Browse code

kernels: Fix rsa tests in self tests

In the earlier commit the test vectors for rsa 3072, 4098
were taken from pkcs1pad_rsa_tv_template. A message
with the same rsa key with and without padding produced
a different cipher text, casuing the tests to fail.

Updated the message, cipher text that match when
rsa is used without pkcs1pad.

Change-Id: I19155fd1af157576804028e8c36265a4289d16a5
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/22383
Reviewed-by: Keerthana K <keerthanak@vmware.com>
Tested-by: Keerthana K <keerthanak@vmware.com>
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/22875
Reviewed-by: Keerthana K <keerthana.kalyanasundaram@broadcom.com>
Tested-by: Keerthana K <keerthana.kalyanasundaram@broadcom.com>

Vamsi Krishna Brahmajosyula authored on 2023/11/19 01:40:41
Showing 5 changed files
... ...
@@ -20,8 +20,8 @@ Signed-off-by: Vamsi Krishna Brahmajosyula <vbrahmajosyula@vmware.com>
20 20
  crypto/Makefile           |    1 +
21 21
  crypto/crypto_self_test.c |  123 ++
22 22
  crypto/testmgr.c          |   91 +-
23
- crypto/testmgr.h          | 3164 ++++++++++++++++++++++++++++++++++++-
24
- 5 files changed, 3383 insertions(+), 17 deletions(-)
23
+ crypto/testmgr.h          | 3037 ++++++++++++++++++++++++++++++++++++-
24
+ 5 files changed, 3256 insertions(+), 17 deletions(-)
25 25
  create mode 100644 crypto/crypto_self_test.c
26 26
 
