xref: /linux/net/sunrpc/auth_gss/gss_krb5_test.c (revision c532de5a67a70f8533d495f8f2aaa9a0491c3ad0)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * Copyright (c) 2022 Oracle and/or its affiliates.
4  *
5  * KUnit test of SunRPC's GSS Kerberos mechanism. Subsystem
6  * name is "rpcsec_gss_krb5".
7  */
8 
9 #include <kunit/test.h>
10 #include <kunit/visibility.h>
11 
12 #include <linux/kernel.h>
13 #include <crypto/hash.h>
14 
15 #include <linux/sunrpc/xdr.h>
16 #include <linux/sunrpc/gss_krb5.h>
17 
18 #include "gss_krb5_internal.h"
19 
20 MODULE_IMPORT_NS(EXPORTED_FOR_KUNIT_TESTING);
21 
22 struct gss_krb5_test_param {
23 	const char			*desc;
24 	u32				enctype;
25 	u32				nfold;
26 	u32				constant;
27 	const struct xdr_netobj		*base_key;
28 	const struct xdr_netobj		*Ke;
29 	const struct xdr_netobj		*usage;
30 	const struct xdr_netobj		*plaintext;
31 	const struct xdr_netobj		*confounder;
32 	const struct xdr_netobj		*expected_result;
33 	const struct xdr_netobj		*expected_hmac;
34 	const struct xdr_netobj		*next_iv;
35 };
36 
37 static inline void gss_krb5_get_desc(const struct gss_krb5_test_param *param,
38 				     char *desc)
39 {
40 	strscpy(desc, param->desc, KUNIT_PARAM_DESC_SIZE);
41 }
42 
43 static void kdf_case(struct kunit *test)
44 {
45 	const struct gss_krb5_test_param *param = test->param_value;
46 	const struct gss_krb5_enctype *gk5e;
47 	struct xdr_netobj derivedkey;
48 	int err;
49 
50 	/* Arrange */
51 	gk5e = gss_krb5_lookup_enctype(param->enctype);
52 	if (!gk5e)
53 		kunit_skip(test, "Encryption type is not available");
54 
55 	derivedkey.data = kunit_kzalloc(test, param->expected_result->len,
56 					GFP_KERNEL);
57 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, derivedkey.data);
58 	derivedkey.len = param->expected_result->len;
59 
60 	/* Act */
61 	err = gk5e->derive_key(gk5e, param->base_key, &derivedkey,
62 			       param->usage, GFP_KERNEL);
63 	KUNIT_ASSERT_EQ(test, err, 0);
64 
65 	/* Assert */
66 	KUNIT_EXPECT_EQ_MSG(test,
67 			    memcmp(param->expected_result->data,
68 				   derivedkey.data, derivedkey.len), 0,
69 			    "key mismatch");
70 }
71 
72 static void checksum_case(struct kunit *test)
73 {
74 	const struct gss_krb5_test_param *param = test->param_value;
75 	struct xdr_buf buf = {
76 		.head[0].iov_len	= param->plaintext->len,
77 		.len			= param->plaintext->len,
78 	};
79 	const struct gss_krb5_enctype *gk5e;
80 	struct xdr_netobj Kc, checksum;
81 	struct crypto_ahash *tfm;
82 	int err;
83 
84 	/* Arrange */
85 	gk5e = gss_krb5_lookup_enctype(param->enctype);
86 	if (!gk5e)
87 		kunit_skip(test, "Encryption type is not available");
88 
89 	Kc.len = gk5e->Kc_length;
90 	Kc.data = kunit_kzalloc(test, Kc.len, GFP_KERNEL);
91 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Kc.data);
92 	err = gk5e->derive_key(gk5e, param->base_key, &Kc,
93 			       param->usage, GFP_KERNEL);
94 	KUNIT_ASSERT_EQ(test, err, 0);
95 
96 	tfm = crypto_alloc_ahash(gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC);
97 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, tfm);
98 	err = crypto_ahash_setkey(tfm, Kc.data, Kc.len);
99 	KUNIT_ASSERT_EQ(test, err, 0);
100 
101 	buf.head[0].iov_base = kunit_kzalloc(test, buf.head[0].iov_len, GFP_KERNEL);
102 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, buf.head[0].iov_base);
103 	memcpy(buf.head[0].iov_base, param->plaintext->data, buf.head[0].iov_len);
104 
105 	checksum.len = gk5e->cksumlength;
106 	checksum.data = kunit_kzalloc(test, checksum.len, GFP_KERNEL);
107 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, checksum.data);
108 
109 	/* Act */
110 	err = gss_krb5_checksum(tfm, NULL, 0, &buf, 0, &checksum);
111 	KUNIT_ASSERT_EQ(test, err, 0);
112 
113 	/* Assert */
114 	KUNIT_EXPECT_EQ_MSG(test,
115 			    memcmp(param->expected_result->data,
116 				   checksum.data, checksum.len), 0,
117 			    "checksum mismatch");
118 
119 	crypto_free_ahash(tfm);
120 }
121 
122 #define DEFINE_HEX_XDR_NETOBJ(name, hex_array...)		\
123 	static const u8 name ## _data[] = { hex_array };	\
124 	static const struct xdr_netobj name = {			\
125 		.data	= (u8 *)name##_data,			\
126 		.len	= sizeof(name##_data),			\
127 	}
128 
129 #define DEFINE_STR_XDR_NETOBJ(name, string)			\
130 	static const u8 name ## _str[] = string;		\
131 	static const struct xdr_netobj name = {			\
132 		.data	= (u8 *)name##_str,			\
133 		.len	= sizeof(name##_str) - 1,		\
134 	}
135 
136 /*
137  * RFC 3961 Appendix A.1.  n-fold
138  *
139  * The n-fold function is defined in section 5.1 of RFC 3961.
140  *
141  * This test material is copyright (C) The Internet Society (2005).
142  */
143 
144 DEFINE_HEX_XDR_NETOBJ(nfold_test1_plaintext,
145 		      0x30, 0x31, 0x32, 0x33, 0x34, 0x35
146 );
147 DEFINE_HEX_XDR_NETOBJ(nfold_test1_expected_result,
148 		      0xbe, 0x07, 0x26, 0x31, 0x27, 0x6b, 0x19, 0x55
149 );
150 
151 DEFINE_HEX_XDR_NETOBJ(nfold_test2_plaintext,
152 		      0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64
153 );
154 DEFINE_HEX_XDR_NETOBJ(nfold_test2_expected_result,
155 		      0x78, 0xa0, 0x7b, 0x6c, 0xaf, 0x85, 0xfa
156 );
157 
158 DEFINE_HEX_XDR_NETOBJ(nfold_test3_plaintext,
159 		      0x52, 0x6f, 0x75, 0x67, 0x68, 0x20, 0x43, 0x6f,
160 		      0x6e, 0x73, 0x65, 0x6e, 0x73, 0x75, 0x73, 0x2c,
161 		      0x20, 0x61, 0x6e, 0x64, 0x20, 0x52, 0x75, 0x6e,
162 		      0x6e, 0x69, 0x6e, 0x67, 0x20, 0x43, 0x6f, 0x64,
163 		      0x65
164 );
165 DEFINE_HEX_XDR_NETOBJ(nfold_test3_expected_result,
166 		      0xbb, 0x6e, 0xd3, 0x08, 0x70, 0xb7, 0xf0, 0xe0
167 );
168 
169 DEFINE_HEX_XDR_NETOBJ(nfold_test4_plaintext,
170 		      0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64
171 );
172 DEFINE_HEX_XDR_NETOBJ(nfold_test4_expected_result,
173 		      0x59, 0xe4, 0xa8, 0xca, 0x7c, 0x03, 0x85, 0xc3,
174 		      0xc3, 0x7b, 0x3f, 0x6d, 0x20, 0x00, 0x24, 0x7c,
175 		      0xb6, 0xe6, 0xbd, 0x5b, 0x3e
176 );
177 
178 DEFINE_HEX_XDR_NETOBJ(nfold_test5_plaintext,
179 		      0x4d, 0x41, 0x53, 0x53, 0x41, 0x43, 0x48, 0x56,
180 		      0x53, 0x45, 0x54, 0x54, 0x53, 0x20, 0x49, 0x4e,
181 		      0x53, 0x54, 0x49, 0x54, 0x56, 0x54, 0x45, 0x20,
182 		      0x4f, 0x46, 0x20, 0x54, 0x45, 0x43, 0x48, 0x4e,
183 		      0x4f, 0x4c, 0x4f, 0x47, 0x59
184 );
185 DEFINE_HEX_XDR_NETOBJ(nfold_test5_expected_result,
186 		      0xdb, 0x3b, 0x0d, 0x8f, 0x0b, 0x06, 0x1e, 0x60,
187 		      0x32, 0x82, 0xb3, 0x08, 0xa5, 0x08, 0x41, 0x22,
188 		      0x9a, 0xd7, 0x98, 0xfa, 0xb9, 0x54, 0x0c, 0x1b
189 );
190 
191 DEFINE_HEX_XDR_NETOBJ(nfold_test6_plaintext,
192 		      0x51
193 );
194 DEFINE_HEX_XDR_NETOBJ(nfold_test6_expected_result,
195 		      0x51, 0x8a, 0x54, 0xa2, 0x15, 0xa8, 0x45, 0x2a,
196 		      0x51, 0x8a, 0x54, 0xa2, 0x15, 0xa8, 0x45, 0x2a,
197 		      0x51, 0x8a, 0x54, 0xa2, 0x15
198 );
199 
200 DEFINE_HEX_XDR_NETOBJ(nfold_test7_plaintext,
201 		      0x62, 0x61
202 );
203 DEFINE_HEX_XDR_NETOBJ(nfold_test7_expected_result,
204 		      0xfb, 0x25, 0xd5, 0x31, 0xae, 0x89, 0x74, 0x49,
205 		      0x9f, 0x52, 0xfd, 0x92, 0xea, 0x98, 0x57, 0xc4,
206 		      0xba, 0x24, 0xcf, 0x29, 0x7e
207 );
208 
209 DEFINE_HEX_XDR_NETOBJ(nfold_test_kerberos,
210 		      0x6b, 0x65, 0x72, 0x62, 0x65, 0x72, 0x6f, 0x73
211 );
212 DEFINE_HEX_XDR_NETOBJ(nfold_test8_expected_result,
213 		      0x6b, 0x65, 0x72, 0x62, 0x65, 0x72, 0x6f, 0x73
214 );
215 DEFINE_HEX_XDR_NETOBJ(nfold_test9_expected_result,
216 		      0x6b, 0x65, 0x72, 0x62, 0x65, 0x72, 0x6f, 0x73,
217 		      0x7b, 0x9b, 0x5b, 0x2b, 0x93, 0x13, 0x2b, 0x93
218 );
219 DEFINE_HEX_XDR_NETOBJ(nfold_test10_expected_result,
220 		      0x83, 0x72, 0xc2, 0x36, 0x34, 0x4e, 0x5f, 0x15,
221 		      0x50, 0xcd, 0x07, 0x47, 0xe1, 0x5d, 0x62, 0xca,
222 		      0x7a, 0x5a, 0x3b, 0xce, 0xa4
223 );
224 DEFINE_HEX_XDR_NETOBJ(nfold_test11_expected_result,
225 		      0x6b, 0x65, 0x72, 0x62, 0x65, 0x72, 0x6f, 0x73,
226 		      0x7b, 0x9b, 0x5b, 0x2b, 0x93, 0x13, 0x2b, 0x93,
227 		      0x5c, 0x9b, 0xdc, 0xda, 0xd9, 0x5c, 0x98, 0x99,
228 		      0xc4, 0xca, 0xe4, 0xde, 0xe6, 0xd6, 0xca, 0xe4
229 );
230 
231 static const struct gss_krb5_test_param rfc3961_nfold_test_params[] = {
232 	{
233 		.desc			= "64-fold(\"012345\")",
234 		.nfold			= 64,
235 		.plaintext		= &nfold_test1_plaintext,
236 		.expected_result	= &nfold_test1_expected_result,
237 	},
238 	{
239 		.desc			= "56-fold(\"password\")",
240 		.nfold			= 56,
241 		.plaintext		= &nfold_test2_plaintext,
242 		.expected_result	= &nfold_test2_expected_result,
243 	},
244 	{
245 		.desc			= "64-fold(\"Rough Consensus, and Running Code\")",
246 		.nfold			= 64,
247 		.plaintext		= &nfold_test3_plaintext,
248 		.expected_result	= &nfold_test3_expected_result,
249 	},
250 	{
251 		.desc			= "168-fold(\"password\")",
252 		.nfold			= 168,
253 		.plaintext		= &nfold_test4_plaintext,
254 		.expected_result	= &nfold_test4_expected_result,
255 	},
256 	{
257 		.desc			= "192-fold(\"MASSACHVSETTS INSTITVTE OF TECHNOLOGY\")",
258 		.nfold			= 192,
259 		.plaintext		= &nfold_test5_plaintext,
260 		.expected_result	= &nfold_test5_expected_result,
261 	},
262 	{
263 		.desc			= "168-fold(\"Q\")",
264 		.nfold			= 168,
265 		.plaintext		= &nfold_test6_plaintext,
266 		.expected_result	= &nfold_test6_expected_result,
267 	},
268 	{
269 		.desc			= "168-fold(\"ba\")",
270 		.nfold			= 168,
271 		.plaintext		= &nfold_test7_plaintext,
272 		.expected_result	= &nfold_test7_expected_result,
273 	},
274 	{
275 		.desc			= "64-fold(\"kerberos\")",
276 		.nfold			= 64,
277 		.plaintext		= &nfold_test_kerberos,
278 		.expected_result	= &nfold_test8_expected_result,
279 	},
280 	{
281 		.desc			= "128-fold(\"kerberos\")",
282 		.nfold			= 128,
283 		.plaintext		= &nfold_test_kerberos,
284 		.expected_result	= &nfold_test9_expected_result,
285 	},
286 	{
287 		.desc			= "168-fold(\"kerberos\")",
288 		.nfold			= 168,
289 		.plaintext		= &nfold_test_kerberos,
290 		.expected_result	= &nfold_test10_expected_result,
291 	},
292 	{
293 		.desc			= "256-fold(\"kerberos\")",
294 		.nfold			= 256,
295 		.plaintext		= &nfold_test_kerberos,
296 		.expected_result	= &nfold_test11_expected_result,
