From patchwork Sun Jan 13 23:32:24 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Biggers X-Patchwork-Id: 10761425 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id EE9A86C5 for ; Sun, 13 Jan 2019 23:34:22 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D3BE8289F0 for ; Sun, 13 Jan 2019 23:34:22 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id C7FC428A46; Sun, 13 Jan 2019 23:34:22 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B8CA9289F0 for ; Sun, 13 Jan 2019 23:34:21 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726565AbfAMXeU (ORCPT ); Sun, 13 Jan 2019 18:34:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:56300 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726471AbfAMXeU (ORCPT ); Sun, 13 Jan 2019 18:34:20 -0500 Received: from sol.localdomain (c-24-23-143-129.hsd1.ca.comcast.net [24.23.143.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CC7DF20854; Sun, 13 Jan 2019 23:34:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547422459; bh=XRbN617jgDXq4nr4ZbFFrMD+kB9m+RpeRrTx8Zaa/YM=; h=From:To:Subject:Date:In-Reply-To:References:From; b=fScscY9qLajsKhrsidIn+HebEkcsNjgxmIC7YChRGTH+mkGBK2/1OoMeH2L8MJT1Q tLCyl7knV1wTMR+L/AzrARB7TTH9ckSECM2bOX4YTOp6zJwyYW3qXc6tGUL8RNYqsw 1SDdgsbtJNQZHFrIeMvPjORGxbWwH8Fkm6cGzOow= From: Eric Biggers To: linux-crypto@vger.kernel.org, Herbert Xu Subject: [PATCH 1/5] crypto: testmgr - skip AEAD encryption test vectors with novrfy set Date: Sun, 13 Jan 2019 15:32:24 -0800 Message-Id: <20190113233228.5851-2-ebiggers@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190113233228.5851-1-ebiggers@kernel.org> References: <20190113233228.5851-1-ebiggers@kernel.org> MIME-Version: 1.0 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Eric Biggers In preparation for unifying the AEAD encryption and decryption test vectors, skip AEAD test vectors with the 'novrfy' (verification failure expected) flag set when testing encryption rather than decryption. These test vectors only make sense for decryption. Signed-off-by: Eric Biggers --- crypto/testmgr.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 0f684a414acbe..e075b896c0290 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -671,6 +671,8 @@ static int __test_aead(struct crypto_aead *tfm, int enc, for (i = 0, j = 0; i < tcount; i++) { if (template[i].np) continue; + if (enc && template[i].novrfy) + continue; j++; @@ -787,6 +789,9 @@ static int __test_aead(struct crypto_aead *tfm, int enc, if (!template[i].np) continue; + if (enc && template[i].novrfy) + continue; + j++; if (template[i].iv)