27 27
 diff --git a/crypto/Kconfig b/crypto/Kconfig
... ...
@@ -408,14 +408,13 @@ index 56c39a0c9..af31ff549 100644
408 408
  		.alg = "poly1305",
409 409
  		.test = alg_test_hash,
410 410
 diff --git a/crypto/testmgr.h b/crypto/testmgr.h
411
-index d6088e26f..4f5b35671 100644
411
+index d6088e26f..2d9792cba 100644
412 412
 --- a/crypto/testmgr.h
413 413
 +++ b/crypto/testmgr.h
414
-@@ -444,6 +444,832 @@ static const struct akcipher_testvec rsa_tv_template[] = {
414
+@@ -444,6 +444,703 @@ static const struct akcipher_testvec rsa_tv_template[] = {
415 415
  	.m_size = 8,
416 416
  	.c_size = 256,
417 417
  	.public_key_vec = true,
418
-+#if 0
419 418
 +	}, {
420 419
 +	.key =
421 420
 +	"\x30\x82\x08\x62\x02\x01\x00\x02"
... ...
@@ -688,90 +687,33 @@ index d6088e26f..4f5b35671 100644
688 688
 +	"\xa3\xe9\xf2\x83\x9e\x23\x40\x04"
689 689
 +	"\x09\x29\x1a\x1f\x4f\x72\x00",
690 690
 +	.key_len = 2151,
691
-+	/*
692
-+	 * m is SHA384 hash of following message:
693
-+	 * "\x56\xff\xeb\x36\xf2\xcc\xff\x84"
694
-+	 * "\x8c\xf5\x8c\xa5\xc8\xc8\xaa\x67"
695
-+	 * "\x77\x6c\xd5\x95\xcc\x37\x82\xf2"
696
-+	 * "\x8d\xd8\x7c\x1a\x51\xf3\x0d\x71"
697
-+	 * "\x1e\x0f\x89\x90\x36\x49\x31\x71"
698
-+	 * "\x3c\xd0\x58\xfc\x58\x3f\x85\x49"
699
-+	 * "\x6b\xb9\x8e\x07\xd8\xfe\xbd\xe0"
700
-+	 * "\x8f\x22\x80\x24\x3e\x3c\x54\xe5"
701
-+	 * "\xf1\xe4\xe4\x4d\x12\x16\x21\x06"
702
-+	 * "\x73\xae\x93\x89\x17\x12\x14\x0e"
703
-+	 * "\xfc\xba\x56\xa6\xd9\xfe\x56\x03"
704
-+	 * "\x5d\x9c\xa6\x57\x50\xa5\x1f\xd0"
705
-+	 * "\x5a\x70\x0e\x6d\x4d\x82\x04\xc2"
706
-+	 * "\x60\x68\x06\x2e\x02\x1a\x7c\x36"
707
-+	 * "\x79\xd0\xca\x5e\x0c\xaf\x55\x00"
708
-+	 * "\x51\x31\xd0\x17\xd8\x82\x6f\x79"
709
-+	 * "\xdd\x95\xa4\x93\x48\x8e\xde\xc7"
710
-+	 * "\x19\x63\x55\x2f\xff\xa7\x35\x2d"
711
-+	 * "\xb3\x7f\xd9\xbf\x1f\xfd\x66\xfe"
712
-+	 * "\x03\x57\xfb\x2b\x49\x1d\x25\xb6"
713
-+	 * "\x97\x05\xd6\x37\x48\x30\xb5\x53"
714
-+	 * "\x90\xea\x5b\x72\xad\x59\x57\x4d"
715
-+	 * "\x5d\x19\x34\xfe\x38\x06\x7f\xb4"
716
-+	 * "\xcd\xed\xc3\xfe\xe2\x6e\xb1\x74"
717
-+	 */
718
-+	.m =
719
-+	"\x3e\xea\x5d\xc1\x7d\x4a\x8e\x82"
720
-+	"\x29\x12\x8f\xc4\x8b\xbd\xea\xfd"
721
-+	"\x7d\x6e\x45\x5d\xcc\xf6\xf0\x36"
722
-+	"\x70\xb7\x14\x02\x53\x50\xca\xcf"
723
-+	"\xe6\xa6\x2e\xa3\xe4\x1e\x8f\xdd"
724
-+	"\x30\x07\xde\x32\x97\x8c\x15\xdb",
725
-+	.m_size = 48,
691
++	.m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
692
++	.m_size = 8,
726 693
 +	.c =
727
-+	"\x71\xcc\x88\x5c\xde\x7e\x3c\x8c"
728
-+	"\x06\xf7\x7b\x74\x4f\x9c\x9f\x7e"
729
-+	"\xa8\x1f\x6f\xf1\xa7\xc9\x58\x6d"
730
-+	"\x73\x13\x65\x30\xb6\x1f\x2b\xe2"
731
-+	"\xe2\xfd\x97\x91\xf0\x9e\xb4\xb4"
732
-+	"\x7e\x8c\x49\xa8\xd3\x06\x88\xd1"
733
-+	"\x34\xeb\x3b\x04\x08\x86\x2b\xaf"
734
-+	"\x40\x86\x9a\xeb\xfa\x54\xf7\x5a"
735
-+	"\x7f\x10\x0c\x49\xe3\x51\x3f\x69"
736
-+	"\xae\x13\x5d\xf1\xb2\x67\x6c\x32"
737
-+	"\x01\x5a\x01\x0e\x22\xda\xa7\x36"
738
-+	"\xc9\x46\xf5\x9f\xb8\x1b\x48\x83"
739
-+	"\x89\xdd\x1f\xf2\x35\x21\x2d\x49"
740
-+	"\x06\x23\xbe\x10\xaa\x94\x34\xf0"
741
-+	"\x8c\xb2\x41\x81\x73\xba\x7d\x36"
742
-+	"\x5c\x55\x17\x6a\x2c\x9b\x22\xab"
743
-+	"\x2a\x3d\x1d\xa6\x09\x11\xe1\x71"
744
-+	"\x72\x78\xfc\x97\x6e\x51\x9c\xea"
745
-+	"\xd9\x0d\xcc\x52\x0d\x9e\xfc\xf6"
746
-+	"\xad\x75\x21\xb7\x90\x1b\x93\xe0"
747
-+	"\xff\x4a\x72\xb2\x19\x29\x39\x36"
748
-+	"\xfd\x5d\xe5\x15\x91\xc6\x52\x34"
749
-+	"\xd6\xfb\x36\xaf\xc8\x48\xf8\x62"
750
-+	"\xa6\xf5\xbf\x0e\x39\x30\xb1\x2a"
751
-+	"\xe6\xc1\x48\x67\xbc\x6e\x52\x34"
752
-+	"\xed\x74\xbb\x2e\x67\x33\xac\xf7"
753
-+	"\x28\x45\xd4\xee\xec\xb0\x69\xf1"
