Skip to content

Commit cb43c60

Browse files
magalilemeskuba-moo
authored andcommitted
selftests: net: vrf-xfrm-tests: change authentication and encryption algos
The vrf-xfrm-tests tests use the hmac(md5) and cbc(des3_ede) algorithms for performing authentication and encryption, respectively. This causes the tests to fail when fips=1 is set, since these algorithms are not allowed in FIPS mode. Therefore, switch from hmac(md5) and cbc(des3_ede) to hmac(sha1) and cbc(aes), which are FIPS compliant. Fixes: 3f251d7 ("selftests: Add tests for vrf and xfrms") Reviewed-by: David Ahern <[email protected]> Signed-off-by: Magali Lemes <[email protected]> Signed-off-by: Jakub Kicinski <[email protected]>
1 parent d113c39 commit cb43c60

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

tools/testing/selftests/net/vrf-xfrm-tests.sh

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -264,60 +264,60 @@ setup_xfrm()
264264
ip -netns host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} \
265265
proto esp spi ${SPI_1} reqid 0 mode tunnel \
266266
replay-window 4 replay-oseq 0x4 \
267-
auth-trunc 'hmac(md5)' ${AUTH_1} 96 \
268-
enc 'cbc(des3_ede)' ${ENC_1} \
267+
auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
268+
enc 'cbc(aes)' ${ENC_1} \
269269
sel src ${h1_4} dst ${h2_4} ${devarg}
270270

271271
ip -netns host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} \
272272
proto esp spi ${SPI_1} reqid 0 mode tunnel \
273273
replay-window 4 replay-oseq 0x4 \
274-
auth-trunc 'hmac(md5)' ${AUTH_1} 96 \
275-
enc 'cbc(des3_ede)' ${ENC_1} \
274+
auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
275+
enc 'cbc(aes)' ${ENC_1} \
276276
sel src ${h1_4} dst ${h2_4}
277277

278278

279279
ip -netns host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} \
280280
proto esp spi ${SPI_2} reqid 0 mode tunnel \
281281
replay-window 4 replay-oseq 0x4 \
282-
auth-trunc 'hmac(md5)' ${AUTH_2} 96 \
283-
enc 'cbc(des3_ede)' ${ENC_2} \
282+
auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
283+
enc 'cbc(aes)' ${ENC_2} \
284284
sel src ${h2_4} dst ${h1_4} ${devarg}
285285

286286
ip -netns host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} \
287287
proto esp spi ${SPI_2} reqid 0 mode tunnel \
288288
replay-window 4 replay-oseq 0x4 \
289-
auth-trunc 'hmac(md5)' ${AUTH_2} 96 \
290-
enc 'cbc(des3_ede)' ${ENC_2} \
289+
auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
290+
enc 'cbc(aes)' ${ENC_2} \
291291
sel src ${h2_4} dst ${h1_4}
292292

293293

294294
ip -6 -netns host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} \
295295
proto esp spi ${SPI_1} reqid 0 mode tunnel \
296296
replay-window 4 replay-oseq 0x4 \
297-
auth-trunc 'hmac(md5)' ${AUTH_1} 96 \
298-
enc 'cbc(des3_ede)' ${ENC_1} \
297+
auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
298+
enc 'cbc(aes)' ${ENC_1} \
299299
sel src ${h1_6} dst ${h2_6} ${devarg}
300300

301301
ip -6 -netns host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} \
302302
proto esp spi ${SPI_1} reqid 0 mode tunnel \
303303
replay-window 4 replay-oseq 0x4 \
304-
auth-trunc 'hmac(md5)' ${AUTH_1} 96 \
305-
enc 'cbc(des3_ede)' ${ENC_1} \
304+
auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \
305+
enc 'cbc(aes)' ${ENC_1} \
306306
sel src ${h1_6} dst ${h2_6}
307307

308308

309309
ip -6 -netns host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} \
310310
proto esp spi ${SPI_2} reqid 0 mode tunnel \
311311
replay-window 4 replay-oseq 0x4 \
312-
auth-trunc 'hmac(md5)' ${AUTH_2} 96 \
313-
enc 'cbc(des3_ede)' ${ENC_2} \
312+
auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
313+
enc 'cbc(aes)' ${ENC_2} \
314314
sel src ${h2_6} dst ${h1_6} ${devarg}
315315

316316
ip -6 -netns host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} \
317317
proto esp spi ${SPI_2} reqid 0 mode tunnel \
318318
replay-window 4 replay-oseq 0x4 \
319-
auth-trunc 'hmac(md5)' ${AUTH_2} 96 \
320-
enc 'cbc(des3_ede)' ${ENC_2} \
319+
auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
320+
enc 'cbc(aes)' ${ENC_2} \
321321
sel src ${h2_6} dst ${h1_6}
322322
}
323323

0 commit comments

Comments
 (0)