297 	},
298 };
299 
300 /* Creates the function rfc3961_nfold_gen_params */
301 KUNIT_ARRAY_PARAM(rfc3961_nfold, rfc3961_nfold_test_params, gss_krb5_get_desc);
302 
303 static void rfc3961_nfold_case(struct kunit *test)
304 {
305 	const struct gss_krb5_test_param *param = test->param_value;
306 	u8 *result;
307 
308 	/* Arrange */
309 	result = kunit_kzalloc(test, 4096, GFP_KERNEL);
310 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, result);
311 
312 	/* Act */
313 	krb5_nfold(param->plaintext->len * 8, param->plaintext->data,
314 		   param->expected_result->len * 8, result);
315 
316 	/* Assert */
317 	KUNIT_EXPECT_EQ_MSG(test,
318 			    memcmp(param->expected_result->data,
319 				   result, param->expected_result->len), 0,
320 			    "result mismatch");
321 }
322 
323 static struct kunit_case rfc3961_test_cases[] = {
324 	{
325 		.name			= "RFC 3961 n-fold",
326 		.run_case		= rfc3961_nfold_case,
327 		.generate_params	= rfc3961_nfold_gen_params,
328 	},
329 	{}
330 };
331 
332 static struct kunit_suite rfc3961_suite = {
333 	.name			= "RFC 3961 tests",
334 	.test_cases		= rfc3961_test_cases,
335 };
336 
337 /*
338  * From RFC 3962 Appendix B:   Sample Test Vectors
339  *
340  * Some test vectors for CBC with ciphertext stealing, using an
341  * initial vector of all-zero.
342  *
343  * This test material is copyright (C) The Internet Society (2005).
344  */
345 
346 DEFINE_HEX_XDR_NETOBJ(rfc3962_encryption_key,
347 		      0x63, 0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x20,
348 		      0x74, 0x65, 0x72, 0x69, 0x79, 0x61, 0x6b, 0x69
349 );
350 
351 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test1_plaintext,
352 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
353 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
354 		      0x20
355 );
356 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test1_expected_result,
357 		      0xc6, 0x35, 0x35, 0x68, 0xf2, 0xbf, 0x8c, 0xb4,
358 		      0xd8, 0xa5, 0x80, 0x36, 0x2d, 0xa7, 0xff, 0x7f,
359 		      0x97
360 );
361 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test1_next_iv,
362 		      0xc6, 0x35, 0x35, 0x68, 0xf2, 0xbf, 0x8c, 0xb4,
363 		      0xd8, 0xa5, 0x80, 0x36, 0x2d, 0xa7, 0xff, 0x7f
364 );
365 
366 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test2_plaintext,
367 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
368 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
369 		      0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
370 		      0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20
371 );
372 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test2_expected_result,
373 		      0xfc, 0x00, 0x78, 0x3e, 0x0e, 0xfd, 0xb2, 0xc1,
374 		      0xd4, 0x45, 0xd4, 0xc8, 0xef, 0xf7, 0xed, 0x22,
375 		      0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
376 		      0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5
377 );
378 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test2_next_iv,
379 		      0xfc, 0x00, 0x78, 0x3e, 0x0e, 0xfd, 0xb2, 0xc1,
380 		      0xd4, 0x45, 0xd4, 0xc8, 0xef, 0xf7, 0xed, 0x22
381 );
382 
383 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test3_plaintext,
384 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
385 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
386 		      0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
387 		      0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43
388 );
389 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test3_expected_result,
390 		      0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
391 		      0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
392 		      0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
393 		      0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84
394 );
395 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test3_next_iv,
396 		      0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
397 		      0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8
398 );
399 
400 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test4_plaintext,
401 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
402 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
403 		      0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
404 		      0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
405 		      0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
406 		      0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c
407 );
408 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test4_expected_result,
409 		      0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
410 		      0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
411 		      0xb3, 0xff, 0xfd, 0x94, 0x0c, 0x16, 0xa1, 0x8c,
412 		      0x1b, 0x55, 0x49, 0xd2, 0xf8, 0x38, 0x02, 0x9e,
413 		      0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
414 		      0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5
415 );
416 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test4_next_iv,
417 		      0xb3, 0xff, 0xfd, 0x94, 0x0c, 0x16, 0xa1, 0x8c,
418 		      0x1b, 0x55, 0x49, 0xd2, 0xf8, 0x38, 0x02, 0x9e
419 );
420 
421 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test5_plaintext,
422 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
423 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
424 		      0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
425 		      0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
426 		      0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
427 		      0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20
428 );
429 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test5_expected_result,
430 		      0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
431 		      0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
432 		      0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
433 		      0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8,
434 		      0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
435 		      0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8
436 );
437 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test5_next_iv,
438 		      0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
439 		      0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8
440 );
441 
442 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test6_plaintext,
443 		      0x49, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20,
444 		      0x6c, 0x69, 0x6b, 0x65, 0x20, 0x74, 0x68, 0x65,
445 		      0x20, 0x47, 0x65, 0x6e, 0x65, 0x72, 0x61, 0x6c,
446 		      0x20, 0x47, 0x61, 0x75, 0x27, 0x73, 0x20, 0x43,
447 		      0x68, 0x69, 0x63, 0x6b, 0x65, 0x6e, 0x2c, 0x20,
448 		      0x70, 0x6c, 0x65, 0x61, 0x73, 0x65, 0x2c, 0x20,
449 		      0x61, 0x6e, 0x64, 0x20, 0x77, 0x6f, 0x6e, 0x74,
450 		      0x6f, 0x6e, 0x20, 0x73, 0x6f, 0x75, 0x70, 0x2e
451 );
452 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test6_expected_result,
453 		      0x97, 0x68, 0x72, 0x68, 0xd6, 0xec, 0xcc, 0xc0,
454 		      0xc0, 0x7b, 0x25, 0xe2, 0x5e, 0xcf, 0xe5, 0x84,
455 		      0x39, 0x31, 0x25, 0x23, 0xa7, 0x86, 0x62, 0xd5,
456 		      0xbe, 0x7f, 0xcb, 0xcc, 0x98, 0xeb, 0xf5, 0xa8,
457 		      0x48, 0x07, 0xef, 0xe8, 0x36, 0xee, 0x89, 0xa5,
458 		      0x26, 0x73, 0x0d, 0xbc, 0x2f, 0x7b, 0xc8, 0x40,
459 		      0x9d, 0xad, 0x8b, 0xbb, 0x96, 0xc4, 0xcd, 0xc0,
460 		      0x3b, 0xc1, 0x03, 0xe1, 0xa1, 0x94, 0xbb, 0xd8
461 );
462 DEFINE_HEX_XDR_NETOBJ(rfc3962_enc_test6_next_iv,
463 		      0x48, 0x07, 0xef, 0xe8, 0x36, 0xee, 0x89, 0xa5,
464 		      0x26, 0x73, 0x0d, 0xbc, 0x2f, 0x7b, 0xc8, 0x40
465 );
466 
467 static const struct gss_krb5_test_param rfc3962_encrypt_test_params[] = {
468 	{
469 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 1",
470 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
471 		.Ke			= &rfc3962_encryption_key,
472 		.plaintext		= &rfc3962_enc_test1_plaintext,
473 		.expected_result	= &rfc3962_enc_test1_expected_result,
474 		.next_iv		= &rfc3962_enc_test1_next_iv,
475 	},
476 	{
477 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 2",
478 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
479 		.Ke			= &rfc3962_encryption_key,
480 		.plaintext		= &rfc3962_enc_test2_plaintext,
481 		.expected_result	= &rfc3962_enc_test2_expected_result,
482 		.next_iv		= &rfc3962_enc_test2_next_iv,
483 	},
484 	{
485 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 3",
486 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
487 		.Ke			= &rfc3962_encryption_key,
488 		.plaintext		= &rfc3962_enc_test3_plaintext,
489 		.expected_result	= &rfc3962_enc_test3_expected_result,
490 		.next_iv		= &rfc3962_enc_test3_next_iv,
491 	},
492 	{
493 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 4",
494 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
495 		.Ke			= &rfc3962_encryption_key,
496 		.plaintext		= &rfc3962_enc_test4_plaintext,
497 		.expected_result	= &rfc3962_enc_test4_expected_result,
498 		.next_iv		= &rfc3962_enc_test4_next_iv,
499 	},
500 	{
501 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 5",
502 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
503 		.Ke			= &rfc3962_encryption_key,
504 		.plaintext		= &rfc3962_enc_test5_plaintext,
505 		.expected_result	= &rfc3962_enc_test5_expected_result,
506 		.next_iv		= &rfc3962_enc_test5_next_iv,
507 	},
508 	{
509 		.desc			= "Encrypt with aes128-cts-hmac-sha1-96 case 6",
510 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
511 		.Ke			= &rfc3962_encryption_key,
512 		.plaintext		= &rfc3962_enc_test6_plaintext,
513 		.expected_result	= &rfc3962_enc_test6_expected_result,
514 		.next_iv		= &rfc3962_enc_test6_next_iv,
515 	},
516 };
517 
518 /* Creates the function rfc3962_encrypt_gen_params */
519 KUNIT_ARRAY_PARAM(rfc3962_encrypt, rfc3962_encrypt_test_params,
520 		  gss_krb5_get_desc);
521 
522 /*
523  * This tests the implementation of the encryption part of the mechanism.
524  * It does not apply a confounder or test the result of HMAC over the
525  * plaintext.