754
-+	"\xb1\xdf\xf7\x94\xa4\x5b\x03\xc1"
755
-+	"\x3c\x1a\x02\xc9\xbd\xf7\xcd\x19"
756
-+	"\x1f\x05\x7b\xdb\x7f\x12\xc0\x98"
757
-+	"\xf2\xc5\xb0\x14\x35\x8a\x53\x34"
758
-+	"\xb7\x67\x64\xca\x58\x2c\xd3\x0f"
759
-+	"\x28\x36\x3d\xad\xfc\x4f\xdd\x07"
760
-+	"\x96\xa0\x2b\xf0\x3e\xd3\x4a\xd7"
761
-+	"\x97\xfa\x7c\x42\x2e\xd3\xc9\x26"
762
-+	"\x25\x3f\x70\xda\xd3\x8a\xa7\xd7"
763
-+	"\x9e\x99\x8d\x71\x17\x0c\x86\x6d"
764
-+	"\x2b\x5b\xb8\x22\xac\x31\x5d\x0e"
765
-+	"\x0c\xf9\xe7\x74\xdf\x75\x1a\xfa"
766
-+	"\x73\x3b\xa8\xdc\xd0\x86\x0f\x9f"
767
-+	"\xe6\x42\xa9\xe6\xcd\x8e\xfa\x35"
768
-+	"\x2a\x4f\xc5\xea\x70\x15\x22\xe1"
769
-+	"\x5f\x70\x65\xb2\x60\x0e\x82\x7a"
770
-+	"\x58\xef\x01\x7d\x16\x23\x33\xfc"
771
-+	"\x29\x89\xeb\x43\xf1\x9c\xa7\xf4"
772
-+	"\x28\x7d\x30\x8a\x93\x39\xfd\x53"
773
-+	"\x97\x57\x81\x57\x70\xc6\x1f\x94"
774
-+	"\x1e\xa5\xed\x69\xfb\x6a\xd1\xe6",
694
++	"\xa0\xa6\x8a\x37\x01\x57\x4c\x4e\x4e\x6d\x80\x07\xbe\x45\x20\x8a"
695
++	"\xe8\xcf\x62\x76\x15\x0c\xe9\xf0\x1d\x25\x33\x2f\x49\xff\x17\xbc"
696
++	"\x77\x50\x65\x3f\x18\xfa\xf1\xc5\x61\x16\xb6\x90\x1e\x07\xcf\x17"
697
++	"\x1f\xc1\xc5\xd6\x65\xd0\xc2\x86\xef\x57\x79\x54\xb6\xc7\xbb\xdd"
698
++	"\x1c\x2d\xcd\xba\x02\xb9\xa8\xb7\xd3\x28\x1a\x89\x73\x2e\x5b\xe1"
699
++	"\x7c\x0c\x2f\x10\xde\xbc\x35\xd3\x08\x0e\xf5\xfc\x1a\xff\xc1\x6c"
700
++	"\x12\x9b\xa4\x4a\x04\x90\x07\x10\xdb\xa1\xfa\x4c\xa6\x30\x83\x9e"
701
++	"\x96\xbe\x59\x6d\x16\xdf\x9b\x28\xe6\x6f\x64\x46\x52\x2d\x8d\x20"
702
++	"\x41\x02\x95\x12\x37\x6e\x21\x3c\x36\xde\x01\x15\xa5\x80\x78\x6c"
703
++	"\x57\xc9\x44\x6c\xd3\x65\xdc\xcc\x18\x04\x9b\x79\x38\xc9\xb2\x84"
704
++	"\x54\xd8\x30\x45\x89\xe5\x16\x54\x33\x87\x7f\x04\xfc\x80\x71\x13"
705
++	"\x55\x51\x3b\xa2\x9d\xdc\x44\xa3\x28\xfa\xce\xb0\x5f\x0e\x7c\x30"
706
++	"\xd5\xef\xbf\x69\x71\xb3\x8e\xa3\x5f\x5d\x0b\xbf\x35\xc3\xc5\xf8"
707
++	"\x13\x03\xe1\x83\x7d\xb8\xc8\xd1\xcf\x6f\x25\x40\x37\x66\x25\x19"
708
++	"\xff\xb5\x49\x80\x70\xec\x16\x66\x2b\xdf\x41\xf8\x88\x3f\x92\x4b"
709
++	"\x51\xb1\x3f\x03\x97\x3c\x1d\x4b\xd1\xea\x8e\xbd\x66\xcb\xfa\x27"
710
++	"\xf3\xd9\xa1\x08\xfa\x83\x33\x62\x1d\x9e\xeb\xd8\xb1\xad\x8f\x9d"
711
++	"\x08\x03\x52\xbc\x4a\xd2\xd0\xd1\x07\x58\xdc\x97\x82\xa9\xd9\xfb"
712
++	"\x88\x0e\xd0\xcf\x60\x9b\x4c\x45\xfd\xd2\x20\xb7\x90\x7b\xf6\x90"
713
++	"\x97\xfb\x27\x15\xa2\x0a\xa4\x1c\x6d\x81\xf4\xc2\xf0\xb8\xd5\x30"
714
++	"\x7b\xce\x30\x1d\xb9\x86\xda\x1f\x83\x75\xbc\xcf\x25\xd3\x88\x83"
715
++	"\x81\xe2\xad\x8d\x01\x86\x03\x0a\x0e\x56\x2e\x7a\xe9\xe7\xd6\xbe"
716
++	"\x57\xf8\x15\xb2\xfa\xf8\xd0\xab\xb1\x1e\x37\x49\xea\x1c\x62\xb1"
717
++	"\x97\x44\xd6\x58\x48\xf2\x09\x81\xff\xa4\xba\x87\x4c\x3b\xfd\xe8",
775 718
 +	.c_size = 384,
776 719
 +	}, {
777 720
 +	.key =
... ...
@@ -1134,117 +1076,46 @@ index d6088e26f..4f5b35671 100644
1134 1134
 +	"\xbb\x56\xda\x27\x28\x39\xbc\xf6"
1135 1135
 +	"\x59\xfe\x77\xb2\x00",
1136 1136
 +	.key_len = 2861,
1137
-+	/*
1138
-+	 * m is SHA1 hash of following message:
1139
-+	 * "\x15\x1a\x49\x51\x70\x2b\x73\xd2"
1140
-+	 * "\xe6\xd0\xdc\x0d\x75\x72\x3a\xfd"
1141
-+	 * "\x3f\x1c\xa8\x78\x3a\x3e\x1e\xfd"
1142
-+	 * "\x69\x6e\xf5\x77\x45\x92\xce\x9b"
1143
-+	 * "\x4b\xf7\x61\x12\xba\xbc\x18\xc4"
1144
-+	 * "\x0d\x53\x5f\x79\x4e\x18\xfb\x42"
1145
-+	 * "\x88\x7c\x78\x71\xae\x8a\xae\x76"
1146
-+	 * "\x2c\x03\x0d\x89\xef\x80\x25\x46"
1147
-+	 * "\x4a\x2a\x26\x70\xb5\xc3\x7a\xb7"
1148
-+	 * "\x8e\x57\x03\xe9\xb5\x4a\x01\x76"
1149
-+	 * "\xf7\xe5\xf8\x6b\xd8\x18\xc6\x71"
1150
-+	 * "\x68\x17\xd5\x34\x73\xa6\x1b\x10"
1151
-+	 * "\x3c\x14\xc4\x50\x8f\xf3\x28\x81"
