Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp828505ybl; Sun, 1 Dec 2019 13:56:11 -0800 (PST) X-Google-Smtp-Source: APXvYqy0+FHISv2goEHl6uEt2tRK7/5KbnX/aM42Hh7F0vd/CTs+HmIYksdCMDYhtcjNvhFykmG+ X-Received: by 2002:a17:906:2281:: with SMTP id p1mr20815521eja.184.1575237371260; Sun, 01 Dec 2019 13:56:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575237371; cv=none; d=google.com; s=arc-20160816; b=Ba2WnAl7Wz3y5O6buNgGkwXqKIhwmiCFdwxYi0MnBpwwa5u6WTBaHqeer4Jr1LNHRn 3XQTinJiG8XoqcCM9N7Kgcj2E+UMQY/+51ToxxVxUFHtSzGJkfzxmlPjTzpJU3it/aPM VtKQox2HRnzjfHwcKFdCook1xtuPyz6no6wBi3cUfCJD07cdwoulWaZGuyijSiFn6pDG IuJ4Q2yLU6vPWU2Pyc5Q6ppE3zhSff95RWtDQ1EjFiH0YkQmJkcZGY1+D3oEjQZEhTWK iW6MLkAdHlB67ZzwlsbAOp0ugAPW4pJAnNKGRGKmAh541vmC7+jY6lp4YRJu2fivNSRK Q/JQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=oubnUcV/9AsigziCxvuPetGL7itaIj32yTyBOWLzObU=; b=TmjbGsP74pEFuCVYMynBDOTMZBBkxETawB28Bq+2yt+qu6kGKGWlED8jOHfhRZHcrx IP0Fq3KDJ+SbnOTESD7k+NtZWP/mrnuSvvis/yIw0JkccMEtw57InJfnp4w/OcMDW8Az C90v7pKLv38k2bLJfkILcfiMyFlaL4cDeFSMkuXG/qEk7LNiz5SYHNNAl700YI1fX+9H LuiN59BuyKWzONc0vFKfMpdSWpWOjCmTX3UKB8y5MsWikIFxkyKa4Zr1YnG/t6p5DN3l 85UTEZti4UYqqvB6QU/skHej7IFqQ5YBNY0JGAdZaV7GRFgPr1YEYPoUhMXeRcx00Svl F+Ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xm6t9Moz; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n16si11970143eda.345.2019.12.01.13.55.47; Sun, 01 Dec 2019 13:56:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xm6t9Moz; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727297AbfLAVyW (ORCPT + 99 others); Sun, 1 Dec 2019 16:54:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:33402 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727167AbfLAVyU (ORCPT ); Sun, 1 Dec 2019 16:54:20 -0500 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 82B71218AC for ; Sun, 1 Dec 2019 21:54:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575237260; bh=NMjnmjGfUURojIaOCoQJrKQBPswnVn38duinqOTrrlA=; h=From:To:Subject:Date:In-Reply-To:References:From; b=xm6t9MozATTM6w4w+lu0rgJczpdzxpl2Kq2urhBI1sx41NiL9Bu6ZYtpZWZ9bBdvK u7tSfKxnru2xtmOMwlaBHVhf6+DP2bM5corrhVFAgz86wLzbwLR22F7nhP4aCOjv5F +60TVxXvJYNXdyDeRnhIRMLTR8Qnt3XJyd+cOAZc= From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 4/7] crypto: testmgr - check skcipher min_keysize Date: Sun, 1 Dec 2019 13:53:27 -0800 Message-Id: <20191201215330.171990-5-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191201215330.171990-1-ebiggers@kernel.org> References: <20191201215330.171990-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers When checking two implementations of the same skcipher algorithm for consistency, require that the minimum key size be the same, not just the maximum key size. There's no good reason to allow different minimum key sizes. Signed-off-by: Eric Biggers --- crypto/testmgr.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/crypto/testmgr.c b/crypto/testmgr.c index a8940415512f..3d7c1c1529cf 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -2764,6 +2764,15 @@ static int test_skcipher_vs_generic_impl(const char *driver, /* Check the algorithm properties for consistency. */ + if (crypto_skcipher_min_keysize(tfm) != + crypto_skcipher_min_keysize(generic_tfm)) { + pr_err("alg: skcipher: min keysize for %s (%u) doesn't match generic impl (%u)\n", + driver, crypto_skcipher_min_keysize(tfm), + crypto_skcipher_min_keysize(generic_tfm)); + err = -EINVAL; + goto out; + } + if (maxkeysize != crypto_skcipher_max_keysize(generic_tfm)) { pr_err("alg: skcipher: max keysize for %s (%u) doesn't match generic impl (%u)\n", driver, maxkeysize, -- 2.24.0