526  */
527 static void rfc3962_encrypt_case(struct kunit *test)
528 {
529 	const struct gss_krb5_test_param *param = test->param_value;
530 	struct crypto_sync_skcipher *cts_tfm, *cbc_tfm;
531 	const struct gss_krb5_enctype *gk5e;
532 	struct xdr_buf buf;
533 	void *iv, *text;
534 	u32 err;
535 
536 	/* Arrange */
537 	gk5e = gss_krb5_lookup_enctype(param->enctype);
538 	if (!gk5e)
539 		kunit_skip(test, "Encryption type is not available");
540 
541 	cbc_tfm = crypto_alloc_sync_skcipher(gk5e->aux_cipher, 0, 0);
542 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cbc_tfm);
543 	err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len);
544 	KUNIT_ASSERT_EQ(test, err, 0);
545 
546 	cts_tfm = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0);
547 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cts_tfm);
548 	err = crypto_sync_skcipher_setkey(cts_tfm, param->Ke->data, param->Ke->len);
549 	KUNIT_ASSERT_EQ(test, err, 0);
550 
551 	iv = kunit_kzalloc(test, crypto_sync_skcipher_ivsize(cts_tfm), GFP_KERNEL);
552 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, iv);
553 
554 	text = kunit_kzalloc(test, param->plaintext->len, GFP_KERNEL);
555 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, text);
556 
557 	memcpy(text, param->plaintext->data, param->plaintext->len);
558 	memset(&buf, 0, sizeof(buf));
559 	buf.head[0].iov_base = text;
560 	buf.head[0].iov_len = param->plaintext->len;
561 	buf.len = buf.head[0].iov_len;
562 
563 	/* Act */
564 	err = krb5_cbc_cts_encrypt(cts_tfm, cbc_tfm, 0, &buf, NULL,
565 				   iv, crypto_sync_skcipher_ivsize(cts_tfm));
566 	KUNIT_ASSERT_EQ(test, err, 0);
567 
568 	/* Assert */
569 	KUNIT_EXPECT_EQ_MSG(test,
570 			    param->expected_result->len, buf.len,
571 			    "ciphertext length mismatch");
572 	KUNIT_EXPECT_EQ_MSG(test,
573 			    memcmp(param->expected_result->data,
574 				   text, param->expected_result->len), 0,
575 			    "ciphertext mismatch");
576 	KUNIT_EXPECT_EQ_MSG(test,
577 			    memcmp(param->next_iv->data, iv,
578 				   param->next_iv->len), 0,
579 			    "IV mismatch");
580 
581 	crypto_free_sync_skcipher(cts_tfm);
582 	crypto_free_sync_skcipher(cbc_tfm);
583 }
584 
585 static struct kunit_case rfc3962_test_cases[] = {
586 	{
587 		.name			= "RFC 3962 encryption",
588 		.run_case		= rfc3962_encrypt_case,
589 		.generate_params	= rfc3962_encrypt_gen_params,
590 	},
591 	{}
592 };
593 
594 static struct kunit_suite rfc3962_suite = {
595 	.name			= "RFC 3962 suite",
596 	.test_cases		= rfc3962_test_cases,
597 };
598 
599 /*
600  * From RFC 6803 Section 10.  Test vectors
601  *
602  * Sample results for key derivation
603  *
604  * Copyright (c) 2012 IETF Trust and the persons identified as the
605  * document authors.  All rights reserved.
606  */
607 
608 DEFINE_HEX_XDR_NETOBJ(camellia128_cts_cmac_basekey,
609 		      0x57, 0xd0, 0x29, 0x72, 0x98, 0xff, 0xd9, 0xd3,
610 		      0x5d, 0xe5, 0xa4, 0x7f, 0xb4, 0xbd, 0xe2, 0x4b
611 );
612 DEFINE_HEX_XDR_NETOBJ(camellia128_cts_cmac_Kc,
613 		      0xd1, 0x55, 0x77, 0x5a, 0x20, 0x9d, 0x05, 0xf0,
614 		      0x2b, 0x38, 0xd4, 0x2a, 0x38, 0x9e, 0x5a, 0x56
615 );
616 DEFINE_HEX_XDR_NETOBJ(camellia128_cts_cmac_Ke,
617 		      0x64, 0xdf, 0x83, 0xf8, 0x5a, 0x53, 0x2f, 0x17,
618 		      0x57, 0x7d, 0x8c, 0x37, 0x03, 0x57, 0x96, 0xab
619 );
620 DEFINE_HEX_XDR_NETOBJ(camellia128_cts_cmac_Ki,
621 		      0x3e, 0x4f, 0xbd, 0xf3, 0x0f, 0xb8, 0x25, 0x9c,
622 		      0x42, 0x5c, 0xb6, 0xc9, 0x6f, 0x1f, 0x46, 0x35
623 );
624 
625 DEFINE_HEX_XDR_NETOBJ(camellia256_cts_cmac_basekey,
626 		      0xb9, 0xd6, 0x82, 0x8b, 0x20, 0x56, 0xb7, 0xbe,
627 		      0x65, 0x6d, 0x88, 0xa1, 0x23, 0xb1, 0xfa, 0xc6,
628 		      0x82, 0x14, 0xac, 0x2b, 0x72, 0x7e, 0xcf, 0x5f,
629 		      0x69, 0xaf, 0xe0, 0xc4, 0xdf, 0x2a, 0x6d, 0x2c
630 );
631 DEFINE_HEX_XDR_NETOBJ(camellia256_cts_cmac_Kc,
632 		      0xe4, 0x67, 0xf9, 0xa9, 0x55, 0x2b, 0xc7, 0xd3,
633 		      0x15, 0x5a, 0x62, 0x20, 0xaf, 0x9c, 0x19, 0x22,
634 		      0x0e, 0xee, 0xd4, 0xff, 0x78, 0xb0, 0xd1, 0xe6,
635 		      0xa1, 0x54, 0x49, 0x91, 0x46, 0x1a, 0x9e, 0x50
636 );
637 DEFINE_HEX_XDR_NETOBJ(camellia256_cts_cmac_Ke,
638 		      0x41, 0x2a, 0xef, 0xc3, 0x62, 0xa7, 0x28, 0x5f,
639 		      0xc3, 0x96, 0x6c, 0x6a, 0x51, 0x81, 0xe7, 0x60,
640 		      0x5a, 0xe6, 0x75, 0x23, 0x5b, 0x6d, 0x54, 0x9f,
641 		      0xbf, 0xc9, 0xab, 0x66, 0x30, 0xa4, 0xc6, 0x04
642 );
643 DEFINE_HEX_XDR_NETOBJ(camellia256_cts_cmac_Ki,
644 		      0xfa, 0x62, 0x4f, 0xa0, 0xe5, 0x23, 0x99, 0x3f,
645 		      0xa3, 0x88, 0xae, 0xfd, 0xc6, 0x7e, 0x67, 0xeb,
646 		      0xcd, 0x8c, 0x08, 0xe8, 0xa0, 0x24, 0x6b, 0x1d,
647 		      0x73, 0xb0, 0xd1, 0xdd, 0x9f, 0xc5, 0x82, 0xb0
648 );
649 
650 DEFINE_HEX_XDR_NETOBJ(usage_checksum,
651 		      0x00, 0x00, 0x00, 0x02, KEY_USAGE_SEED_CHECKSUM
652 );
653 DEFINE_HEX_XDR_NETOBJ(usage_encryption,
654 		      0x00, 0x00, 0x00, 0x02, KEY_USAGE_SEED_ENCRYPTION
655 );
656 DEFINE_HEX_XDR_NETOBJ(usage_integrity,
657 		      0x00, 0x00, 0x00, 0x02, KEY_USAGE_SEED_INTEGRITY
658 );
659 
660 static const struct gss_krb5_test_param rfc6803_kdf_test_params[] = {
661 	{
662 		.desc			= "Derive Kc subkey for camellia128-cts-cmac",
663 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
664 		.base_key		= &camellia128_cts_cmac_basekey,
665 		.usage			= &usage_checksum,
666 		.expected_result	= &camellia128_cts_cmac_Kc,
667 	},
668 	{
669 		.desc			= "Derive Ke subkey for camellia128-cts-cmac",
670 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
671 		.base_key		= &camellia128_cts_cmac_basekey,
672 		.usage			= &usage_encryption,
673 		.expected_result	= &camellia128_cts_cmac_Ke,
674 	},
675 	{
676 		.desc			= "Derive Ki subkey for camellia128-cts-cmac",
677 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
678 		.base_key		= &camellia128_cts_cmac_basekey,
679 		.usage			= &usage_integrity,
680 		.expected_result	= &camellia128_cts_cmac_Ki,
681 	},
682 	{
683 		.desc			= "Derive Kc subkey for camellia256-cts-cmac",
684 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
685 		.base_key		= &camellia256_cts_cmac_basekey,
686 		.usage			= &usage_checksum,
687 		.expected_result	= &camellia256_cts_cmac_Kc,
688 	},
689 	{
690 		.desc			= "Derive Ke subkey for camellia256-cts-cmac",
691 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
692 		.base_key		= &camellia256_cts_cmac_basekey,
693 		.usage			= &usage_encryption,
694 		.expected_result	= &camellia256_cts_cmac_Ke,
695 	},
696 	{
697 		.desc			= "Derive Ki subkey for camellia256-cts-cmac",
698 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
699 		.base_key		= &camellia256_cts_cmac_basekey,
700 		.usage			= &usage_integrity,
701 		.expected_result	= &camellia256_cts_cmac_Ki,
702 	},
703 };
704 
705 /* Creates the function rfc6803_kdf_gen_params */
706 KUNIT_ARRAY_PARAM(rfc6803_kdf, rfc6803_kdf_test_params, gss_krb5_get_desc);
707 
708 /*
709  * From RFC 6803 Section 10.  Test vectors
710  *
711  * Sample checksums.
712  *
713  * Copyright (c) 2012 IETF Trust and the persons identified as the
714  * document authors.  All rights reserved.
715  *
716  * XXX: These tests are likely to fail on EBCDIC or Unicode platforms.
