851+
"\x60\x3d\xeb\x10\x15\xca\x71\xbe"
16852+
"\x2b\x73\xae\xf0\x85\x7d\x77\x81"
16853+
"\x1f\x35\x2c\x07\x3b\x61\x08\xd7"
16854+
"\x2d\x98\x10\xa3\x09\x14\xdf\xf4",
16855+
.klen = 8 + 48 + 32,
16856+
.iv = "\x00\x01\x02\x03\x04\x05\x06\x07"
16857+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
16858+
.assoc = "\x00\x01\x02\x03\x04\x05\x06\x07"
16859+
"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
16860+
.alen = 16,
16861+
.ptext = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96"
16862+
"\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
16863+
"\xae\x2d\x8a\x57\x1e\x03\xac\x9c"
16864+
"\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"
16865+
"\x30\xc8\x1c\x46\xa3\x5c\xe4\x11"
16866+
"\xe5\xfb\xc1\x19\x1a\x0a\x52\xef"
16867+
"\xf6\x9f\x24\x45\xdf\x4f\x9b\x17"
16868+
"\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
16869+
.plen = 64,
16870+
.ctext = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba"
16871+
"\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6"
16872+
"\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d"
16873+
"\x67\x9f\x77\x7b\xc6\x70\x2c\x7d"
16874+
"\x39\xf2\x33\x69\xa9\xd9\xba\xcf"
16875+
"\xa5\x30\xe2\x63\x04\x23\x14\x61"
16876+
"\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc"
16877+
"\xda\x6c\x19\x07\x8c\x6a\x9d\x1b"
16878+
"\x9f\x50\xce\x64\xd9\xa3\xc9\x7a"
16879+
"\x15\x3a\x3d\x46\x9a\x90\xf3\x06"
16880+
"\x22\xad\xc5\x24\x77\x50\xb8\xfe"
16881+
"\xbe\x37\x16\x86\x34\x5f\xaf\x97"
16882+
"\x00\x9d\x86\xc8\x32\x4f\x72\x2f"
16883+
"\x48\x97\xad\xb6\xb9\x77\x33\xbc",
16884+
.clen = 64 + 48,
16885+
},
16886+
};
16887+
1657716888
static const struct aead_testvec hmac_sha512_aes_cbc_tv_temp[] = {
1657816889
{ /* RFC 3602 Case 1 */
1657916890
#ifdef __LITTLE_ENDIAN

0 commit comments

Comments
 (0)