1152
-+	 * "\xe8\x51\x8a\x75\xfc\x16\x8d\x01"
1153
-+	 * "\x37\x81\x30\x0b\x91\x62\x5b\x0f"
1154
-+	 * "\x7a\xb6\x64\xde\x44\x62\x08\x18"
1155
-+	 * "\xcc\xff\x00\x42\x4c\x39\xf8\x28"
1156
-+	 * "\xf0\x89\xce\x33\x28\x41\x28\xcc"
1157
-+	 * "\xf5\x19\x96\x7c\xbf\xe7\x10\x3d"
1158
-+	 * "\x57\x10\x89\x88\x1b\x19\x0b\xb6"
1159
-+	 * "\x84\xb2\xb6\x24\xe3\x82\x1b\xce"
1160
-+	 * "\xfe\xf0\xf3\xa1\x9f\xb2\x1f\x04"
1161
-+	 * "\x3f\x7f\xf7\x4f\x19\x8d\xcb\x83"
1162
-+	 * "\x24\xe3\xc5\x67\x08\xf6\x18\xe3"
1163
-+	 * "\x2b\x6d\xe6\x47\x46\x67\x4c\xec"
1164
-+	 * "\x69\xaf\x0a\x8b\x6a\x35\x20\x1d"
1165
-+	 * "\x77\x91\x7f\x34\xfd\x36\x24\x6b"
1166
-+	 * "\xfa\xfd\x8c\x2f\x6f\x85\x7e\x08"
1167
-+	 * "\x7b\x5e\xd6\xc0\xd0\x97\x95\xbe"
1168
-+	 * "\xb4\xf4\x86\x3d\xf8\xc6\x80\xb1"
1169
-+	 * "\x12\x35\xec\x86\xff\x94\x41\x02"
1170
-+	 * "\x2e\xb7\xde\xdc\x25\x00\xe0\xf0"
1171
-+	 */
1172
-+	.m =
1173
-+	"\x11\xf6\xe7\xb6\x78\x4b\xaf\x4e"
1174
-+	"\xe2\x48\x2a\x00\x48\x9c\xc9\xf6"
1175
-+	"\x4e\xc0\x6f\x13",
1176
-+	.m_size = 20,
1137
++	.m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
1138
++	.m_size = 8,
1177 1139
 +	.c =
1178
-+	"\x59\x13\xb0\xd9\x68\xe8\xe3\x0b"
1179
-+	"\x46\x0f\xdf\x4c\x0d\x23\x83\x86"
1180
-+	"\xa0\x16\x46\xc8\x9e\xca\x9a\xda"
1181
-+	"\x1e\xc4\x69\xd3\xc5\x84\x3d\x32"
1182
-+	"\x73\xf2\x4c\x85\x22\x3f\x07\xd0"
1183
-+	"\xfc\x0e\x36\xdb\x3c\xdd\x07\xb5"
1184
-+	"\x09\xd0\x0b\x2e\xe1\x04\x0b\x02"
1185
-+	"\xb5\x68\x91\xfa\x17\x83\xf7\xb3"
1186
-+	"\x40\xea\x86\xc4\x70\x6e\xa0\x1b"
1187
-+	"\x5c\x9b\xbe\x8a\xf9\x2d\xb6\x28"
1188
-+	"\xeb\xcc\x73\xbb\x60\x50\x51\xfa"
1189
-+	"\xbc\x6c\x52\x0c\x1c\x13\x37\xaa"
1190
-+	"\xff\x06\xc0\xc8\xff\x75\x1b\x17"
1191
-+	"\x01\xe7\x59\x6e\xa6\x71\x29\xbe"
1192
-+	"\xf2\x85\xe9\x2e\xb1\x09\x90\xe6"
1193
-+	"\xab\x1d\x99\xf2\xce\x66\x6d\xd6"
1194
-+	"\xf9\x02\x76\x00\x2f\xd3\xd3\x2e"
1195
-+	"\x98\x2d\x2c\x92\x4e\x3f\xc3\xb8"
1196
-+	"\x29\x6d\x11\x30\x6f\xa4\x33\x87"
1197
-+	"\x6b\xe9\x69\x99\xea\x4d\x99\x60"
1198
-+	"\x37\xd9\xbb\x1b\x54\x63\xab\x62"
1199
-+	"\x00\xc3\xdd\x2b\x33\xaf\xf2\x22"
1200
-+	"\xa9\xd8\x66\xe4\x7b\x2b\xe6\xf7"
1201
-+	"\x9e\x4a\x13\xc8\x6b\x3f\x0a\xd9"
1202
-+	"\x31\x9c\xb2\x80\xf2\x00\x43\xd3"
1203
-+	"\x70\x49\x89\xb4\x09\x6d\xde\xc9"
1204
-+	"\x07\x84\x77\x85\xbc\x84\x47\xcf"
1205
-+	"\x4f\xa8\x3b\x11\xc0\x41\x33\xbb"
1206
-+	"\x54\x11\xa2\x66\xdd\x44\xd0\x87"
1207
-+	"\xc5\xea\x6a\xc1\x08\x8d\x9a\x0b"
1208
-+	"\x8b\x9e\xd8\x5c\x03\xf6\x13\x4a"
1209
-+	"\xd8\xdb\x5b\xcd\x35\x91\xbc\x69"
1210
-+	"\x40\x83\x8a\xbe\xba\x45\xd2\xf4"
1211
-+	"\x08\x04\xc4\x9f\x2f\xf1\xe2\x0b"
1212
-+	"\xb7\xec\x91\x5a\xe4\xbe\xa3\xb6"
1213
-+	"\xc9\xec\x79\x3c\x60\x0a\x6a\xe9"
1214
-+	"\x93\xa4\xec\x3e\xbb\x84\x59\xad"
1215
-+	"\x65\x09\x10\x0b\xcd\xa7\x1b\xdf"
1216
-+	"\xec\x15\x2f\xb1\xac\x5c\xf6\xab"
1217
-+	"\x44\x99\xa3\xae\x82\xeb\x01\x7a"
1218
-+	"\x17\x4a\xa6\xe2\x4f\x4f\x77\x0b"
1219
-+	"\xd6\x25\x54\x82\x53\xa4\xf9\x23"
1220
-+	"\x41\xa0\xa3\x4a\x88\xc2\xf8\xfa"
1221
-+	"\x51\x0a\xd7\x0f\xbd\x1e\xf3\x52"
1222
-+	"\x2a\x21\x3d\xb8\x04\xa5\xbc\x5b"
1223
-+	"\xa2\x61\xcf\x89\xc0\xce\x9b\x6a"
1224
-+	"\xd6\x29\xbe\x82\x7f\x36\xd1\x64"
1225
-+	"\x6e\x7c\x35\x0c\x3f\x55\xb1\x23"
1226
-+	"\x2f\x84\xbb\x56\x52\xe5\x0b\x0e"
1227
-+	"\x88\xac\x17\xb1\x6c\x1c\x60\xfc"
1228
-+	"\x82\xae\xe5\x3a\x1d\x3f\x40\x48"
1229
-+	"\x5d\xbc\xc0\xba\x89\x9b\x26\x33"
1230
-+	"\xec\x18\x3b\xa8\xfc\x5b\x35\xc0"
1231
-+	"\x25\xd1\xc8\x79\x72\x74\x8e\x5a"
1232
-+	"\xa3\xf1\x72\x63\x72\xec\xfd\xc7"
1233
-+	"\xe4\x14\x0d\xeb\xd0\x4b\x17\xd1"
1234
