numam-dpdk/examples/fips_validation/fips_validation_hmac.c
David Marchand 8d70a19417 examples/fips_validation: fix link to libjansson
When compiling this example out of DPDK, linking the executable fails
with:

  ## Building fips_validation
  /usr/bin/ld: /tmp/ccQjeHBg.o: in function `fips_test_init':
  fips_validation.c:(.text+0x7ab): undefined reference to `json_loadf'
  /usr/bin/ld: /tmp/ccQjeHBg.o: in function
     `fips_test_parse_one_json_vector_set':
  fips_validation.c:(.text+0xc2e): undefined reference to `json_object_get'
  /usr/bin/ld: fips_validation.c:(.text+0xc36): undefined reference to
     `json_string_value'
  /usr/bin/ld: /tmp/ccQjeHBg.o: in function `fips_test_parse_one_json_group':
  fips_validation.c:(.text+0xd00): undefined reference to `json_object_get'
  /usr/bin/ld: fips_validation.c:(.text+0xd14): undefined reference to
     `json_integer_value'
  ...

Code in an example can't rely on RTE_HAS_JANSSON, because it only
indicates that the jansson library was available at the time of dpdk
compilation.

Prefer a local build flag (like what is done in vm_power_manager).
And add linking to libjansson, if available.

Fixes: f556293fd5 ("examples/fips_validation: add JSON info to header")

Signed-off-by: David Marchand <david.marchand@redhat.com>
Acked-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com>
2022-06-21 20:04:50 +02:00

