lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <TU4PR8401MB1216BF9450F95187F94BCE01F64B0@TU4PR8401MB1216.NAMPRD84.PROD.OUTLOOK.COM>
Date:   Wed, 5 Aug 2020 20:03:31 +0000
From:   "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@...com>
To:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: DRBG CAVS test error

Hi All

I am executing DRBG CAVS test, using drbg_nopr_hmac_sha512. Below is the code snippet.

test_data.testentropy = &testentropy;
drbg_string_fill(&testentropy, drbg_st->entropy_nonce_input, drbg_st->entropy_nonce_len);
drbg_string_fill(&pers, drbg_st->personalization_string, iv_struct->personalization_string_len);
ret = crypto_drbg_reset_test(drng, &pers, &test_data);

drbg_string_fill(&additional_input, drbg_st->additional_input_reseed, drbg_st->additional_input_reseed_len);
if (drbg_st->entropy_input_reseed_len >0)
	drbg_string_fill(&entropy_input, drbg_st->>entropy_input_reseed, drbg_st->entropy_input_reseed_len);
ret = crypto_drbg_get_bytes_addtl(drng, buf, test->expectedlen, &additional_input);

drbg_string_fill(&additional_input,   drbg_st->additional_generate,    drbg_st->additional_generate_len);
if (drbg_st->entropy_input_generate_len >0)
	drbg_string_fill(&entropy_input, drbg_st->entropy_input_generate, drbg_st->entropy_input_generate_len);
ret = crypto_drbg_get_bytes_addtl(drng, buf, test->expectedlen, &additional_input);

drbg_string_fill(&additional_input, drbg_st->additional_input_final,    drbg_st->additional_input_final_len);
if (additional_input_final_len > 0)
	drbg_string_fill(&entropy_input, drbg_st->entropy_input_final, drbg_st->entropy_input_final_len);
ret = crypto_drbg_get_bytes_addtl(drng, buf, test->expectedlen, &additional_input);

However the output generated seems to be wrong. Can any help me to indicate what I am doing wrong

Regards,
Jaya

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