summaryrefslogtreecommitdiff
path: root/crypto/Kconfig
diff options
context:
space:
mode:
authorEric Biggers <ebiggers@google.com>2019-05-28 09:40:55 -0700
committerHerbert Xu <herbert@gondor.apana.org.au>2019-06-06 14:38:57 +0800
commitb15f05e1647f8d35ec211b92ec0c02e867ee1e38 (patch)
treecf025b36114d4d91fbb9b6c33bbcac2c13b767ba /crypto/Kconfig
parenta81be6b6c95e120577546f937a99e28da80fdcb0 (diff)
downloadlinux-crypto-b15f05e1647f8d35ec211b92ec0c02e867ee1e38.tar.gz
linux-crypto-b15f05e1647f8d35ec211b92ec0c02e867ee1e38.zip
crypto: testmgr - test the shash API
For hash algorithms implemented using the "shash" algorithm type, test both the ahash and shash APIs, not just the ahash API. Testing the ahash API already tests the shash API indirectly, which is normally good enough. However, there have been corner cases where there have been shash bugs that don't get exposed through the ahash API. So, update testmgr to test the shash API too. This would have detected the arm64 SHA-1 and SHA-2 bugs for which fixes were just sent out (https://patchwork.kernel.org/patch/10964843/ and https://patchwork.kernel.org/patch/10965089/): alg: shash: sha1-ce test failed (wrong result) on test vector 0, cfg="init+finup aligned buffer" alg: shash: sha224-ce test failed (wrong result) on test vector 0, cfg="init+finup aligned buffer" alg: shash: sha256-ce test failed (wrong result) on test vector 0, cfg="init+finup aligned buffer" This also would have detected the bugs fixed by commit 248a4a0238f3 ("crypto: crct10dif-generic - fix use via crypto_shash_digest()") and commit dec3d0b1071a ("crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()"). Signed-off-by: Eric Biggers <ebiggers@google.com> Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/Kconfig')
0 files changed, 0 insertions, 0 deletions