Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp533759ybg; Tue, 9 Jun 2020 06:51:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyKfl9AehCWDSIRrXNG1BNE1vPRNEymiJIqZSW5EfQ6pXFfzUiRs5u5tdyGUpXqF0IFbOvz X-Received: by 2002:a17:906:d791:: with SMTP id pj17mr25286779ejb.352.1591710670631; Tue, 09 Jun 2020 06:51:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591710670; cv=none; d=google.com; s=arc-20160816; b=ZI/sVccL4jIwvb6mbG+nvFFqLE1qvAmiRSiykfJFwX4AZMySgaXQoapGaxeCBweasp F43YNRS49povcbnQc2T9cEoC1YqPqICL1daqfGnHCX1Lv83z0TB+E+0hfGnkiYEdpEhf gkKT+APKBA+BB6R0pul62x41fIrLr90lErUoeUKFtaMjJrg+wQTh8eQOz39xDKClqcvQ +6iuSsHC3NZqY5stcddvCMI85QkUE/mZ5L4L1R5OUJOe0Tqe+Xb4I+1QmCq0lPV7OZ6m rtlJk5zITQOFQztbKOHA9hXJWgnuDhTMOcnJySs1Zxeq056K25tHPshhyyaKQurCLjAr EVWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=tPCi21zhw5W6PxS6GgEgVLX/bpuBYGDLKwjv/2KmvTw=; b=zl9qeAsvFdjtB8XhZq9953h60EjVnekCyVG52ZfMWICbxnxFDnxBGruJI02ir8nnFL 3MBUkrqYFHNDW+81yC8BiFYvyfKToiLlMC1ukFwKctNyocLL/sZFpRI7LJv/WONLweaU 4xAjh2e8g8CHnZJfYrB/uywb04SrB8dVskeFu0/s7UsX+tElRwjsdHXzKYq3x5T66lG4 Ah6wkOS7fhCA07j+Zj4ndOePTa6GtbpdzgZUYaGfKiIg34Om7KNpI8XhFj585SGDa391 5GX6Mu6VhGjDLuZfOxhFc9JNkNa4ke2fcX2/S8akIgyWvp5UzOOER6dXIV1thg+YJOyH sQHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn1si10947566edb.500.2020.06.09.06.50.47; Tue, 09 Jun 2020 06:51:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730252AbgFINtI (ORCPT + 99 others); Tue, 9 Jun 2020 09:49:08 -0400 Received: from out30-44.freemail.mail.aliyun.com ([115.124.30.44]:51561 "EHLO out30-44.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730044AbgFINtH (ORCPT ); Tue, 9 Jun 2020 09:49:07 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04427;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=20;SR=0;TI=SMTPD_---0U.6G9dH_1591710540; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0U.6G9dH_1591710540) by smtp.aliyun-inc.com(127.0.0.1); Tue, 09 Jun 2020 21:49:00 +0800 From: Tianjia Zhang To: herbert@gondor.apana.org.au, davem@davemloft.net, dhowells@redhat.com, mcoquelin.stm32@gmail.com, alexandre.torgue@st.com, jmorris@namei.org, serge@hallyn.com, nramas@linux.microsoft.com, tusharsu@linux.microsoft.com, zohar@linux.ibm.com, gilad@benyossef.com, pvanleeuwen@rambus.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-security-module@vger.kernel.org, zhang.jia@linux.alibaba.com, tianjia.zhang@linux.alibaba.com Subject: [PATCH v3 5/8] crypto: testmgr - support test with different ciphertext per encryption Date: Tue, 9 Jun 2020 21:48:52 +0800 Message-Id: <20200609134855.21431-6-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200609134855.21431-1-tianjia.zhang@linux.alibaba.com> References: <20200609134855.21431-1-tianjia.zhang@linux.alibaba.com> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Some asymmetric algorithms will get different ciphertext after each encryption, such as SM2, and let testmgr support the testing of such algorithms. In struct akcipher_testvec, set c and c_size to be empty, skip the comparison of the ciphertext, and compare the decrypted plaintext with m to achieve the test purpose. Signed-off-by: Tianjia Zhang --- crypto/testmgr.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 6863f911fcee..0dc94461c437 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -4025,7 +4025,7 @@ static int test_akcipher_one(struct crypto_akcipher *tfm, pr_err("alg: akcipher: %s test failed. err %d\n", op, err); goto free_all; } - if (!vecs->siggen_sigver_test) { + if (!vecs->siggen_sigver_test && c) { if (req->dst_len != c_size) { pr_err("alg: akcipher: %s test failed. Invalid output len\n", op); @@ -4056,6 +4056,11 @@ static int test_akcipher_one(struct crypto_akcipher *tfm, goto free_all; } + if (!vecs->siggen_sigver_test && !c) { + c = outbuf_enc; + c_size = req->dst_len; + } + op = vecs->siggen_sigver_test ? "sign" : "decrypt"; if (WARN_ON(c_size > PAGE_SIZE)) goto free_all; -- 2.17.1