717  */
718 DEFINE_STR_XDR_NETOBJ(rfc6803_checksum_test1_plaintext,
719 		      "abcdefghijk");
720 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test1_basekey,
721 		      0x1d, 0xc4, 0x6a, 0x8d, 0x76, 0x3f, 0x4f, 0x93,
722 		      0x74, 0x2b, 0xcb, 0xa3, 0x38, 0x75, 0x76, 0xc3
723 );
724 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test1_usage,
725 		      0x00, 0x00, 0x00, 0x07, KEY_USAGE_SEED_CHECKSUM
726 );
727 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test1_expected_result,
728 		      0x11, 0x78, 0xe6, 0xc5, 0xc4, 0x7a, 0x8c, 0x1a,
729 		      0xe0, 0xc4, 0xb9, 0xc7, 0xd4, 0xeb, 0x7b, 0x6b
730 );
731 
732 DEFINE_STR_XDR_NETOBJ(rfc6803_checksum_test2_plaintext,
733 		      "ABCDEFGHIJKLMNOPQRSTUVWXYZ");
734 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test2_basekey,
735 		      0x50, 0x27, 0xbc, 0x23, 0x1d, 0x0f, 0x3a, 0x9d,
736 		      0x23, 0x33, 0x3f, 0x1c, 0xa6, 0xfd, 0xbe, 0x7c
737 );
738 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test2_usage,
739 		      0x00, 0x00, 0x00, 0x08, KEY_USAGE_SEED_CHECKSUM
740 );
741 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test2_expected_result,
742 		      0xd1, 0xb3, 0x4f, 0x70, 0x04, 0xa7, 0x31, 0xf2,
743 		      0x3a, 0x0c, 0x00, 0xbf, 0x6c, 0x3f, 0x75, 0x3a
744 );
745 
746 DEFINE_STR_XDR_NETOBJ(rfc6803_checksum_test3_plaintext,
747 		      "123456789");
748 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test3_basekey,
749 		      0xb6, 0x1c, 0x86, 0xcc, 0x4e, 0x5d, 0x27, 0x57,
750 		      0x54, 0x5a, 0xd4, 0x23, 0x39, 0x9f, 0xb7, 0x03,
751 		      0x1e, 0xca, 0xb9, 0x13, 0xcb, 0xb9, 0x00, 0xbd,
752 		      0x7a, 0x3c, 0x6d, 0xd8, 0xbf, 0x92, 0x01, 0x5b
753 );
754 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test3_usage,
755 		      0x00, 0x00, 0x00, 0x09, KEY_USAGE_SEED_CHECKSUM
756 );
757 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test3_expected_result,
758 		      0x87, 0xa1, 0x2c, 0xfd, 0x2b, 0x96, 0x21, 0x48,
759 		      0x10, 0xf0, 0x1c, 0x82, 0x6e, 0x77, 0x44, 0xb1
760 );
761 
762 DEFINE_STR_XDR_NETOBJ(rfc6803_checksum_test4_plaintext,
763 		      "!@#$%^&*()!@#$%^&*()!@#$%^&*()");
764 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test4_basekey,
765 		      0x32, 0x16, 0x4c, 0x5b, 0x43, 0x4d, 0x1d, 0x15,
766 		      0x38, 0xe4, 0xcf, 0xd9, 0xbe, 0x80, 0x40, 0xfe,
767 		      0x8c, 0x4a, 0xc7, 0xac, 0xc4, 0xb9, 0x3d, 0x33,
768 		      0x14, 0xd2, 0x13, 0x36, 0x68, 0x14, 0x7a, 0x05
769 );
770 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test4_usage,
771 		      0x00, 0x00, 0x00, 0x0a, KEY_USAGE_SEED_CHECKSUM
772 );
773 DEFINE_HEX_XDR_NETOBJ(rfc6803_checksum_test4_expected_result,
774 		      0x3f, 0xa0, 0xb4, 0x23, 0x55, 0xe5, 0x2b, 0x18,
775 		      0x91, 0x87, 0x29, 0x4a, 0xa2, 0x52, 0xab, 0x64
776 );
777 
778 static const struct gss_krb5_test_param rfc6803_checksum_test_params[] = {
779 	{
780 		.desc			= "camellia128-cts-cmac checksum test 1",
781 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
782 		.base_key		= &rfc6803_checksum_test1_basekey,
783 		.usage			= &rfc6803_checksum_test1_usage,
784 		.plaintext		= &rfc6803_checksum_test1_plaintext,
785 		.expected_result	= &rfc6803_checksum_test1_expected_result,
786 	},
787 	{
788 		.desc			= "camellia128-cts-cmac checksum test 2",
789 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
790 		.base_key		= &rfc6803_checksum_test2_basekey,
791 		.usage			= &rfc6803_checksum_test2_usage,
792 		.plaintext		= &rfc6803_checksum_test2_plaintext,
793 		.expected_result	= &rfc6803_checksum_test2_expected_result,
794 	},
795 	{
796 		.desc			= "camellia256-cts-cmac checksum test 3",
797 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
798 		.base_key		= &rfc6803_checksum_test3_basekey,
799 		.usage			= &rfc6803_checksum_test3_usage,
800 		.plaintext		= &rfc6803_checksum_test3_plaintext,
801 		.expected_result	= &rfc6803_checksum_test3_expected_result,
802 	},
803 	{
804 		.desc			= "camellia256-cts-cmac checksum test 4",
805 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
806 		.base_key		= &rfc6803_checksum_test4_basekey,
807 		.usage			= &rfc6803_checksum_test4_usage,
808 		.plaintext		= &rfc6803_checksum_test4_plaintext,
809 		.expected_result	= &rfc6803_checksum_test4_expected_result,
810 	},
811 };
812 
813 /* Creates the function rfc6803_checksum_gen_params */
814 KUNIT_ARRAY_PARAM(rfc6803_checksum, rfc6803_checksum_test_params,
815 		  gss_krb5_get_desc);
816 
817 /*
818  * From RFC 6803 Section 10.  Test vectors
819  *
820  * Sample encryptions (all using the default cipher state)
821  *
822  * Copyright (c) 2012 IETF Trust and the persons identified as the
823  * document authors.  All rights reserved.
824  *
825  * Key usage values are from errata 4326 against RFC 6803.
826  */
827 
828 static const struct xdr_netobj rfc6803_enc_empty_plaintext = {
829 	.len	= 0,
830 };
831 
832 DEFINE_STR_XDR_NETOBJ(rfc6803_enc_1byte_plaintext, "1");
833 DEFINE_STR_XDR_NETOBJ(rfc6803_enc_9byte_plaintext, "9 bytesss");
834 DEFINE_STR_XDR_NETOBJ(rfc6803_enc_13byte_plaintext, "13 bytes byte");
835 DEFINE_STR_XDR_NETOBJ(rfc6803_enc_30byte_plaintext,
836 		      "30 bytes bytes bytes bytes byt"
837 );
838 
839 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test1_confounder,
840 		      0xb6, 0x98, 0x22, 0xa1, 0x9a, 0x6b, 0x09, 0xc0,
841 		      0xeb, 0xc8, 0x55, 0x7d, 0x1f, 0x1b, 0x6c, 0x0a
842 );
843 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test1_basekey,
844 		      0x1d, 0xc4, 0x6a, 0x8d, 0x76, 0x3f, 0x4f, 0x93,
845 		      0x74, 0x2b, 0xcb, 0xa3, 0x38, 0x75, 0x76, 0xc3
846 );
847 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test1_expected_result,
848 		      0xc4, 0x66, 0xf1, 0x87, 0x10, 0x69, 0x92, 0x1e,
849 		      0xdb, 0x7c, 0x6f, 0xde, 0x24, 0x4a, 0x52, 0xdb,
850 		      0x0b, 0xa1, 0x0e, 0xdc, 0x19, 0x7b, 0xdb, 0x80,
851 		      0x06, 0x65, 0x8c, 0xa3, 0xcc, 0xce, 0x6e, 0xb8
852 );
853 
854 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test2_confounder,
855 		      0x6f, 0x2f, 0xc3, 0xc2, 0xa1, 0x66, 0xfd, 0x88,
856 		      0x98, 0x96, 0x7a, 0x83, 0xde, 0x95, 0x96, 0xd9
857 );
858 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test2_basekey,
859 		      0x50, 0x27, 0xbc, 0x23, 0x1d, 0x0f, 0x3a, 0x9d,
860 		      0x23, 0x33, 0x3f, 0x1c, 0xa6, 0xfd, 0xbe, 0x7c
861 );
862 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test2_expected_result,
863 		      0x84, 0x2d, 0x21, 0xfd, 0x95, 0x03, 0x11, 0xc0,
864 		      0xdd, 0x46, 0x4a, 0x3f, 0x4b, 0xe8, 0xd6, 0xda,
865 		      0x88, 0xa5, 0x6d, 0x55, 0x9c, 0x9b, 0x47, 0xd3,
866 		      0xf9, 0xa8, 0x50, 0x67, 0xaf, 0x66, 0x15, 0x59,
867 		      0xb8
868 );
869 
870 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test3_confounder,
871 		      0xa5, 0xb4, 0xa7, 0x1e, 0x07, 0x7a, 0xee, 0xf9,
872 		      0x3c, 0x87, 0x63, 0xc1, 0x8f, 0xdb, 0x1f, 0x10
873 );
874 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test3_basekey,
875 		      0xa1, 0xbb, 0x61, 0xe8, 0x05, 0xf9, 0xba, 0x6d,
876 		      0xde, 0x8f, 0xdb, 0xdd, 0xc0, 0x5c, 0xde, 0xa0
877 );
878 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test3_expected_result,
879 		      0x61, 0x9f, 0xf0, 0x72, 0xe3, 0x62, 0x86, 0xff,
880 		      0x0a, 0x28, 0xde, 0xb3, 0xa3, 0x52, 0xec, 0x0d,
881 		      0x0e, 0xdf, 0x5c, 0x51, 0x60, 0xd6, 0x63, 0xc9,
882 		      0x01, 0x75, 0x8c, 0xcf, 0x9d, 0x1e, 0xd3, 0x3d,
883 		      0x71, 0xdb, 0x8f, 0x23, 0xaa, 0xbf, 0x83, 0x48,
884 		      0xa0
885 );
886 
887 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test4_confounder,
888 		      0x19, 0xfe, 0xe4, 0x0d, 0x81, 0x0c, 0x52, 0x4b,
889 		      0x5b, 0x22, 0xf0, 0x18, 0x74, 0xc6, 0x93, 0xda
890 );
891 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test4_basekey,
892 		      0x2c, 0xa2, 0x7a, 0x5f, 0xaf, 0x55, 0x32, 0x24,
893 		      0x45, 0x06, 0x43, 0x4e, 0x1c, 0xef, 0x66, 0x76
894 );
895 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test4_expected_result,
896 		      0xb8, 0xec, 0xa3, 0x16, 0x7a, 0xe6, 0x31, 0x55,
897 		      0x12, 0xe5, 0x9f, 0x98, 0xa7, 0xc5, 0x00, 0x20,
898 		      0x5e, 0x5f, 0x63, 0xff, 0x3b, 0xb3, 0x89, 0xaf,
899 		      0x1c, 0x41, 0xa2, 0x1d, 0x64, 0x0d, 0x86, 0x15,
900 		      0xc9, 0xed, 0x3f, 0xbe, 0xb0, 0x5a, 0xb6, 0xac,
901 		      0xb6, 0x76, 0x89, 0xb5, 0xea
902 );
903 
904 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test5_confounder,
905 		      0xca, 0x7a, 0x7a, 0xb4, 0xbe, 0x19, 0x2d, 0xab,
906 		      0xd6, 0x03, 0x50, 0x6d, 0xb1, 0x9c, 0x39, 0xe2
907 );
908 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test5_basekey,
909 		      0x78, 0x24, 0xf8, 0xc1, 0x6f, 0x83, 0xff, 0x35,
910 		      0x4c, 0x6b, 0xf7, 0x51, 0x5b, 0x97, 0x3f, 0x43
911 );
912 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test5_expected_result,
913 		      0xa2, 0x6a, 0x39, 0x05, 0xa4, 0xff, 0xd5, 0x81,
914 		      0x6b, 0x7b, 0x1e, 0x27, 0x38, 0x0d, 0x08, 0x09,
915 		      0x0c, 0x8e, 0xc1, 0xf3, 0x04, 0x49, 0x6e, 0x1a,
916 		      0xbd, 0xcd, 0x2b, 0xdc, 0xd1, 0xdf, 0xfc, 0x66,
917 		      0x09, 0x89, 0xe1, 0x17, 0xa7, 0x13, 0xdd, 0xbb,
918 		      0x57, 0xa4, 0x14, 0x6c, 0x15, 0x87, 0xcb, 0xa4,
919 		      0x35, 0x66, 0x65, 0x59, 0x1d, 0x22, 0x40, 0x28,
920 		      0x2f, 0x58, 0x42, 0xb1, 0x05, 0xa5
921 );
922 
923 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test6_confounder,
924 		      0x3c, 0xbb, 0xd2, 0xb4, 0x59, 0x17, 0x94, 0x10,
925 		      0x67, 0xf9, 0x65, 0x99, 0xbb, 0x98, 0x92, 0x6c
926 );
927 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test6_basekey,
928 		      0xb6, 0x1c, 0x86, 0xcc, 0x4e, 0x5d, 0x27, 0x57,
929 		      0x54, 0x5a, 0xd4, 0x23, 0x39, 0x9f, 0xb7, 0x03,
930 		      0x1e, 0xca, 0xb9, 0x13, 0xcb, 0xb9, 0x00, 0xbd,
931 		      0x7a, 0x3c, 0x6d, 0xd8, 0xbf, 0x92, 0x01, 0x5b
932 );
933 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test6_expected_result,
934 		      0x03, 0x88, 0x6d, 0x03, 0x31, 0x0b, 0x47, 0xa6,
935 		      0xd8, 0xf0, 0x6d, 0x7b, 0x94, 0xd1, 0xdd, 0x83,
936 		      0x7e, 0xcc, 0xe3, 0x15, 0xef, 0x65, 0x2a, 0xff,
937 		      0x62, 0x08, 0x59, 0xd9, 0x4a, 0x25, 0x92, 0x66
938 );
939 
940 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test7_confounder,
941 		      0xde, 0xf4, 0x87, 0xfc, 0xeb, 0xe6, 0xde, 0x63,
942 		      0x46, 0xd4, 0xda, 0x45, 0x21, 0xbb, 0xa2, 0xd2
943 );
944 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test7_basekey,
945 		      0x1b, 0x97, 0xfe, 0x0a, 0x19, 0x0e, 0x20, 0x21,
946 		      0xeb, 0x30, 0x75, 0x3e, 0x1b, 0x6e, 0x1e, 0x77,
947 		      0xb0, 0x75, 0x4b, 0x1d, 0x68, 0x46, 0x10, 0x35,
948 		      0x58, 0x64, 0x10, 0x49, 0x63, 0x46, 0x38, 0x33
949 );
950 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test7_expected_result,
951 		      0x2c, 0x9c, 0x15, 0x70, 0x13, 0x3c, 0x99, 0xbf,
952 		      0x6a, 0x34, 0xbc, 0x1b, 0x02, 0x12, 0x00, 0x2f,
953 		      0xd1, 0x94, 0x33, 0x87, 0x49, 0xdb, 0x41, 0x35,
954 		      0x49, 0x7a, 0x34, 0x7c, 0xfc, 0xd9, 0xd1, 0x8a,
955 		      0x12
956 );
957 
958 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test8_confounder,
959 		      0xad, 0x4f, 0xf9, 0x04, 0xd3, 0x4e, 0x55, 0x53,
960 		      0x84, 0xb1, 0x41, 0x00, 0xfc, 0x46, 0x5f, 0x88
961 );
962 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test8_basekey,
963 		      0x32, 0x16, 0x4c, 0x5b, 0x43, 0x4d, 0x1d, 0x15,
964 		      0x38, 0xe4, 0xcf, 0xd9, 0xbe, 0x80, 0x40, 0xfe,
965 		      0x8c, 0x4a, 0xc7, 0xac, 0xc4, 0xb9, 0x3d, 0x33,
