f64adb6714
Added enablement for HMAC parser, to allow the application to parser the hmac request files and to validate all tests supported Signed-off-by: Marko Kovacevic <marko.kovacevic@intel.com> Signed-off-by: Fan Zhang <roy.fan.zhang@intel.com> Acked-by: Arek Kusztal <arkadiuszx.kusztal@intel.com> Reviewed-by: Akhil Goyal <akhil.goyal@nxp.com>
106 lines
2.3 KiB
C
106 lines
2.3 KiB
C
/* SPDX-License-Identifier: BSD-3-Clause
|
|
* Copyright(c) 2018 Intel Corporation
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <stdio.h>
|
|
|
|
#include <rte_cryptodev.h>
|
|
|
|
#include "fips_validation.h"
|
|
|
|
#define ALGO_PREFIX "[L="
|
|
#define KEYLEN_STR "Klen = "
|
|
#define TAGLEN_STR "Tlen = "
|
|
|
|
#define COUNT_STR "Count = "
|
|
#define KEY_STR "Key = "
|
|
#define PT_STR "Msg = "
|
|
#define TAG_STR "Mac = "
|
|
|
|
struct hash_size_conversion {
|
|
const char *str;
|
|
enum rte_crypto_auth_algorithm algo;
|
|
} hsc[] = {
|
|
{"20", RTE_CRYPTO_AUTH_SHA1_HMAC},
|
|
{"28", RTE_CRYPTO_AUTH_SHA224_HMAC},
|
|
{"32", RTE_CRYPTO_AUTH_SHA256_HMAC},
|
|
{"48", RTE_CRYPTO_AUTH_SHA384_HMAC},
|
|
{"64", RTE_CRYPTO_AUTH_SHA512_HMAC},
|
|
};
|
|
|
|
static int
|
|
parse_interim_algo(__attribute__((__unused__)) const char *key,
|
|
char *text,
|
|
__attribute__((__unused__)) struct fips_val *val)
|
|
{
|
|
|
|
uint32_t i;
|
|
|
|
for (i = 0; i < RTE_DIM(hsc); i++) {
|
|
if (strstr(text, hsc[i].str)) {
|
|
info.interim_info.hmac_data.algo = hsc[i].algo;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (i == RTE_DIM(hsc))
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct fips_test_callback hmac_tests_vectors[] = {
|
|
{KEYLEN_STR, parser_read_uint32_val, &vec.cipher_auth.key},
|
|
{TAGLEN_STR, parser_read_uint32_val, &vec.cipher_auth.digest},
|
|
{KEY_STR, parse_uint8_hex_str, &vec.cipher_auth.key},
|
|
{PT_STR, parse_uint8_hex_str, &vec.pt},
|
|
{TAG_STR, parse_uint8_hex_str, &vec.cipher_auth.digest},
|
|
{NULL, NULL, NULL} /**< end pointer */
|
|
};
|
|
|
|
struct fips_test_callback hmac_tests_interim_vectors[] = {
|
|
{ALGO_PREFIX, parse_interim_algo, NULL},
|
|
{NULL, NULL, NULL} /**< end pointer */
|
|
};
|
|
|
|
static int
|
|
parse_test_hmac_writeback(struct fips_val *val)
|
|
{
|
|
struct fips_val val_local;
|
|
|
|
fprintf(info.fp_wr, "%s", TAG_STR);
|
|
|
|
val_local.val = val->val + vec.pt.len;
|
|
val_local.len = vec.cipher_auth.digest.len;
|
|
|
|
parse_write_hex_str(&val_local);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
rsp_test_hmac_check(struct fips_val *val)
|
|
{
|
|
if (memcmp(val->val + vec.pt.len, vec.cipher_auth.digest.val,
|
|
vec.cipher_auth.digest.len) == 0)
|
|
fprintf(info.fp_wr, "Success\n");
|
|
else
|
|
fprintf(info.fp_wr, "Failed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
parse_test_hmac_init(void)
|
|
{
|
|
info.op = FIPS_TEST_ENC_AUTH_GEN;
|
|
info.parse_writeback = parse_test_hmac_writeback;
|
|
info.callbacks = hmac_tests_vectors;
|
|
info.interim_callbacks = hmac_tests_interim_vectors;
|
|
info.writeback_callbacks = NULL;
|
|
info.kat_check = rsp_test_hmac_check;
|
|
|
|
return 0;
|
|
}
|