Loading...
// SPDX-License-Identifier: GPL-2.0 #include <kunit/test.h> #include "protocol.h" struct test_case { char *key; char *msg; char *result; }; /* we can't reuse RFC 4231 test vectors, as we have constraint on the * input and key size. */ static struct test_case tests[] = { { .key = "0b0b0b0b0b0b0b0b", .msg = "48692054", .result = "8385e24fb4235ac37556b6b886db106284a1da671699f46db1f235ec622dcafa", }, { .key = "aaaaaaaaaaaaaaaa", .msg = "dddddddd", .result = "2c5e219164ff1dca1c4a92318d847bb6b9d44492984e1eb71aff9022f71046e9", }, { .key = "0102030405060708", .msg = "cdcdcdcd", .result = "e73b9ba9969969cefb04aa0d6df18ec2fcc075b6f23b4d8c4da736a5dbbc6e7d", }, }; static void mptcp_crypto_test_basic(struct kunit *test) { char hmac[32], hmac_hex[65]; u32 nonce1, nonce2; u64 key1, key2; u8 msg[8]; int i, j; for (i = 0; i < ARRAY_SIZE(tests); ++i) { /* mptcp hmap will convert to be before computing the hmac */ key1 = be64_to_cpu(*((__be64 *)&tests[i].key[0])); key2 = be64_to_cpu(*((__be64 *)&tests[i].key[8])); nonce1 = be32_to_cpu(*((__be32 *)&tests[i].msg[0])); nonce2 = be32_to_cpu(*((__be32 *)&tests[i].msg[4])); put_unaligned_be32(nonce1, &msg[0]); put_unaligned_be32(nonce2, &msg[4]); mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); for (j = 0; j < 32; ++j) sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); hmac_hex[64] = 0; KUNIT_EXPECT_STREQ(test, &hmac_hex[0], tests[i].result); } } static struct kunit_case mptcp_crypto_test_cases[] = { KUNIT_CASE(mptcp_crypto_test_basic), {} }; static struct kunit_suite mptcp_crypto_suite = { .name = "mptcp-crypto", .test_cases = mptcp_crypto_test_cases, }; kunit_test_suite(mptcp_crypto_suite); MODULE_LICENSE("GPL"); |