Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp827930ybl; Sun, 1 Dec 2019 13:55:10 -0800 (PST) X-Google-Smtp-Source: APXvYqxJ+OJJq3agS/FSlQn8U6VzLkcZs+GQ/gPlHvYRyFho9Es0JQyiXy2ZmWKxa/2VpZb17yzn X-Received: by 2002:a17:906:934c:: with SMTP id p12mr15638103ejw.68.1575237310849; Sun, 01 Dec 2019 13:55:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575237310; cv=none; d=google.com; s=arc-20160816; b=PTb7VJuyCxEvcy00oQpphqyspcuJBC0pRkUjauNe9cU/NPQYuoP7RSadUyys8WnAzz Opfy44P2AlG2PTjPgEWzUUg2JVc87OqQa8Eo4lGJZZ9FywdWLyQ9PZ7+ts18yvwiCmGe mxJfQ5LDK8ZjRCtPvW0cNfa8j52c9RWZRfsNORxiTKgFJ6CzrD4QTKqPofcbCf+PpR0B jTjZU26z7beoZ8BnCRcDZ5R5GolYcC09QvbmPj3k82QUjFtFMBhIlcCdmd1BOajwGg/1 sxGzJfdZ4H71JF0kFzme7GDo0NLSY/CnM+sOzuCuxrigw0rP6zGcvRpnJSic6vsp3sDn WzBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:to:from:dkim-signature; bh=ui48tKSg5i5vbb3SSyWjiMwqkMRpSnH4QG69vEAI0as=; b=l3Qpwu6gD3wFq+4YJcI1f85xTTQm76FLaZ5WeqiMkhNOkLPsI4/Szl4dYJRe779VnY nUl6X13U9gD1SAT3w74ehKfc2TyD18uRentrO0SxMow02QtKisPdIt+PBrqJ40iJvGLL /sPh4iXVTP7JzTTUyOiqyGY76K03Kag9d7g5AC56AVxctdXCP+uFr4DMKX/Hy6u1xtRG zm6Qim6jJ4JZNGS3GDDD6sYH6v7bk8uSjbsinkeK5IUlHwFQfnqg+8O9lXtUbODvdJeB wq4df7dK87RrQveMYFaaGv930+nEbzCFWX1j4ff1tyi6vorm4+fj3huqRnRJVqMTLmPx 8U3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L9QCoTeO; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n16si11970143eda.345.2019.12.01.13.54.45; Sun, 01 Dec 2019 13:55:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L9QCoTeO; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727282AbfLAVyU (ORCPT + 99 others); Sun, 1 Dec 2019 16:54:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:33394 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727167AbfLAVyU (ORCPT ); Sun, 1 Dec 2019 16:54:20 -0500 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B2DCC20865 for ; Sun, 1 Dec 2019 21:54:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575237259; bh=DGD+bXIVq1MquOwPGTAe9KKmMpZyatPBZimtqWwXnzo=; h=From:To:Subject:Date:From; b=L9QCoTeOeSpFCHBCJLXlpo6dYZh15ZldeXZqPwyyfykjmiHjTZPO/KvmvKuzCZ7dU sJniEBgBOUTHRMtQGuxPWhGiRUi8JeEcr3AKudBO3jKY6hsyEbVQV4BO+/0RRAuNy7 HkxbKl6ZNQu/nprPgje+/dT9pwJ+BabAugmguEm0= From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 0/7] crypto: more self-test improvements Date: Sun, 1 Dec 2019 13:53:23 -0800 Message-Id: <20191201215330.171990-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series makes some more improvements to the crypto self-tests, the largest of which is making the AEAD fuzz tests test inauthentic inputs, i.e. cases where decryption is expected to fail due to the (ciphertext, AAD) pair not being the correct result of an encryption with the key. It also updates the self-tests to test passing misaligned buffers to the various setkey() functions, and to check that skciphers have the same min_keysize as the corresponding generic implementation. I haven't seen any test failures from this on x86_64, arm64, or arm32. But as usual I haven't tested drivers for crypto accelerators. For this series to apply this cleanly, my other series "crypto: skcipher - simplifications due to {,a}blkcipher removal" needs to be applied first, due to a conflict in skcipher.h. This can also be retrieved from git at https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git tag "crypto-self-tests_2019-12-01". Eric Biggers (7): crypto: aead - move crypto_aead_maxauthsize() to crypto: skcipher - add crypto_skcipher_min_keysize() crypto: testmgr - don't try to decrypt uninitialized buffers crypto: testmgr - check skcipher min_keysize crypto: testmgr - test setting misaligned keys crypto: testmgr - create struct aead_extra_tests_ctx crypto: testmgr - generate inauthentic AEAD test vectors crypto/testmgr.c | 574 +++++++++++++++++++++++++-------- crypto/testmgr.h | 14 +- include/crypto/aead.h | 10 + include/crypto/internal/aead.h | 10 - include/crypto/skcipher.h | 6 + 5 files changed, 461 insertions(+), 153 deletions(-) -- 2.24.0