123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172 |
- // SPDX-License-Identifier: GPL-2.0
- #include <kunit/test.h>
- #include "protocol.h"
- struct test_case {
- char *key;
- char *msg;
- char *result;
- };
- /* we can't reuse RFC 4231 test vectors, as we have constraint on the
- * input and key size.
- */
- static struct test_case tests[] = {
- {
- .key = "0b0b0b0b0b0b0b0b",
- .msg = "48692054",
- .result = "8385e24fb4235ac37556b6b886db106284a1da671699f46db1f235ec622dcafa",
- },
- {
- .key = "aaaaaaaaaaaaaaaa",
- .msg = "dddddddd",
- .result = "2c5e219164ff1dca1c4a92318d847bb6b9d44492984e1eb71aff9022f71046e9",
- },
- {
- .key = "0102030405060708",
- .msg = "cdcdcdcd",
- .result = "e73b9ba9969969cefb04aa0d6df18ec2fcc075b6f23b4d8c4da736a5dbbc6e7d",
- },
- };
- static void mptcp_crypto_test_basic(struct kunit *test)
- {
- char hmac[32], hmac_hex[65];
- u32 nonce1, nonce2;
- u64 key1, key2;
- u8 msg[8];
- int i, j;
- for (i = 0; i < ARRAY_SIZE(tests); ++i) {
- /* mptcp hmap will convert to be before computing the hmac */
- key1 = be64_to_cpu(*((__be64 *)&tests[i].key[0]));
- key2 = be64_to_cpu(*((__be64 *)&tests[i].key[8]));
- nonce1 = be32_to_cpu(*((__be32 *)&tests[i].msg[0]));
- nonce2 = be32_to_cpu(*((__be32 *)&tests[i].msg[4]));
- put_unaligned_be32(nonce1, &msg[0]);
- put_unaligned_be32(nonce2, &msg[4]);
- mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac);
- for (j = 0; j < 32; ++j)
- sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff);
- hmac_hex[64] = 0;
- KUNIT_EXPECT_STREQ(test, &hmac_hex[0], tests[i].result);
- }
- }
- static struct kunit_case mptcp_crypto_test_cases[] = {
- KUNIT_CASE(mptcp_crypto_test_basic),
- {}
- };
- static struct kunit_suite mptcp_crypto_suite = {
- .name = "mptcp-crypto",
- .test_cases = mptcp_crypto_test_cases,
- };
- kunit_test_suite(mptcp_crypto_suite);
- MODULE_LICENSE("GPL");
|