-+	"\x8a\x28\x43\x8f\x30\xce\xf6\x87"
1235
-+	"\xe3\xd5\xe3\xce\xd0\x54\xaa\x5d"
1236
-+	"\x65\x7b\xf7\x67\xeb\x5e\x5d\xf4"
1237
-+	"\x73\x2a\x86\x71\x14\x09\x25\x1c"
1238
-+	"\x48\xd9\x98\xc8\x0a\x15\x58\x62"
1239
-+	"\x51\xe7\x7c\xce\x0a\xf0\x6d\xd9"
1240
-+	"\x20\x68\x11\x8c\x3b\x2d\xd9\xcb"
1241
-+	"\x13\xe1\x1c\xe3\x2c\x80\xbb\x9a",
1140
++	"\x3e\xf9\xd5\xdb\xe7\x4a\xf7\xb5\xce\x15\xa6\xd3\x93\xa7\xb9\x25"
1141
++	"\x0f\x37\x94\x7d\x0b\xbf\xc0\x57\x86\x47\xd8\xe5\xce\x4e\xe6\x90"
1142
++	"\x2a\x9d\x18\x30\x89\x7d\x4a\xf3\x45\xc7\xf8\xbb\x0d\xd1\x8e\x8f"
1143
++	"\xd2\xa5\xb8\x44\x09\xbd\x97\xc7\x48\x53\x07\x05\x37\x10\x43\x33"
1144
++	"\x03\x21\x5e\x02\x98\x02\x10\x53\x2d\x18\xdf\x44\xb4\x62\x8e\xf6"
1145
++	"\x22\x84\xec\xbc\x2c\xb1\x8a\xbe\xde\x35\x10\x77\x47\xcc\xf1\xa7"
1146
++	"\x12\x06\x2f\xa6\x21\x29\xe1\xfd\xcb\x81\x5b\x0e\xfd\x92\x3d\x7a"
1147
++	"\xed\x4e\x37\x70\x04\x27\xcc\x26\x3a\x95\x1d\xb2\x11\x20\xa5\x75"
1148
++	"\x98\x6a\x3c\x4c\xe5\xdb\x9e\xbc\x90\x3d\x5b\x2f\x08\xbd\x20\x5c"
1149
++	"\xb8\x13\xe9\x77\xb0\x2c\x0f\xde\xc8\xc8\x6f\x1f\xf8\x72\x33\x7d"
1150
++	"\x7e\xb3\x8b\x25\xb3\x27\x95\xb0\xfd\xd4\x7a\x89\x39\x41\xc3\xea"
1151
++	"\x3c\x43\xab\x40\x23\x61\x1e\xb0\x0d\x8c\x69\x1c\x91\x85\x7c\xdd"
1152
++	"\xa7\x0f\x25\x0c\xc1\x46\x36\x16\x93\x3c\x1f\x41\x45\x38\xe1\x0f"
1153
++	"\x4c\x36\x40\x7a\xfc\x63\x97\x0e\xea\x07\x6f\xa4\x04\xd8\x77\xcb"
1154
++	"\xe5\xbf\x53\x71\xac\xe4\x87\x2d\x79\x1b\x82\x3d\x98\x09\x7d\x1e"
1155
++	"\x4d\xfd\x5e\x47\xe8\xb8\x56\x8c\x21\x87\x82\x1a\xeb\xa3\x80\x3d"
1156
++	"\xae\x07\x34\xaf\x48\x5f\x41\x0a\xe9\xc7\xcc\xff\xe3\x15\x15\xc2"
1157
++	"\x3c\x4b\x0e\x8e\xc4\x36\x50\xc4\x5e\xcc\xc5\x82\x1a\x20\xe6\x14"
1158
++	"\x61\x49\x20\xb7\xf2\x2b\xae\x3e\x7e\x21\xae\xbd\x5a\xf0\x78\xca"
1159
++	"\xd2\x65\xb5\xa8\x4a\x70\x4b\x9a\x12\xe3\x81\x13\x92\x7b\x68\xf6"
1160
++	"\xe5\x5e\x6f\x29\x40\x99\xd7\x13\x87\x41\x29\xa2\xcb\x75\x06\xc5"
1161
++	"\xa3\xcc\x43\x48\x0e\x85\x50\x88\xda\xc0\xf0\x67\x82\xa8\xf6\xdb"
1162
++	"\x79\xf2\xcf\xb6\x77\x24\x5b\x0b\x35\xe9\x48\x2b\x3a\x79\xf8\x4a"
1163
++	"\xfa\x9b\xc3\xb4\xf1\xfc\xe7\x99\xac\xca\x53\xcf\xb3\x81\xc3\x35"
1164
++	"\x89\x3b\xab\x23\xc1\xa0\x20\xb2\x62\x65\x20\xe9\x4b\x34\xc5\xa5"
1165
++	"\x78\x82\xc6\xb9\x95\x9e\x96\xe0\xc3\x67\x8d\x2c\xc4\x09\xaf\xd5"
1166
++	"\x10\xdc\x36\x23\x5e\x2e\xed\x01\x80\xe7\xb6\xb4\xd2\xdf\x17\x9f"
1167
++	"\xa9\x6a\xa3\x1e\x63\x17\x4c\x51\xe1\x8a\x72\xfe\x0f\x39\x91\x81"
1168
++	"\xbd\x51\xa9\xc9\x7e\xe1\x35\x97\x8c\xe1\x1e\xe8\x42\x5d\xeb\x83"
1169
++	"\x8e\x1d\x5e\x96\x47\x6d\x78\x12\xa8\x47\x90\x0f\xf7\xf7\x3f\x65"
1170
++	"\xb2\xa2\x94\x07\x86\xe1\x5f\x0f\xb4\x21\x24\x38\x58\xd8\xd8\x03"
1171
++	"\x4e\x07\x06\x9e\xd2\xc5\x63\x14\xeb\xec\x2a\x6c\xd4\x35\x0c\x44",
1242 1172
 +	.c_size = 512,
1243
-+#endif
1244 1173
  #ifndef CONFIG_CRYPTO_FIPS
1245 1174
  	}, {
1246 1175
  	.key =
1247
-@@ -1228,6 +2052,726 @@ static const struct akcipher_testvec ecrdsa_tv_template[] = {
1176
+@@ -1228,6 +1925,726 @@ static const struct akcipher_testvec ecrdsa_tv_template[] = {
1248 1177
  /*
1249 1178
   * PKCS#1 RSA test vectors. Obtained from CAVS testing.
1250 1179
   */
... ...
@@ -1971,7 +1842,7 @@ index d6088e26f..4f5b35671 100644
1971 1971
  static const struct akcipher_testvec pkcs1pad_rsa_tv_template[] = {
1972 1972
  	{
1973 1973
  	.key =
1974
-@@ -1344,6 +2888,845 @@ static const struct akcipher_testvec pkcs1pad_rsa_tv_template[] = {
1974
+@@ -1344,6 +2761,845 @@ static const struct akcipher_testvec pkcs1pad_rsa_tv_template[] = {
1975 1975
  	}
1976 1976
  };
1977 1977
  