966 		      0x14, 0xd2, 0x13, 0x36, 0x68, 0x14, 0x7a, 0x05
967 );
968 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test8_expected_result,
969 		      0x9c, 0x6d, 0xe7, 0x5f, 0x81, 0x2d, 0xe7, 0xed,
970 		      0x0d, 0x28, 0xb2, 0x96, 0x35, 0x57, 0xa1, 0x15,
971 		      0x64, 0x09, 0x98, 0x27, 0x5b, 0x0a, 0xf5, 0x15,
972 		      0x27, 0x09, 0x91, 0x3f, 0xf5, 0x2a, 0x2a, 0x9c,
973 		      0x8e, 0x63, 0xb8, 0x72, 0xf9, 0x2e, 0x64, 0xc8,
974 		      0x39
975 );
976 
977 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test9_confounder,
978 		      0xcf, 0x9b, 0xca, 0x6d, 0xf1, 0x14, 0x4e, 0x0c,
979 		      0x0a, 0xf9, 0xb8, 0xf3, 0x4c, 0x90, 0xd5, 0x14
980 );
981 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test9_basekey,
982 		      0xb0, 0x38, 0xb1, 0x32, 0xcd, 0x8e, 0x06, 0x61,
983 		      0x22, 0x67, 0xfa, 0xb7, 0x17, 0x00, 0x66, 0xd8,
984 		      0x8a, 0xec, 0xcb, 0xa0, 0xb7, 0x44, 0xbf, 0xc6,
985 		      0x0d, 0xc8, 0x9b, 0xca, 0x18, 0x2d, 0x07, 0x15
986 );
987 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test9_expected_result,
988 		      0xee, 0xec, 0x85, 0xa9, 0x81, 0x3c, 0xdc, 0x53,
989 		      0x67, 0x72, 0xab, 0x9b, 0x42, 0xde, 0xfc, 0x57,
990 		      0x06, 0xf7, 0x26, 0xe9, 0x75, 0xdd, 0xe0, 0x5a,
991 		      0x87, 0xeb, 0x54, 0x06, 0xea, 0x32, 0x4c, 0xa1,
992 		      0x85, 0xc9, 0x98, 0x6b, 0x42, 0xaa, 0xbe, 0x79,
993 		      0x4b, 0x84, 0x82, 0x1b, 0xee
994 );
995 
996 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test10_confounder,
997 		      0x64, 0x4d, 0xef, 0x38, 0xda, 0x35, 0x00, 0x72,
998 		      0x75, 0x87, 0x8d, 0x21, 0x68, 0x55, 0xe2, 0x28
999 );
1000 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test10_basekey,
1001 		      0xcc, 0xfc, 0xd3, 0x49, 0xbf, 0x4c, 0x66, 0x77,
1002 		      0xe8, 0x6e, 0x4b, 0x02, 0xb8, 0xea, 0xb9, 0x24,
1003 		      0xa5, 0x46, 0xac, 0x73, 0x1c, 0xf9, 0xbf, 0x69,
1004 		      0x89, 0xb9, 0x96, 0xe7, 0xd6, 0xbf, 0xbb, 0xa7
1005 );
1006 DEFINE_HEX_XDR_NETOBJ(rfc6803_enc_test10_expected_result,
1007 		      0x0e, 0x44, 0x68, 0x09, 0x85, 0x85, 0x5f, 0x2d,
1008 		      0x1f, 0x18, 0x12, 0x52, 0x9c, 0xa8, 0x3b, 0xfd,
1009 		      0x8e, 0x34, 0x9d, 0xe6, 0xfd, 0x9a, 0xda, 0x0b,
1010 		      0xaa, 0xa0, 0x48, 0xd6, 0x8e, 0x26, 0x5f, 0xeb,
1011 		      0xf3, 0x4a, 0xd1, 0x25, 0x5a, 0x34, 0x49, 0x99,
1012 		      0xad, 0x37, 0x14, 0x68, 0x87, 0xa6, 0xc6, 0x84,
1013 		      0x57, 0x31, 0xac, 0x7f, 0x46, 0x37, 0x6a, 0x05,
1014 		      0x04, 0xcd, 0x06, 0x57, 0x14, 0x74
1015 );
1016 
1017 static const struct gss_krb5_test_param rfc6803_encrypt_test_params[] = {
1018 	{
1019 		.desc			= "Encrypt empty plaintext with camellia128-cts-cmac",
1020 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1021 		.constant		= 0,
1022 		.base_key		= &rfc6803_enc_test1_basekey,
1023 		.plaintext		= &rfc6803_enc_empty_plaintext,
1024 		.confounder		= &rfc6803_enc_test1_confounder,
1025 		.expected_result	= &rfc6803_enc_test1_expected_result,
1026 	},
1027 	{
1028 		.desc			= "Encrypt 1 byte with camellia128-cts-cmac",
1029 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1030 		.constant		= 1,
1031 		.base_key		= &rfc6803_enc_test2_basekey,
1032 		.plaintext		= &rfc6803_enc_1byte_plaintext,
1033 		.confounder		= &rfc6803_enc_test2_confounder,
1034 		.expected_result	= &rfc6803_enc_test2_expected_result,
1035 	},
1036 	{
1037 		.desc			= "Encrypt 9 bytes with camellia128-cts-cmac",
1038 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1039 		.constant		= 2,
1040 		.base_key		= &rfc6803_enc_test3_basekey,
1041 		.plaintext		= &rfc6803_enc_9byte_plaintext,
1042 		.confounder		= &rfc6803_enc_test3_confounder,
1043 		.expected_result	= &rfc6803_enc_test3_expected_result,
1044 	},
1045 	{
1046 		.desc			= "Encrypt 13 bytes with camellia128-cts-cmac",
1047 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1048 		.constant		= 3,
1049 		.base_key		= &rfc6803_enc_test4_basekey,
1050 		.plaintext		= &rfc6803_enc_13byte_plaintext,
1051 		.confounder		= &rfc6803_enc_test4_confounder,
1052 		.expected_result	= &rfc6803_enc_test4_expected_result,
1053 	},
1054 	{
1055 		.desc			= "Encrypt 30 bytes with camellia128-cts-cmac",
1056 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1057 		.constant		= 4,
1058 		.base_key		= &rfc6803_enc_test5_basekey,
1059 		.plaintext		= &rfc6803_enc_30byte_plaintext,
1060 		.confounder		= &rfc6803_enc_test5_confounder,
1061 		.expected_result	= &rfc6803_enc_test5_expected_result,
1062 	},
1063 	{
1064 		.desc			= "Encrypt empty plaintext with camellia256-cts-cmac",
1065 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1066 		.constant		= 0,
1067 		.base_key		= &rfc6803_enc_test6_basekey,
1068 		.plaintext		= &rfc6803_enc_empty_plaintext,
1069 		.confounder		= &rfc6803_enc_test6_confounder,
1070 		.expected_result	= &rfc6803_enc_test6_expected_result,
1071 	},
1072 	{
1073 		.desc			= "Encrypt 1 byte with camellia256-cts-cmac",
1074 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1075 		.constant		= 1,
1076 		.base_key		= &rfc6803_enc_test7_basekey,
1077 		.plaintext		= &rfc6803_enc_1byte_plaintext,
1078 		.confounder		= &rfc6803_enc_test7_confounder,
1079 		.expected_result	= &rfc6803_enc_test7_expected_result,
1080 	},
1081 	{
1082 		.desc			= "Encrypt 9 bytes with camellia256-cts-cmac",
1083 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1084 		.constant		= 2,
1085 		.base_key		= &rfc6803_enc_test8_basekey,
1086 		.plaintext		= &rfc6803_enc_9byte_plaintext,
1087 		.confounder		= &rfc6803_enc_test8_confounder,
1088 		.expected_result	= &rfc6803_enc_test8_expected_result,
1089 	},
1090 	{
1091 		.desc			= "Encrypt 13 bytes with camellia256-cts-cmac",
1092 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1093 		.constant		= 3,
1094 		.base_key		= &rfc6803_enc_test9_basekey,
1095 		.plaintext		= &rfc6803_enc_13byte_plaintext,
1096 		.confounder		= &rfc6803_enc_test9_confounder,
1097 		.expected_result	= &rfc6803_enc_test9_expected_result,
1098 	},
1099 	{
1100 		.desc			= "Encrypt 30 bytes with camellia256-cts-cmac",
1101 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1102 		.constant		= 4,
1103 		.base_key		= &rfc6803_enc_test10_basekey,
1104 		.plaintext		= &rfc6803_enc_30byte_plaintext,
1105 		.confounder		= &rfc6803_enc_test10_confounder,
1106 		.expected_result	= &rfc6803_enc_test10_expected_result,
1107 	},
1108 };
1109 
1110 /* Creates the function rfc6803_encrypt_gen_params */
1111 KUNIT_ARRAY_PARAM(rfc6803_encrypt, rfc6803_encrypt_test_params,
1112 		  gss_krb5_get_desc);
1113 
1114 static void rfc6803_encrypt_case(struct kunit *test)
1115 {
1116 	const struct gss_krb5_test_param *param = test->param_value;
1117 	struct crypto_sync_skcipher *cts_tfm, *cbc_tfm;
1118 	const struct gss_krb5_enctype *gk5e;
1119 	struct xdr_netobj Ke, Ki, checksum;
1120 	u8 usage_data[GSS_KRB5_K5CLENGTH];
1121 	struct xdr_netobj usage = {
1122 		.data = usage_data,
1123 		.len = sizeof(usage_data),
1124 	};
1125 	struct crypto_ahash *ahash_tfm;
1126 	unsigned int blocksize;
1127 	struct xdr_buf buf;
1128 	void *text;
1129 	size_t len;
1130 	u32 err;
1131 
1132 	/* Arrange */
1133 	gk5e = gss_krb5_lookup_enctype(param->enctype);
1134 	if (!gk5e)
1135 		kunit_skip(test, "Encryption type is not available");
1136 
1137 	memset(usage_data, 0, sizeof(usage_data));
1138 	usage.data[3] = param->constant;
1139 
1140 	Ke.len = gk5e->Ke_length;
1141 	Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL);
1142 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ke.data);
1143 	usage.data[4] = KEY_USAGE_SEED_ENCRYPTION;
1144 	err = gk5e->derive_key(gk5e, param->base_key, &Ke, &usage, GFP_KERNEL);
1145 	KUNIT_ASSERT_EQ(test, err, 0);
1146 
1147 	cbc_tfm = crypto_alloc_sync_skcipher(gk5e->aux_cipher, 0, 0);
1148 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cbc_tfm);
1149 	err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len);
1150 	KUNIT_ASSERT_EQ(test, err, 0);
1151 
1152 	cts_tfm = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0);
1153 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cts_tfm);
1154 	err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len);
1155 	KUNIT_ASSERT_EQ(test, err, 0);
1156 	blocksize = crypto_sync_skcipher_blocksize(cts_tfm);
1157 
1158 	len = param->confounder->len + param->plaintext->len + blocksize;
1159 	text = kunit_kzalloc(test, len, GFP_KERNEL);
1160 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, text);
1161 	memcpy(text, param->confounder->data, param->confounder->len);
1162 	memcpy(text + param->confounder->len, param->plaintext->data,
1163 	       param->plaintext->len);
1164 
1165 	memset(&buf, 0, sizeof(buf));
1166 	buf.head[0].iov_base = text;
1167 	buf.head[0].iov_len = param->confounder->len + param->plaintext->len;
1168 	buf.len = buf.head[0].iov_len;
1169 
1170 	checksum.len = gk5e->cksumlength;
1171 	checksum.data = kunit_kzalloc(test, checksum.len, GFP_KERNEL);
1172 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, checksum.data);
1173 
1174 	Ki.len = gk5e->Ki_length;
1175 	Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL);
1176 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data);
1177 	usage.data[4] = KEY_USAGE_SEED_INTEGRITY;
1178 	err = gk5e->derive_key(gk5e, param->base_key, &Ki,
1179 			       &usage, GFP_KERNEL);
1180 	KUNIT_ASSERT_EQ(test, err, 0);
1181 	ahash_tfm = crypto_alloc_ahash(gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC);
1182 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ahash_tfm);
1183 	err = crypto_ahash_setkey(ahash_tfm, Ki.data, Ki.len);
1184 	KUNIT_ASSERT_EQ(test, err, 0);
1185 
1186 	/* Act */
1187 	err = gss_krb5_checksum(ahash_tfm, NULL, 0, &buf, 0, &checksum);
1188 	KUNIT_ASSERT_EQ(test, err, 0);
1189 
1190 	err = krb5_cbc_cts_encrypt(cts_tfm, cbc_tfm, 0, &buf, NULL, NULL, 0);
1191 	KUNIT_ASSERT_EQ(test, err, 0);
1192 
1193 	/* Assert */
1194 	KUNIT_EXPECT_EQ_MSG(test, param->expected_result->len,
1195 			    buf.len + checksum.len,
1196 			    "ciphertext length mismatch");
1197 	KUNIT_EXPECT_EQ_MSG(test,
1198 			    memcmp(param->expected_result->data,
1199 				   buf.head[0].iov_base, buf.len), 0,
1200 			    "encrypted result mismatch");
1201 	KUNIT_EXPECT_EQ_MSG(test,
1202 			    memcmp(param->expected_result->data +
1203 				   (param->expected_result->len - checksum.len),
1204 				   checksum.data, checksum.len), 0,
1205 			    "HMAC mismatch");
1206 
1207 	crypto_free_ahash(ahash_tfm);
1208 	crypto_free_sync_skcipher(cts_tfm);
1209 	crypto_free_sync_skcipher(cbc_tfm);
1210 }
1211 
1212 static struct kunit_case rfc6803_test_cases[] = {
1213 	{
1214 		.name			= "RFC 6803 key derivation",
1215 		.run_case		= kdf_case,
1216 		.generate_params	= rfc6803_kdf_gen_params,
1217 	},
1218 	{
1219 		.name			= "RFC 6803 checksum",
1220 		.run_case		= checksum_case,
1221 		.generate_params	= rfc6803_checksum_gen_params,
1222 	},
1223 	{
1224 		.name			= "RFC 6803 encryption",
1225 		.run_case		= rfc6803_encrypt_case,
1226 		.generate_params	= rfc6803_encrypt_gen_params,
1227 	},
1228 	{}
1229 };
1230 
1231 static struct kunit_suite rfc6803_suite = {
1232 	.name			= "RFC 6803 suite",
1233 	.test_cases		= rfc6803_test_cases,
1234 };
1235 
1236 /*
1237  * From RFC 8009 Appendix A.  Test Vectors
1238  *
1239  * Sample results for SHA-2 enctype key derivation
1240  *
1241  * This test material is copyright (c) 2016 IETF Trust and the
1242  * persons identified as the document authors.  All rights reserved.