199 lines
4.7 KiB
C

/* SPDX-License-Identifier: BSD-3-Clause
* Copyright(c) 2018 Intel Corporation
*/
#include <string.h>
#include <time.h>
#include <stdio.h>
#include <rte_cryptodev.h>
#include "fips_validation.h"
#define ALGO_PREFIX "[L="
#define KEYLEN_STR "Klen = "
#define TAGLEN_STR "Tlen = "
#define COUNT_STR "Count = "
#define KEY_STR "Key = "
#define PT_STR "Msg = "
#define TAG_STR "Mac = "
#define ALGO_JSON_STR "algorithm"
#define KEYLEN_JSON_STR "keyLen"
#define TAGLEN_JSON_STR "macLen"
#define KEY_JSON_STR "key"
#define PT_JSON_STR "msg"
#define TAG_JSON_STR "mac"
struct hash_size_conversion {
const char *str;
enum rte_crypto_auth_algorithm algo;
} hsc[] = {
{"20", RTE_CRYPTO_AUTH_SHA1_HMAC},
{"28", RTE_CRYPTO_AUTH_SHA224_HMAC},
{"32", RTE_CRYPTO_AUTH_SHA256_HMAC},
{"48", RTE_CRYPTO_AUTH_SHA384_HMAC},
{"64", RTE_CRYPTO_AUTH_SHA512_HMAC},
};
static int
parse_interim_algo(__rte_unused const char *key,
char *text,
__rte_unused struct fips_val *val)
{
uint32_t i;
for (i = 0; i < RTE_DIM(hsc); i++) {
if (strstr(text, hsc[i].str)) {
info.interim_info.hmac_data.algo = hsc[i].algo;
break;
}
}
if (i == RTE_DIM(hsc))
return -1;
return 0;
}
struct fips_test_callback hmac_tests_vectors[] = {
{KEYLEN_STR, parser_read_uint32_val, &vec.cipher_auth.key},
{TAGLEN_STR, parser_read_uint32_val, &vec.cipher_auth.digest},
{KEY_STR, parse_uint8_hex_str, &vec.cipher_auth.key},
{PT_STR, parse_uint8_hex_str, &vec.pt},
{TAG_STR, parse_uint8_hex_str, &vec.cipher_auth.digest},
{NULL, NULL, NULL} /**< end pointer */
};
struct fips_test_callback hmac_tests_interim_vectors[] = {
{ALGO_PREFIX, parse_interim_algo, NULL},
{NULL, NULL, NULL} /**< end pointer */
};
#ifdef USE_JANSSON
struct hash_size_conversion json_algorithms[] = {
{"HMAC-SHA-1", RTE_CRYPTO_AUTH_SHA1_HMAC},
{"HMAC-SHA2-224", RTE_CRYPTO_AUTH_SHA224_HMAC},
{"HMAC-SHA2-256", RTE_CRYPTO_AUTH_SHA256_HMAC},
{"HMAC-SHA2-384", RTE_CRYPTO_AUTH_SHA384_HMAC},
{"HMAC-SHA2-512", RTE_CRYPTO_AUTH_SHA512_HMAC},
};
struct fips_test_callback hmac_tests_json_vectors[] = {
{KEY_JSON_STR, parse_uint8_hex_str, &vec.cipher_auth.key},
{PT_JSON_STR, parse_uint8_hex_str, &vec.pt},
{TAG_JSON_STR, parse_uint8_hex_str, &vec.cipher_auth.digest},
{NULL, NULL, NULL} /**< end pointer */
};
struct fips_test_callback hmac_tests_interim_json_vectors[] = {
{KEYLEN_JSON_STR, parser_read_uint32_val, &vec.cipher_auth.key},
{TAGLEN_JSON_STR, parser_read_uint32_bit_val, &vec.cipher_auth.digest},
{NULL, NULL, NULL} /**< end pointer */
};
#endif /* USE_JANSSON */
static int
parse_test_hmac_writeback(struct fips_val *val)
{
struct fips_val val_local;
fprintf(info.fp_wr, "%s", TAG_STR);
val_local.val = val->val + vec.pt.len;
val_local.len = vec.cipher_auth.digest.len;
parse_write_hex_str(&val_local);
return 0;
}
static int
rsp_test_hmac_check(struct fips_val *val)
{
if (memcmp(val->val + vec.pt.len, vec.cipher_auth.digest.val,
vec.cipher_auth.digest.len) == 0)
fprintf(info.fp_wr, "Success\n");
else
fprintf(info.fp_wr, "Failed\n");
return 0;
}
int
parse_test_hmac_init(void)
{
info.op = FIPS_TEST_ENC_AUTH_GEN;
info.parse_writeback = parse_test_hmac_writeback;
info.callbacks = hmac_tests_vectors;
info.interim_callbacks = hmac_tests_interim_vectors;
info.writeback_callbacks = NULL;
info.kat_check = rsp_test_hmac_check;
return 0;
}
#ifdef USE_JANSSON
static int
parse_test_hmac_json_writeback(struct fips_val *val)
{
struct fips_val val_local;
json_t *tcId, *mac;
tcId = json_object_get(json_info.json_test_case, "tcId");
json_info.json_write_case = json_object();
json_object_set(json_info.json_write_case, "tcId", tcId);
val_local.val = val->val + vec.pt.len;
val_local.len = vec.cipher_auth.digest.len;
writeback_hex_str("", info.one_line_text, &val_local);
mac = json_string(info.one_line_text);
json_object_set_new(json_info.json_write_case, TAG_JSON_STR, mac);
return 0;
}
int
parse_test_hmac_json_algorithm(void)
{
json_t *algorithm_object;
const char *algorithm_str;
uint32_t i;
algorithm_object = json_object_get(json_info.json_vector_set, "algorithm");
algorithm_str = json_string_value(algorithm_object);
for (i = 0; i < RTE_DIM(json_algorithms); i++) {
if (strstr(algorithm_str, json_algorithms[i].str)) {
info.interim_info.hmac_data.algo = json_algorithms[i].algo;
return 0;
}
}
return -1;
}
int
parse_test_hmac_json_init(void)
{
info.op = FIPS_TEST_ENC_AUTH_GEN;
info.parse_writeback = parse_test_hmac_json_writeback;
info.callbacks = hmac_tests_json_vectors;
info.writeback_callbacks = NULL;
info.kat_check = rsp_test_hmac_check;
info.interim_callbacks = hmac_tests_interim_json_vectors;
if (parse_test_hmac_json_algorithm() < 0)
return -1;
return 0;
}
#endif /* USE_JANSSON */