... ...
@@ -2817,7 +2688,7 @@ index d6088e26f..4f5b35671 100644
2817 2817
  static const struct kpp_testvec dh_tv_template[] = {
2818 2818
  	{
2819 2819
  	.secret =
2820
-@@ -4399,6 +6782,52 @@ static const struct kpp_testvec ecdh_p384_tv_template[] = {
2820
+@@ -4399,6 +6655,52 @@ static const struct kpp_testvec ecdh_p384_tv_template[] = {
2821 2821
  	.b_public_size = 96,
2822 2822
  	.expected_a_public_size = 96,
2823 2823
  	.expected_ss_size = 48
... ...
@@ -2870,7 +2741,7 @@ index d6088e26f..4f5b35671 100644
2870 2870
  	}
2871 2871
  };
2872 2872
  
2873
-@@ -7640,6 +10069,98 @@ static const struct hash_testvec aes_cmac128_tv_template[] = {
2873
+@@ -7640,6 +9942,98 @@ static const struct hash_testvec aes_cmac128_tv_template[] = {
2874 2874
  				  "\x69\x6a\x2c\x05\x6c\x31\x54\x10",
2875 2875
  		.psize		= 64,
2876 2876
  		.ksize		= 32,
... ...
@@ -2969,7 +2840,7 @@ index d6088e26f..4f5b35671 100644
2969 2969
  	}
2970 2970
  };
2971 2971
  