1243  */
1244 
1245 DEFINE_HEX_XDR_NETOBJ(aes128_cts_hmac_sha256_128_basekey,
1246 		      0x37, 0x05, 0xd9, 0x60, 0x80, 0xc1, 0x77, 0x28,
1247 		      0xa0, 0xe8, 0x00, 0xea, 0xb6, 0xe0, 0xd2, 0x3c
1248 );
1249 DEFINE_HEX_XDR_NETOBJ(aes128_cts_hmac_sha256_128_Kc,
1250 		      0xb3, 0x1a, 0x01, 0x8a, 0x48, 0xf5, 0x47, 0x76,
1251 		      0xf4, 0x03, 0xe9, 0xa3, 0x96, 0x32, 0x5d, 0xc3
1252 );
1253 DEFINE_HEX_XDR_NETOBJ(aes128_cts_hmac_sha256_128_Ke,
1254 		      0x9b, 0x19, 0x7d, 0xd1, 0xe8, 0xc5, 0x60, 0x9d,
1255 		      0x6e, 0x67, 0xc3, 0xe3, 0x7c, 0x62, 0xc7, 0x2e
1256 );
1257 DEFINE_HEX_XDR_NETOBJ(aes128_cts_hmac_sha256_128_Ki,
1258 		      0x9f, 0xda, 0x0e, 0x56, 0xab, 0x2d, 0x85, 0xe1,
1259 		      0x56, 0x9a, 0x68, 0x86, 0x96, 0xc2, 0x6a, 0x6c
1260 );
1261 
1262 DEFINE_HEX_XDR_NETOBJ(aes256_cts_hmac_sha384_192_basekey,
1263 		      0x6d, 0x40, 0x4d, 0x37, 0xfa, 0xf7, 0x9f, 0x9d,
1264 		      0xf0, 0xd3, 0x35, 0x68, 0xd3, 0x20, 0x66, 0x98,
1265 		      0x00, 0xeb, 0x48, 0x36, 0x47, 0x2e, 0xa8, 0xa0,
1266 		      0x26, 0xd1, 0x6b, 0x71, 0x82, 0x46, 0x0c, 0x52
1267 );
1268 DEFINE_HEX_XDR_NETOBJ(aes256_cts_hmac_sha384_192_Kc,
1269 		      0xef, 0x57, 0x18, 0xbe, 0x86, 0xcc, 0x84, 0x96,
1270 		      0x3d, 0x8b, 0xbb, 0x50, 0x31, 0xe9, 0xf5, 0xc4,
1271 		      0xba, 0x41, 0xf2, 0x8f, 0xaf, 0x69, 0xe7, 0x3d
1272 );
1273 DEFINE_HEX_XDR_NETOBJ(aes256_cts_hmac_sha384_192_Ke,
1274 		      0x56, 0xab, 0x22, 0xbe, 0xe6, 0x3d, 0x82, 0xd7,
1275 		      0xbc, 0x52, 0x27, 0xf6, 0x77, 0x3f, 0x8e, 0xa7,
1276 		      0xa5, 0xeb, 0x1c, 0x82, 0x51, 0x60, 0xc3, 0x83,
1277 		      0x12, 0x98, 0x0c, 0x44, 0x2e, 0x5c, 0x7e, 0x49
1278 );
1279 DEFINE_HEX_XDR_NETOBJ(aes256_cts_hmac_sha384_192_Ki,
1280 		      0x69, 0xb1, 0x65, 0x14, 0xe3, 0xcd, 0x8e, 0x56,
1281 		      0xb8, 0x20, 0x10, 0xd5, 0xc7, 0x30, 0x12, 0xb6,
1282 		      0x22, 0xc4, 0xd0, 0x0f, 0xfc, 0x23, 0xed, 0x1f
1283 );
1284 
1285 static const struct gss_krb5_test_param rfc8009_kdf_test_params[] = {
1286 	{
1287 		.desc			= "Derive Kc subkey for aes128-cts-hmac-sha256-128",
1288 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1289 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1290 		.usage			= &usage_checksum,
1291 		.expected_result	= &aes128_cts_hmac_sha256_128_Kc,
1292 	},
1293 	{
1294 		.desc			= "Derive Ke subkey for aes128-cts-hmac-sha256-128",
1295 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1296 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1297 		.usage			= &usage_encryption,
1298 		.expected_result	= &aes128_cts_hmac_sha256_128_Ke,
1299 	},
1300 	{
1301 		.desc			= "Derive Ki subkey for aes128-cts-hmac-sha256-128",
1302 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1303 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1304 		.usage			= &usage_integrity,
1305 		.expected_result	= &aes128_cts_hmac_sha256_128_Ki,
1306 	},
1307 	{
1308 		.desc			= "Derive Kc subkey for aes256-cts-hmac-sha384-192",
1309 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1310 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1311 		.usage			= &usage_checksum,
1312 		.expected_result	= &aes256_cts_hmac_sha384_192_Kc,
1313 	},
1314 	{
1315 		.desc			= "Derive Ke subkey for aes256-cts-hmac-sha384-192",
1316 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1317 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1318 		.usage			= &usage_encryption,
1319 		.expected_result	= &aes256_cts_hmac_sha384_192_Ke,
1320 	},
1321 	{
1322 		.desc			= "Derive Ki subkey for aes256-cts-hmac-sha384-192",
1323 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1324 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1325 		.usage			= &usage_integrity,
1326 		.expected_result	= &aes256_cts_hmac_sha384_192_Ki,
1327 	},
1328 };
1329 
1330 /* Creates the function rfc8009_kdf_gen_params */
1331 KUNIT_ARRAY_PARAM(rfc8009_kdf, rfc8009_kdf_test_params, gss_krb5_get_desc);
1332 
1333 /*
1334  * From RFC 8009 Appendix A.  Test Vectors
1335  *
1336  * These sample checksums use the above sample key derivation results,
1337  * including use of the same base-key and key usage values.
1338  *
1339  * This test material is copyright (c) 2016 IETF Trust and the
1340  * persons identified as the document authors.  All rights reserved.
1341  */
1342 
1343 DEFINE_HEX_XDR_NETOBJ(rfc8009_checksum_plaintext,
1344 		      0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
1345 		      0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
1346 		      0x10, 0x11, 0x12, 0x13, 0x14
1347 );
1348 DEFINE_HEX_XDR_NETOBJ(rfc8009_checksum_test1_expected_result,
1349 		      0xd7, 0x83, 0x67, 0x18, 0x66, 0x43, 0xd6, 0x7b,
1350 		      0x41, 0x1c, 0xba, 0x91, 0x39, 0xfc, 0x1d, 0xee
1351 );
1352 DEFINE_HEX_XDR_NETOBJ(rfc8009_checksum_test2_expected_result,
1353 		      0x45, 0xee, 0x79, 0x15, 0x67, 0xee, 0xfc, 0xa3,
1354 		      0x7f, 0x4a, 0xc1, 0xe0, 0x22, 0x2d, 0xe8, 0x0d,
1355 		      0x43, 0xc3, 0xbf, 0xa0, 0x66, 0x99, 0x67, 0x2a
1356 );
1357 
1358 static const struct gss_krb5_test_param rfc8009_checksum_test_params[] = {
1359 	{
1360 		.desc			= "Checksum with aes128-cts-hmac-sha256-128",
1361 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1362 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1363 		.usage			= &usage_checksum,
1364 		.plaintext		= &rfc8009_checksum_plaintext,
1365 		.expected_result	= &rfc8009_checksum_test1_expected_result,
1366 	},
1367 	{
1368 		.desc			= "Checksum with aes256-cts-hmac-sha384-192",
1369 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1370 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1371 		.usage			= &usage_checksum,
1372 		.plaintext		= &rfc8009_checksum_plaintext,
1373 		.expected_result	= &rfc8009_checksum_test2_expected_result,
1374 	},
1375 };
1376 
1377 /* Creates the function rfc8009_checksum_gen_params */
1378 KUNIT_ARRAY_PARAM(rfc8009_checksum, rfc8009_checksum_test_params,
1379 		  gss_krb5_get_desc);
1380 
1381 /*
1382  * From RFC 8009 Appendix A.  Test Vectors
1383  *
1384  * Sample encryptions (all using the default cipher state):
1385  * --------------------------------------------------------
1386  *
1387  * These sample encryptions use the above sample key derivation results,
1388  * including use of the same base-key and key usage values.
1389  *
1390  * This test material is copyright (c) 2016 IETF Trust and the
1391  * persons identified as the document authors.  All rights reserved.
