testmgr.c (a0d608ee5ebfa9a9da0e69784e7aa0f86644a02e) | testmgr.c (231baecdef7a906579925ccf1bd45aa734f32320) |
---|---|
1/* 2 * Algorithm testing framework and tests. 3 * 4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 5 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 6 * Copyright (c) 2007 Nokia Siemens Networks 7 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au> 8 * --- 692 unchanged lines hidden (view full) --- 701 memcpy(assocbuf, template[i].assoc, template[i].alen); 702 if (template[i].iv) 703 memcpy(iv, template[i].iv, iv_len); 704 else 705 memset(iv, 0, iv_len); 706 707 crypto_aead_clear_flags(tfm, ~0); 708 if (template[i].wk) | 1/* 2 * Algorithm testing framework and tests. 3 * 4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 5 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 6 * Copyright (c) 2007 Nokia Siemens Networks 7 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au> 8 * --- 692 unchanged lines hidden (view full) --- 701 memcpy(assocbuf, template[i].assoc, template[i].alen); 702 if (template[i].iv) 703 memcpy(iv, template[i].iv, iv_len); 704 else 705 memset(iv, 0, iv_len); 706 707 crypto_aead_clear_flags(tfm, ~0); 708 if (template[i].wk) |
709 crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 709 crypto_aead_set_flags(tfm, 710 CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); |
710 711 if (template[i].klen > MAX_KEYLEN) { 712 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 713 d, j, algo, template[i].klen, 714 MAX_KEYLEN); 715 ret = -EINVAL; 716 goto out; 717 } --- 97 unchanged lines hidden (view full) --- 815 816 if (template[i].iv) 817 memcpy(iv, template[i].iv, iv_len); 818 else 819 memset(iv, 0, MAX_IVLEN); 820 821 crypto_aead_clear_flags(tfm, ~0); 822 if (template[i].wk) | 711 712 if (template[i].klen > MAX_KEYLEN) { 713 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 714 d, j, algo, template[i].klen, 715 MAX_KEYLEN); 716 ret = -EINVAL; 717 goto out; 718 } --- 97 unchanged lines hidden (view full) --- 816 817 if (template[i].iv) 818 memcpy(iv, template[i].iv, iv_len); 819 else 820 memset(iv, 0, MAX_IVLEN); 821 822 crypto_aead_clear_flags(tfm, ~0); 823 if (template[i].wk) |
823 crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 824 crypto_aead_set_flags(tfm, 825 CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); |
824 if (template[i].klen > MAX_KEYLEN) { 825 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 826 d, j, algo, template[i].klen, MAX_KEYLEN); 827 ret = -EINVAL; 828 goto out; 829 } 830 memcpy(key, template[i].key, template[i].klen); 831 --- 241 unchanged lines hidden (view full) --- 1073 if (WARN_ON(template[i].len > PAGE_SIZE)) 1074 goto out; 1075 1076 data = xbuf[0]; 1077 memcpy(data, input, template[i].len); 1078 1079 crypto_cipher_clear_flags(tfm, ~0); 1080 if (template[i].wk) | 826 if (template[i].klen > MAX_KEYLEN) { 827 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 828 d, j, algo, template[i].klen, MAX_KEYLEN); 829 ret = -EINVAL; 830 goto out; 831 } 832 memcpy(key, template[i].key, template[i].klen); 833 --- 241 unchanged lines hidden (view full) --- 1075 if (WARN_ON(template[i].len > PAGE_SIZE)) 1076 goto out; 1077 1078 data = xbuf[0]; 1079 memcpy(data, input, template[i].len); 1080 1081 crypto_cipher_clear_flags(tfm, ~0); 1082 if (template[i].wk) |
1081 crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 1083 crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); |
1082 1083 ret = crypto_cipher_setkey(tfm, template[i].key, 1084 template[i].klen); 1085 if (template[i].fail == !ret) { 1086 printk(KERN_ERR "alg: cipher: setkey failed " 1087 "on test %d for %s: flags=%x\n", j, 1088 algo, crypto_cipher_get_flags(tfm)); 1089 goto out; --- 99 unchanged lines hidden (view full) --- 1189 goto out; 1190 1191 data = xbuf[0]; 1192 data += align_offset; 1193 memcpy(data, input, template[i].len); 1194 1195 crypto_skcipher_clear_flags(tfm, ~0); 1196 if (template[i].wk) | 1084 1085 ret = crypto_cipher_setkey(tfm, template[i].key, 1086 template[i].klen); 1087 if (template[i].fail == !ret) { 1088 printk(KERN_ERR "alg: cipher: setkey failed " 1089 "on test %d for %s: flags=%x\n", j, 1090 algo, crypto_cipher_get_flags(tfm)); 1091 goto out; --- 99 unchanged lines hidden (view full) --- 1191 goto out; 1192 1193 data = xbuf[0]; 1194 data += align_offset; 1195 memcpy(data, input, template[i].len); 1196 1197 crypto_skcipher_clear_flags(tfm, ~0); 1198 if (template[i].wk) |
1197 crypto_skcipher_set_flags(tfm, 1198 CRYPTO_TFM_REQ_WEAK_KEY); | 1199 crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); |
1199 1200 ret = crypto_skcipher_setkey(tfm, template[i].key, 1201 template[i].klen); 1202 if (template[i].fail == !ret) { 1203 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n", 1204 d, j, algo, crypto_skcipher_get_flags(tfm)); 1205 goto out; 1206 } else if (ret) --- 53 unchanged lines hidden (view full) --- 1260 else 1261 memset(iv, 0, MAX_IVLEN); 1262 1263 input = enc ? template[i].ptext : template[i].ctext; 1264 result = enc ? template[i].ctext : template[i].ptext; 1265 j++; 1266 crypto_skcipher_clear_flags(tfm, ~0); 1267 if (template[i].wk) | 1200 1201 ret = crypto_skcipher_setkey(tfm, template[i].key, 1202 template[i].klen); 1203 if (template[i].fail == !ret) { 1204 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n", 1205 d, j, algo, crypto_skcipher_get_flags(tfm)); 1206 goto out; 1207 } else if (ret) --- 53 unchanged lines hidden (view full) --- 1261 else 1262 memset(iv, 0, MAX_IVLEN); 1263 1264 input = enc ? template[i].ptext : template[i].ctext; 1265 result = enc ? template[i].ctext : template[i].ptext; 1266 j++; 1267 crypto_skcipher_clear_flags(tfm, ~0); 1268 if (template[i].wk) |
1268 crypto_skcipher_set_flags(tfm, 1269 CRYPTO_TFM_REQ_WEAK_KEY); | 1269 crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); |
1270 1271 ret = crypto_skcipher_setkey(tfm, template[i].key, 1272 template[i].klen); 1273 if (template[i].fail == !ret) { 1274 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n", 1275 d, j, algo, crypto_skcipher_get_flags(tfm)); 1276 goto out; 1277 } else if (ret) --- 2496 unchanged lines hidden --- | 1270 1271 ret = crypto_skcipher_setkey(tfm, template[i].key, 1272 template[i].klen); 1273 if (template[i].fail == !ret) { 1274 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n", 1275 d, j, algo, crypto_skcipher_get_flags(tfm)); 1276 goto out; 1277 } else if (ret) --- 2496 unchanged lines hidden --- |