Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1729718pxu; Tue, 24 Nov 2020 07:35:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJxliznu51Yf0nTdGmubTX1/vK6Y6iJMqpCe1QqoLB5A1Y8d7CI/kuP4BeDyROOHrhLiLxcR X-Received: by 2002:a17:906:a106:: with SMTP id t6mr4443552ejy.63.1606232128802; Tue, 24 Nov 2020 07:35:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606232128; cv=none; d=google.com; s=arc-20160816; b=0Hh2wqez/K5XxCSjqDQYSUd9lWKxYcCD393fa0Uxt4R8e/0lnKo6EzDIKe/a+vSw3g eu+x58N5P2OhYLEgbOHN8V/Eh27h2wY7Hcy4IZrtsQcSa2tMePkCOtA/SFi16jSWZo8h nNjp7I3h02S5ftBAKUHUszGbnnVAkBywt2t4LqK0mGfWkUwYM823X3SIVhCWYuoXC5lp 6td/ygA28SYOdOZGEnAVEoD1c6Re+aqehVzpyVvehuTVhPXrYqZ8tH0X8ds1XQ3nMWKJ rebwVtZAjBkldgFA+7s3bTSjwffmrxgriPl5edIHSFARFuLtn5ILhxC9uR0qlrAZm14V RcEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature:dkim-filter; bh=gx3UiQSnQTOc/wHYGjDs/znbMI9SL8PXBf5XYJEahuc=; b=W7MggDy7sorfmZHMZzOaxrgA9mVppuAj9Mu4NO/ZxCs7/mwnO+84RWyrCR+QXtsHA0 XYnRkE98LiAch/X8aB9sYDn5sJwxSjtjIZRThOlvPe1D7YUe8WH8xTbUsOK7nX69Wvlg d3t+J4FzwwFGDRLRCYMPZcnzA4MAajnzMyvCbi78QGibokuR/uQ7aXHSayicc7daqEHf 2L8yFVk0pbQdhGBR1cLiAcOnO2BJNYXE9AyTkmq2jaLId3hbltvR/mWUJ3KGfQAd2ory hWi9hk6/SBvUnOpqE0J7ANQEnZDTKrdtl/sKe2L9J7LODFibgc3NhjMeYRoASQSl5uUO S2mw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@novek.ru header.s=mail header.b="et6z/Qlb"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y18si8837916ejb.408.2020.11.24.07.34.56; Tue, 24 Nov 2020 07:35:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@novek.ru header.s=mail header.b="et6z/Qlb"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389728AbgKXPdH (ORCPT + 99 others); Tue, 24 Nov 2020 10:33:07 -0500 Received: from novek.ru ([213.148.174.62]:47464 "EHLO novek.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389078AbgKXPdH (ORCPT ); Tue, 24 Nov 2020 10:33:07 -0500 Received: from nat1.ooonet.ru (gw.zelenaya.net [91.207.137.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by novek.ru (Postfix) with ESMTPSA id 0652E5030CB; Tue, 24 Nov 2020 18:25:34 +0300 (MSK) DKIM-Filter: OpenDKIM Filter v2.11.0 novek.ru 0652E5030CB DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=novek.ru; s=mail; t=1606231536; bh=ffxa9N9sKvJdo/h06u5PPtuH3qxWyZQ9hwY4Rd25ZW0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=et6z/QlbXR9j4uQvR80W45g8X+yNgU066wrkgUczodExVQABuAVaI1BT8mklP716v B83I5sf30BqGhxCg4YNNCiJuKDSRWRxmbaA2FYiUoiBQfVNxPuxS6AMSlskiGhw0aq 7W2fxnhzJ4Ng9wFSddVqbx46fV8AXuPgwwIEK4Pc= From: Vadim Fedorenko To: Jakub Kicinski , Boris Pismenny , Aviad Yehezkel Cc: Vadim Fedorenko , netdev@vger.kernel.org, linux-crypto@vger.kernel.org Subject: [net-next v2 5/5] selftests/tls: add CHACHA20-POLY1305 to tls selftests Date: Tue, 24 Nov 2020 18:24:50 +0300 Message-Id: <1606231490-653-6-git-send-email-vfedorenko@novek.ru> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1606231490-653-1-git-send-email-vfedorenko@novek.ru> References: <1606231490-653-1-git-send-email-vfedorenko@novek.ru> X-Spam-Status: No, score=0.0 required=5.0 tests=UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on gate.novek.ru Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add new cipher as a variant of standard tls selftests Signed-off-by: Vadim Fedorenko --- tools/testing/selftests/net/tls.c | 40 ++++++++++++++++++++++++++++++++------- 1 file changed, 33 insertions(+), 7 deletions(-) diff --git a/tools/testing/selftests/net/tls.c b/tools/testing/selftests/net/tls.c index b599f1f..cb0d189 100644 --- a/tools/testing/selftests/net/tls.c +++ b/tools/testing/selftests/net/tls.c @@ -103,32 +103,58 @@ FIXTURE_VARIANT(tls) { - unsigned int tls_version; + u16 tls_version; + u16 cipher_type; }; -FIXTURE_VARIANT_ADD(tls, 12) +FIXTURE_VARIANT_ADD(tls, 12_gcm) { .tls_version = TLS_1_2_VERSION, + .cipher_type = TLS_CIPHER_AES_GCM_128, }; -FIXTURE_VARIANT_ADD(tls, 13) +FIXTURE_VARIANT_ADD(tls, 13_gcm) { .tls_version = TLS_1_3_VERSION, + .cipher_type = TLS_CIPHER_AES_GCM_128, +}; + +FIXTURE_VARIANT_ADD(tls, 12_chacha) +{ + .tls_version = TLS_1_2_VERSION, + .cipher_type = TLS_CIPHER_CHACHA20_POLY1305, +}; + +FIXTURE_VARIANT_ADD(tls, 13_chacha) +{ + .tls_version = TLS_1_3_VERSION, + .cipher_type = TLS_CIPHER_CHACHA20_POLY1305, }; FIXTURE_SETUP(tls) { - struct tls12_crypto_info_aes_gcm_128 tls12; + union tls_crypto_context tls12; struct sockaddr_in addr; socklen_t len; int sfd, ret; + size_t tls12_sz; self->notls = false; len = sizeof(addr); memset(&tls12, 0, sizeof(tls12)); tls12.info.version = variant->tls_version; - tls12.info.cipher_type = TLS_CIPHER_AES_GCM_128; + tls12.info.cipher_type = variant->cipher_type; + switch (variant->cipher_type) { + case TLS_CIPHER_CHACHA20_POLY1305: + tls12_sz = sizeof(tls12_crypto_info_chacha20_poly1305); + break; + case TLS_CIPHER_AES_GCM_128: + tls12_sz = sizeof(tls12_crypto_info_aes_gcm_128); + break; + default: + tls12_sz = 0; + } addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(INADDR_ANY); @@ -156,7 +182,7 @@ if (!self->notls) { ret = setsockopt(self->fd, SOL_TLS, TLS_TX, &tls12, - sizeof(tls12)); + tls12_sz); ASSERT_EQ(ret, 0); } @@ -169,7 +195,7 @@ ASSERT_EQ(ret, 0); ret = setsockopt(self->cfd, SOL_TLS, TLS_RX, &tls12, - sizeof(tls12)); + tls12_sz); ASSERT_EQ(ret, 0); } -- 1.8.3.1