1392  */
1393 
1394 static const struct xdr_netobj rfc8009_enc_empty_plaintext = {
1395 	.len	= 0,
1396 };
1397 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_short_plaintext,
1398 		      0x00, 0x01, 0x02, 0x03, 0x04, 0x05
1399 );
1400 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_block_plaintext,
1401 		      0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
1402 		      0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
1403 );
1404 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_long_plaintext,
1405 		      0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
1406 		      0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
1407 		      0x10, 0x11, 0x12, 0x13, 0x14
1408 );
1409 
1410 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test1_confounder,
1411 		      0x7e, 0x58, 0x95, 0xea, 0xf2, 0x67, 0x24, 0x35,
1412 		      0xba, 0xd8, 0x17, 0xf5, 0x45, 0xa3, 0x71, 0x48
1413 );
1414 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test1_expected_result,
1415 		      0xef, 0x85, 0xfb, 0x89, 0x0b, 0xb8, 0x47, 0x2f,
1416 		      0x4d, 0xab, 0x20, 0x39, 0x4d, 0xca, 0x78, 0x1d
1417 );
1418 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test1_expected_hmac,
1419 		      0xad, 0x87, 0x7e, 0xda, 0x39, 0xd5, 0x0c, 0x87,
1420 		      0x0c, 0x0d, 0x5a, 0x0a, 0x8e, 0x48, 0xc7, 0x18
1421 );
1422 
1423 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test2_confounder,
1424 		      0x7b, 0xca, 0x28, 0x5e, 0x2f, 0xd4, 0x13, 0x0f,
1425 		      0xb5, 0x5b, 0x1a, 0x5c, 0x83, 0xbc, 0x5b, 0x24
1426 );
1427 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test2_expected_result,
1428 		      0x84, 0xd7, 0xf3, 0x07, 0x54, 0xed, 0x98, 0x7b,
1429 		      0xab, 0x0b, 0xf3, 0x50, 0x6b, 0xeb, 0x09, 0xcf,
1430 		      0xb5, 0x54, 0x02, 0xce, 0xf7, 0xe6
1431 );
1432 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test2_expected_hmac,
1433 		      0x87, 0x7c, 0xe9, 0x9e, 0x24, 0x7e, 0x52, 0xd1,
1434 		      0x6e, 0xd4, 0x42, 0x1d, 0xfd, 0xf8, 0x97, 0x6c
1435 );
1436 
1437 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test3_confounder,
1438 		      0x56, 0xab, 0x21, 0x71, 0x3f, 0xf6, 0x2c, 0x0a,
1439 		      0x14, 0x57, 0x20, 0x0f, 0x6f, 0xa9, 0x94, 0x8f
1440 );
1441 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test3_expected_result,
1442 		      0x35, 0x17, 0xd6, 0x40, 0xf5, 0x0d, 0xdc, 0x8a,
1443 		      0xd3, 0x62, 0x87, 0x22, 0xb3, 0x56, 0x9d, 0x2a,
1444 		      0xe0, 0x74, 0x93, 0xfa, 0x82, 0x63, 0x25, 0x40,
1445 		      0x80, 0xea, 0x65, 0xc1, 0x00, 0x8e, 0x8f, 0xc2
1446 );
1447 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test3_expected_hmac,
1448 		      0x95, 0xfb, 0x48, 0x52, 0xe7, 0xd8, 0x3e, 0x1e,
1449 		      0x7c, 0x48, 0xc3, 0x7e, 0xeb, 0xe6, 0xb0, 0xd3
1450 );
1451 
1452 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test4_confounder,
1453 		      0xa7, 0xa4, 0xe2, 0x9a, 0x47, 0x28, 0xce, 0x10,
1454 		      0x66, 0x4f, 0xb6, 0x4e, 0x49, 0xad, 0x3f, 0xac
1455 );
1456 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test4_expected_result,
1457 		      0x72, 0x0f, 0x73, 0xb1, 0x8d, 0x98, 0x59, 0xcd,
1458 		      0x6c, 0xcb, 0x43, 0x46, 0x11, 0x5c, 0xd3, 0x36,
1459 		      0xc7, 0x0f, 0x58, 0xed, 0xc0, 0xc4, 0x43, 0x7c,
1460 		      0x55, 0x73, 0x54, 0x4c, 0x31, 0xc8, 0x13, 0xbc,
1461 		      0xe1, 0xe6, 0xd0, 0x72, 0xc1
1462 );
1463 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test4_expected_hmac,
1464 		      0x86, 0xb3, 0x9a, 0x41, 0x3c, 0x2f, 0x92, 0xca,
1465 		      0x9b, 0x83, 0x34, 0xa2, 0x87, 0xff, 0xcb, 0xfc
1466 );
1467 
1468 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test5_confounder,
1469 		      0xf7, 0x64, 0xe9, 0xfa, 0x15, 0xc2, 0x76, 0x47,
1470 		      0x8b, 0x2c, 0x7d, 0x0c, 0x4e, 0x5f, 0x58, 0xe4
1471 );
1472 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test5_expected_result,
1473 		      0x41, 0xf5, 0x3f, 0xa5, 0xbf, 0xe7, 0x02, 0x6d,
1474 		      0x91, 0xfa, 0xf9, 0xbe, 0x95, 0x91, 0x95, 0xa0
1475 );
1476 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test5_expected_hmac,
1477 		      0x58, 0x70, 0x72, 0x73, 0xa9, 0x6a, 0x40, 0xf0,
1478 		      0xa0, 0x19, 0x60, 0x62, 0x1a, 0xc6, 0x12, 0x74,
1479 		      0x8b, 0x9b, 0xbf, 0xbe, 0x7e, 0xb4, 0xce, 0x3c
1480 );
1481 
1482 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test6_confounder,
1483 		      0xb8, 0x0d, 0x32, 0x51, 0xc1, 0xf6, 0x47, 0x14,
1484 		      0x94, 0x25, 0x6f, 0xfe, 0x71, 0x2d, 0x0b, 0x9a
1485 );
1486 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test6_expected_result,
1487 		      0x4e, 0xd7, 0xb3, 0x7c, 0x2b, 0xca, 0xc8, 0xf7,
1488 		      0x4f, 0x23, 0xc1, 0xcf, 0x07, 0xe6, 0x2b, 0xc7,
1489 		      0xb7, 0x5f, 0xb3, 0xf6, 0x37, 0xb9
1490 );
1491 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test6_expected_hmac,
1492 		      0xf5, 0x59, 0xc7, 0xf6, 0x64, 0xf6, 0x9e, 0xab,
1493 		      0x7b, 0x60, 0x92, 0x23, 0x75, 0x26, 0xea, 0x0d,
1494 		      0x1f, 0x61, 0xcb, 0x20, 0xd6, 0x9d, 0x10, 0xf2
1495 );
1496 
1497 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test7_confounder,
1498 		      0x53, 0xbf, 0x8a, 0x0d, 0x10, 0x52, 0x65, 0xd4,
1499 		      0xe2, 0x76, 0x42, 0x86, 0x24, 0xce, 0x5e, 0x63
1500 );
1501 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test7_expected_result,
1502 		      0xbc, 0x47, 0xff, 0xec, 0x79, 0x98, 0xeb, 0x91,
1503 		      0xe8, 0x11, 0x5c, 0xf8, 0xd1, 0x9d, 0xac, 0x4b,
1504 		      0xbb, 0xe2, 0xe1, 0x63, 0xe8, 0x7d, 0xd3, 0x7f,
1505 		      0x49, 0xbe, 0xca, 0x92, 0x02, 0x77, 0x64, 0xf6
1506 );
1507 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test7_expected_hmac,
1508 		      0x8c, 0xf5, 0x1f, 0x14, 0xd7, 0x98, 0xc2, 0x27,
1509 		      0x3f, 0x35, 0xdf, 0x57, 0x4d, 0x1f, 0x93, 0x2e,
1510 		      0x40, 0xc4, 0xff, 0x25, 0x5b, 0x36, 0xa2, 0x66
1511 );
1512 
1513 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test8_confounder,
1514 		      0x76, 0x3e, 0x65, 0x36, 0x7e, 0x86, 0x4f, 0x02,
1515 		      0xf5, 0x51, 0x53, 0xc7, 0xe3, 0xb5, 0x8a, 0xf1
1516 );
1517 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test8_expected_result,
1518 		      0x40, 0x01, 0x3e, 0x2d, 0xf5, 0x8e, 0x87, 0x51,
1519 		      0x95, 0x7d, 0x28, 0x78, 0xbc, 0xd2, 0xd6, 0xfe,
1520 		      0x10, 0x1c, 0xcf, 0xd5, 0x56, 0xcb, 0x1e, 0xae,
1521 		      0x79, 0xdb, 0x3c, 0x3e, 0xe8, 0x64, 0x29, 0xf2,
1522 		      0xb2, 0xa6, 0x02, 0xac, 0x86
1523 );
1524 DEFINE_HEX_XDR_NETOBJ(rfc8009_enc_test8_expected_hmac,
1525 		      0xfe, 0xf6, 0xec, 0xb6, 0x47, 0xd6, 0x29, 0x5f,
1526 		      0xae, 0x07, 0x7a, 0x1f, 0xeb, 0x51, 0x75, 0x08,
1527 		      0xd2, 0xc1, 0x6b, 0x41, 0x92, 0xe0, 0x1f, 0x62
1528 );
1529 
1530 static const struct gss_krb5_test_param rfc8009_encrypt_test_params[] = {
1531 	{
1532 		.desc			= "Encrypt empty plaintext with aes128-cts-hmac-sha256-128",
1533 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1534 		.plaintext		= &rfc8009_enc_empty_plaintext,
1535 		.confounder		= &rfc8009_enc_test1_confounder,
1536 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1537 		.expected_result	= &rfc8009_enc_test1_expected_result,
1538 		.expected_hmac		= &rfc8009_enc_test1_expected_hmac,
1539 	},
1540 	{
1541 		.desc			= "Encrypt short plaintext with aes128-cts-hmac-sha256-128",
1542 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1543 		.plaintext		= &rfc8009_enc_short_plaintext,
1544 		.confounder		= &rfc8009_enc_test2_confounder,
1545 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1546 		.expected_result	= &rfc8009_enc_test2_expected_result,
1547 		.expected_hmac		= &rfc8009_enc_test2_expected_hmac,
1548 	},
1549 	{
1550 		.desc			= "Encrypt block plaintext with aes128-cts-hmac-sha256-128",
1551 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1552 		.plaintext		= &rfc8009_enc_block_plaintext,
1553 		.confounder		= &rfc8009_enc_test3_confounder,
1554 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1555 		.expected_result	= &rfc8009_enc_test3_expected_result,
1556 		.expected_hmac		= &rfc8009_enc_test3_expected_hmac,
1557 	},
1558 	{
1559 		.desc			= "Encrypt long plaintext with aes128-cts-hmac-sha256-128",
1560 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1561 		.plaintext		= &rfc8009_enc_long_plaintext,
1562 		.confounder		= &rfc8009_enc_test4_confounder,
1563 		.base_key		= &aes128_cts_hmac_sha256_128_basekey,
1564 		.expected_result	= &rfc8009_enc_test4_expected_result,
1565 		.expected_hmac		= &rfc8009_enc_test4_expected_hmac,
1566 	},
1567 	{
1568 		.desc			= "Encrypt empty plaintext with aes256-cts-hmac-sha384-192",
1569 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1570 		.plaintext		= &rfc8009_enc_empty_plaintext,
1571 		.confounder		= &rfc8009_enc_test5_confounder,
1572 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1573 		.expected_result	= &rfc8009_enc_test5_expected_result,
1574 		.expected_hmac		= &rfc8009_enc_test5_expected_hmac,
1575 	},
1576 	{
1577 		.desc			= "Encrypt short plaintext with aes256-cts-hmac-sha384-192",
1578 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1579 		.plaintext		= &rfc8009_enc_short_plaintext,
1580 		.confounder		= &rfc8009_enc_test6_confounder,
1581 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1582 		.expected_result	= &rfc8009_enc_test6_expected_result,
1583 		.expected_hmac		= &rfc8009_enc_test6_expected_hmac,
1584 	},
1585 	{
1586 		.desc			= "Encrypt block plaintext with aes256-cts-hmac-sha384-192",
1587 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1588 		.plaintext		= &rfc8009_enc_block_plaintext,
1589 		.confounder		= &rfc8009_enc_test7_confounder,
1590 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1591 		.expected_result	= &rfc8009_enc_test7_expected_result,
1592 		.expected_hmac		= &rfc8009_enc_test7_expected_hmac,