2972
-@@ -22994,6 +25515,185 @@ static const struct cprng_testvec ansi_cprng_aes_tv_template[] = {
2972
+@@ -22994,6 +25388,185 @@ static const struct cprng_testvec ansi_cprng_aes_tv_template[] = {
2973 2973
  	},
2974 2974
  };
2975 2975
  
... ...
@@ -3155,7 +3026,7 @@ index d6088e26f..4f5b35671 100644
3155 3155
  /*
3156 3156
   * SP800-90A DRBG Test vectors from
3157 3157
   * http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgtestvectors.zip
3158
-@@ -23318,6 +26018,40 @@ static const struct drbg_testvec drbg_pr_hmac_sha256_tv_template[] = {
3158
+@@ -23318,6 +25891,40 @@ static const struct drbg_testvec drbg_pr_hmac_sha256_tv_template[] = {
3159 3159
  	},
3160 3160
  };
3161 3161
  
... ...
@@ -3196,7 +3067,7 @@ index d6088e26f..4f5b35671 100644
3196 3196
  static const struct drbg_testvec drbg_pr_ctr_aes128_tv_template[] = {
3197 3197
  	{
3198 3198
  		.entropy = (unsigned char *)
3199
-@@ -23434,6 +26168,283 @@ static const struct drbg_testvec drbg_pr_ctr_aes128_tv_template[] = {
3199
+@@ -23434,6 +26041,283 @@ static const struct drbg_testvec drbg_pr_ctr_aes128_tv_template[] = {
3200 3200
  	},
3201 3201
  };
3202 3202
  
... ...
@@ -3480,7 +3351,7 @@ index d6088e26f..4f5b35671 100644
3480 3480
  /*
3481 3481
   * SP800-90A DRBG Test vectors from
3482 3482
   * http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgtestvectors.zip
3483
-@@ -23564,6 +26575,70 @@ static const struct drbg_testvec drbg_nopr_sha256_tv_template[] = {
3483
+@@ -23564,6 +26448,70 @@ static const struct drbg_testvec drbg_nopr_sha256_tv_template[] = {
3484 3484
  	},
3485 3485
  };
3486 3486
  