1593 	},
1594 	{
1595 		.desc			= "Encrypt long plaintext with aes256-cts-hmac-sha384-192",
1596 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1597 		.plaintext		= &rfc8009_enc_long_plaintext,
1598 		.confounder		= &rfc8009_enc_test8_confounder,
1599 		.base_key		= &aes256_cts_hmac_sha384_192_basekey,
1600 		.expected_result	= &rfc8009_enc_test8_expected_result,
1601 		.expected_hmac		= &rfc8009_enc_test8_expected_hmac,
1602 	},
1603 };
1604 
1605 /* Creates the function rfc8009_encrypt_gen_params */
1606 KUNIT_ARRAY_PARAM(rfc8009_encrypt, rfc8009_encrypt_test_params,
1607 		  gss_krb5_get_desc);
1608 
1609 static void rfc8009_encrypt_case(struct kunit *test)
1610 {
1611 	const struct gss_krb5_test_param *param = test->param_value;
1612 	struct crypto_sync_skcipher *cts_tfm, *cbc_tfm;
1613 	const struct gss_krb5_enctype *gk5e;
1614 	struct xdr_netobj Ke, Ki, checksum;
1615 	u8 usage_data[GSS_KRB5_K5CLENGTH];
1616 	struct xdr_netobj usage = {
1617 		.data = usage_data,
1618 		.len = sizeof(usage_data),
1619 	};
1620 	struct crypto_ahash *ahash_tfm;
1621 	struct xdr_buf buf;
1622 	void *text;
1623 	size_t len;
1624 	u32 err;
1625 
1626 	/* Arrange */
1627 	gk5e = gss_krb5_lookup_enctype(param->enctype);
1628 	if (!gk5e)
1629 		kunit_skip(test, "Encryption type is not available");
1630 
1631 	*(__be32 *)usage.data = cpu_to_be32(2);
1632 
1633 	Ke.len = gk5e->Ke_length;
1634 	Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL);
1635 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ke.data);
1636 	usage.data[4] = KEY_USAGE_SEED_ENCRYPTION;
1637 	err = gk5e->derive_key(gk5e, param->base_key, &Ke,
1638 			       &usage, GFP_KERNEL);
1639 	KUNIT_ASSERT_EQ(test, err, 0);
1640 
1641 	cbc_tfm = crypto_alloc_sync_skcipher(gk5e->aux_cipher, 0, 0);
1642 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cbc_tfm);
1643 	err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len);
1644 	KUNIT_ASSERT_EQ(test, err, 0);
1645 
1646 	cts_tfm = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0);
1647 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cts_tfm);
1648 	err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len);
1649 	KUNIT_ASSERT_EQ(test, err, 0);
1650 
1651 	len = param->confounder->len + param->plaintext->len;
1652 	text = kunit_kzalloc(test, len, GFP_KERNEL);
1653 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, text);
1654 	memcpy(text, param->confounder->data, param->confounder->len);
1655 	memcpy(text + param->confounder->len, param->plaintext->data,
1656 	       param->plaintext->len);
1657 
1658 	memset(&buf, 0, sizeof(buf));
1659 	buf.head[0].iov_base = text;
1660 	buf.head[0].iov_len = param->confounder->len + param->plaintext->len;
1661 	buf.len = buf.head[0].iov_len;
1662 
1663 	checksum.len = gk5e->cksumlength;
1664 	checksum.data = kunit_kzalloc(test, checksum.len, GFP_KERNEL);
1665 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, checksum.data);
1666 
1667 	Ki.len = gk5e->Ki_length;
1668 	Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL);
1669 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data);
1670 	usage.data[4] = KEY_USAGE_SEED_INTEGRITY;
1671 	err = gk5e->derive_key(gk5e, param->base_key, &Ki,
1672 			       &usage, GFP_KERNEL);
1673 	KUNIT_ASSERT_EQ(test, err, 0);
1674 
1675 	ahash_tfm = crypto_alloc_ahash(gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC);
1676 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ahash_tfm);
1677 	err = crypto_ahash_setkey(ahash_tfm, Ki.data, Ki.len);
1678 	KUNIT_ASSERT_EQ(test, err, 0);
1679 
1680 	/* Act */
1681 	err = krb5_cbc_cts_encrypt(cts_tfm, cbc_tfm, 0, &buf, NULL, NULL, 0);
1682 	KUNIT_ASSERT_EQ(test, err, 0);
1683 	err = krb5_etm_checksum(cts_tfm, ahash_tfm, &buf, 0, &checksum);
1684 	KUNIT_ASSERT_EQ(test, err, 0);
1685 
1686 	/* Assert */
1687 	KUNIT_EXPECT_EQ_MSG(test,
1688 			    param->expected_result->len, buf.len,
1689 			    "ciphertext length mismatch");
1690 	KUNIT_EXPECT_EQ_MSG(test,
1691 			    memcmp(param->expected_result->data,
1692 				   buf.head[0].iov_base,
1693 				   param->expected_result->len), 0,
1694 			    "ciphertext mismatch");
1695 	KUNIT_EXPECT_EQ_MSG(test, memcmp(param->expected_hmac->data,
1696 					 checksum.data,
1697 					 checksum.len), 0,
1698 			    "HMAC mismatch");
1699 
1700 	crypto_free_ahash(ahash_tfm);
1701 	crypto_free_sync_skcipher(cts_tfm);
1702 	crypto_free_sync_skcipher(cbc_tfm);
1703 }
1704 
1705 static struct kunit_case rfc8009_test_cases[] = {
1706 	{
1707 		.name			= "RFC 8009 key derivation",
1708 		.run_case		= kdf_case,
1709 		.generate_params	= rfc8009_kdf_gen_params,
1710 	},
1711 	{
1712 		.name			= "RFC 8009 checksum",
1713 		.run_case		= checksum_case,
1714 		.generate_params	= rfc8009_checksum_gen_params,
1715 	},
1716 	{
1717 		.name			= "RFC 8009 encryption",
1718 		.run_case		= rfc8009_encrypt_case,
1719 		.generate_params	= rfc8009_encrypt_gen_params,
1720 	},
1721 	{}
1722 };
1723 
1724 static struct kunit_suite rfc8009_suite = {
1725 	.name			= "RFC 8009 suite",
1726 	.test_cases		= rfc8009_test_cases,
1727 };
1728 
1729 /*
1730  * Encryption self-tests
1731  */
1732 
1733 DEFINE_STR_XDR_NETOBJ(encrypt_selftest_plaintext,
1734 		      "This is the plaintext for the encryption self-test.");
1735 
1736 static const struct gss_krb5_test_param encrypt_selftest_params[] = {
1737 	{
1738 		.desc			= "aes128-cts-hmac-sha1-96 encryption self-test",
1739 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA1_96,
1740 		.Ke			= &rfc3962_encryption_key,
1741 		.plaintext		= &encrypt_selftest_plaintext,
1742 	},
1743 	{
1744 		.desc			= "aes256-cts-hmac-sha1-96 encryption self-test",
1745 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA1_96,
1746 		.Ke			= &rfc3962_encryption_key,
1747 		.plaintext		= &encrypt_selftest_plaintext,
1748 	},
1749 	{
1750 		.desc			= "camellia128-cts-cmac encryption self-test",
1751 		.enctype		= ENCTYPE_CAMELLIA128_CTS_CMAC,
1752 		.Ke			= &camellia128_cts_cmac_Ke,
1753 		.plaintext		= &encrypt_selftest_plaintext,
1754 	},
1755 	{
1756 		.desc			= "camellia256-cts-cmac encryption self-test",
1757 		.enctype		= ENCTYPE_CAMELLIA256_CTS_CMAC,
1758 		.Ke			= &camellia256_cts_cmac_Ke,
1759 		.plaintext		= &encrypt_selftest_plaintext,
1760 	},
1761 	{
1762 		.desc			= "aes128-cts-hmac-sha256-128 encryption self-test",
1763 		.enctype		= ENCTYPE_AES128_CTS_HMAC_SHA256_128,
1764 		.Ke			= &aes128_cts_hmac_sha256_128_Ke,
1765 		.plaintext		= &encrypt_selftest_plaintext,
1766 	},
1767 	{
1768 		.desc			= "aes256-cts-hmac-sha384-192 encryption self-test",
1769 		.enctype		= ENCTYPE_AES256_CTS_HMAC_SHA384_192,
1770 		.Ke			= &aes256_cts_hmac_sha384_192_Ke,
1771 		.plaintext		= &encrypt_selftest_plaintext,
1772 	},
1773 };
1774 
1775 /* Creates the function encrypt_selftest_gen_params */
1776 KUNIT_ARRAY_PARAM(encrypt_selftest, encrypt_selftest_params,
1777 		  gss_krb5_get_desc);
1778 
1779 /*
1780  * Encrypt and decrypt plaintext, and ensure the input plaintext
1781  * matches the output plaintext. A confounder is not added in this
1782  * case.
1783  */
1784 static void encrypt_selftest_case(struct kunit *test)
1785 {
1786 	const struct gss_krb5_test_param *param = test->param_value;
1787 	struct crypto_sync_skcipher *cts_tfm, *cbc_tfm;
1788 	const struct gss_krb5_enctype *gk5e;
1789 	struct xdr_buf buf;
1790 	void *text;
1791 	int err;
1792 
1793 	/* Arrange */
1794 	gk5e = gss_krb5_lookup_enctype(param->enctype);
1795 	if (!gk5e)
1796 		kunit_skip(test, "Encryption type is not available");
1797 
1798 	cbc_tfm = crypto_alloc_sync_skcipher(gk5e->aux_cipher, 0, 0);
1799 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cbc_tfm);
1800 	err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len);
1801 	KUNIT_ASSERT_EQ(test, err, 0);
1802 
1803 	cts_tfm = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0);
1804 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, cts_tfm);
1805 	err = crypto_sync_skcipher_setkey(cts_tfm, param->Ke->data, param->Ke->len);
1806 	KUNIT_ASSERT_EQ(test, err, 0);
1807 
1808 	text = kunit_kzalloc(test, roundup(param->plaintext->len,
1809 					   crypto_sync_skcipher_blocksize(cbc_tfm)),
1810 			     GFP_KERNEL);
1811 	KUNIT_ASSERT_NOT_ERR_OR_NULL(test, text);
1812 
1813 	memcpy(text, param->plaintext->data, param->plaintext->len);
1814 	memset(&buf, 0, sizeof(buf));
1815 	buf.head[0].iov_base = text;
1816 	buf.head[0].iov_len = param->plaintext->len;
1817 	buf.len = buf.head[0].iov_len;
1818 
1819 	/* Act */
1820 	err = krb5_cbc_cts_encrypt(cts_tfm, cbc_tfm, 0, &buf, NULL, NULL, 0);
1821 	KUNIT_ASSERT_EQ(test, err, 0);
1822 	err = krb5_cbc_cts_decrypt(cts_tfm, cbc_tfm, 0, &buf);
1823 	KUNIT_ASSERT_EQ(test, err, 0);
1824 
1825 	/* Assert */
1826 	KUNIT_EXPECT_EQ_MSG(test,
1827 			    param->plaintext->len, buf.len,
1828 			    "length mismatch");
1829 	KUNIT_EXPECT_EQ_MSG(test,
1830 			    memcmp(param->plaintext->data,
1831 				   buf.head[0].iov_base, buf.len), 0,
1832 			    "plaintext mismatch");
1833 
1834 	crypto_free_sync_skcipher(cts_tfm);
1835 	crypto_free_sync_skcipher(cbc_tfm);
1836 }
1837 
1838 static struct kunit_case encryption_test_cases[] = {
1839 	{
1840 		.name			= "Encryption self-tests",
1841 		.run_case		= encrypt_selftest_case,
1842 		.generate_params	= encrypt_selftest_gen_params,
1843 	},
1844 	{}
1845 };
1846 
1847 static struct kunit_suite encryption_test_suite = {
1848 	.name			= "Encryption test suite",
1849 	.test_cases		= encryption_test_cases,
1850 };
1851 
1852 kunit_test_suites(&rfc3961_suite,
1853 		  &rfc3962_suite,
1854 		  &rfc6803_suite,
1855 		  &rfc8009_suite,
1856 		  &encryption_test_suite);
1857 
1858 MODULE_DESCRIPTION("Test RPCSEC GSS Kerberos 5 functions");
1859 MODULE_LICENSE("GPL");
1860