... ...
@@ -3551,7 +3422,7 @@ index d6088e26f..4f5b35671 100644
3551 3551
  static const struct drbg_testvec drbg_nopr_hmac_sha256_tv_template[] = {
3552 3552
  	{
3553 3553
  		.entropy = (unsigned char *)
3554
-@@ -34639,7 +37714,94 @@ static const struct cipher_testvec cts_mode_tv_template[] = {
3554
+@@ -34639,7 +37587,94 @@ static const struct cipher_testvec cts_mode_tv_template[] = {
3555 3555
  			  "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40"
3556 3556
  			  "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
3557 3557
  			  "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
... ...
@@ -3648,4 +3519,4 @@ index d6088e26f..4f5b35671 100644
3648 3648
  
3649 3649
  /*
3650 3650
 -- 
3651
-2.41.0
3651
+2.42.0
... ...
@@ -21,7 +21,7 @@
21 21
 Summary:        Kernel
22 22
 Name:           linux-esx
23 23
 Version:        6.1.62
24
-Release:        3%{?dist}
24
+Release:        4%{?dist}
25 25
 License:        GPLv2
26 26
 URL:            http://www.kernel.org
27 27
 Group:          System Environment/Kernel
... ...
@@ -548,6 +548,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
548 548
 %{_usrsrc}/linux-headers-%{uname_r}
549 549
 
550 550
 %changelog
551
+* Wed Dec 20 2023 Vamsi Krishna Brahmajosyula <vbrahmajosyula@vmware.com> 6.1.62-4
552
+- Fix RSA self tests
551 553
 * Wed Nov 29 2023 Brennan Lamoreaux <blamoreaux@vmware.com> 6.1.62-3
552 554
 - Fix for CVE-2023-2176
553 555
 * Wed Nov 29 2023 Ajay Kaher <akaher@vmware.com> 6.1.62-2
... ...
@@ -14,7 +14,7 @@
14 14
 Summary:        Kernel
15 15
 Name:           linux-rt
16 16
 Version:        6.1.62
17
-Release:        2%{?dist}
17
+Release:        3%{?dist}
18 18
 License:        GPLv2
19 19
 URL:            http://www.kernel.org
20 20
 Group:          System Environment/Kernel
... ...
@@ -506,6 +506,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
506 506
 %{_usrsrc}/linux-headers-%{uname_r}
507 507
 
508 508
 %changelog
509
+* Wed Dec 20 2023 Vamsi Krishna Brahmajosyula <vbrahmajosyula@vmware.com> 6.1.62-3
510
+- Fix RSA self tests
509 511
 * Wed Nov 29 2023 Brennan Lamoreaux <blamoreaux@vmware.com> 6.1.62-2
510 512
 - Fix for CVE-2023-2176
511 513
 * Wed Nov 29 2023 Ankit Jain <ankitja@vmware.com> 6.1.62-1
... ...
@@ -14,7 +14,7 @@
14 14
 Summary:        Kernel
15 15
 Name:           linux-secure
16 16
 Version:        6.1.62
17
-Release:        4%{?kat_build:.kat}%{?dist}
17
+Release:        5%{?kat_build:.kat}%{?dist}
18 18
 License:        GPLv2
19 19
 URL:            http://www.kernel.org
20 20
 Group:          System Environment/Kernel
... ...
@@ -466,6 +466,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
466 466
 %endif
467 467
 
468 468
 %changelog
469
+* Wed Dec 20 2023 Vamsi Krishna Brahmajosyula <vbrahmajosyula@vmware.com> 6.1.62-5
470
+- Fix RSA self tests
469 471
 * Wed Dec 20 2023 Keerthana K <keerthanak@vmware.com> 6.1.62-4
470 472
 - Add wrapper for task_struct, spinlock etc structures in seqiv and geniv
471 473
 - Include a script to fail canister build if common kernel structures found
... ...
@@ -25,7 +25,7 @@
25 25
 Summary:        Kernel
26 26
 Name:           linux
27 27
 Version:        6.1.62
28
-Release:        2%{?acvp_build:.acvp}%{?dist}
28
+Release:        3%{?acvp_build:.acvp}%{?dist}
29 29
 License:        GPLv2
30 30
 URL:            http://www.kernel.org/
31 31
 Group:          System Environment/Kernel
... ...
@@ -799,6 +799,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
799 799
 %{_datadir}/bash-completion/completions/bpftool
800 800
 
801 801
 %changelog
802
+* Wed Dec 20 2023 Vamsi Krishna Brahmajosyula <vbrahmajosyula@vmware.com> 6.1.62-3
803
+- Fix RSA self tests
802 804
 * Wed Nov 29 2023 Brennan Lamoreaux <blamoreaux@vmware.com> 6.1.62-2
803 805
 - Fix for CVE-2023-2176
804 806
 * Wed Nov 29 2023 Ankit Jain <ankitja@vmware.com> 6.1.62-1