testmgr.c (a0d608ee5ebfa9a9da0e69784e7aa0f86644a02e) testmgr.c (231baecdef7a906579925ccf1bd45aa734f32320)
1/*
2 * Algorithm testing framework and tests.
3 *
4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6 * Copyright (c) 2007 Nokia Siemens Networks
7 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8 *

--- 692 unchanged lines hidden (view full) ---

701 memcpy(assocbuf, template[i].assoc, template[i].alen);
702 if (template[i].iv)
703 memcpy(iv, template[i].iv, iv_len);
704 else
705 memset(iv, 0, iv_len);
706
707 crypto_aead_clear_flags(tfm, ~0);
708 if (template[i].wk)
1/*
2 * Algorithm testing framework and tests.
3 *
4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6 * Copyright (c) 2007 Nokia Siemens Networks
7 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8 *

--- 692 unchanged lines hidden (view full) ---

701 memcpy(assocbuf, template[i].assoc, template[i].alen);
702 if (template[i].iv)
703 memcpy(iv, template[i].iv, iv_len);
704 else
705 memset(iv, 0, iv_len);
706
707 crypto_aead_clear_flags(tfm, ~0);
708 if (template[i].wk)
709 crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
709 crypto_aead_set_flags(tfm,
710 CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
710
711 if (template[i].klen > MAX_KEYLEN) {
712 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
713 d, j, algo, template[i].klen,
714 MAX_KEYLEN);
715 ret = -EINVAL;
716 goto out;
717 }

--- 97 unchanged lines hidden (view full) ---

815
816 if (template[i].iv)
817 memcpy(iv, template[i].iv, iv_len);
818 else
819 memset(iv, 0, MAX_IVLEN);
820
821 crypto_aead_clear_flags(tfm, ~0);
822 if (template[i].wk)
711
712 if (template[i].klen > MAX_KEYLEN) {
713 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
714 d, j, algo, template[i].klen,
715 MAX_KEYLEN);
716 ret = -EINVAL;
717 goto out;
718 }

--- 97 unchanged lines hidden (view full) ---

816
817 if (template[i].iv)
818 memcpy(iv, template[i].iv, iv_len);
819 else
820 memset(iv, 0, MAX_IVLEN);
821
822 crypto_aead_clear_flags(tfm, ~0);
823 if (template[i].wk)
823 crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
824 crypto_aead_set_flags(tfm,
825 CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
824 if (template[i].klen > MAX_KEYLEN) {
825 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
826 d, j, algo, template[i].klen, MAX_KEYLEN);
827 ret = -EINVAL;
828 goto out;
829 }
830 memcpy(key, template[i].key, template[i].klen);
831

--- 241 unchanged lines hidden (view full) ---

1073 if (WARN_ON(template[i].len > PAGE_SIZE))
1074 goto out;
1075
1076 data = xbuf[0];
1077 memcpy(data, input, template[i].len);
1078
1079 crypto_cipher_clear_flags(tfm, ~0);
1080 if (template[i].wk)
826 if (template[i].klen > MAX_KEYLEN) {
827 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
828 d, j, algo, template[i].klen, MAX_KEYLEN);
829 ret = -EINVAL;
830 goto out;
831 }
832 memcpy(key, template[i].key, template[i].klen);
833

--- 241 unchanged lines hidden (view full) ---

1075 if (WARN_ON(template[i].len > PAGE_SIZE))
1076 goto out;
1077
1078 data = xbuf[0];
1079 memcpy(data, input, template[i].len);
1080
1081 crypto_cipher_clear_flags(tfm, ~0);
1082 if (template[i].wk)
1081 crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
1083 crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
1082
1083 ret = crypto_cipher_setkey(tfm, template[i].key,
1084 template[i].klen);
1085 if (template[i].fail == !ret) {
1086 printk(KERN_ERR "alg: cipher: setkey failed "
1087 "on test %d for %s: flags=%x\n", j,
1088 algo, crypto_cipher_get_flags(tfm));
1089 goto out;

--- 99 unchanged lines hidden (view full) ---

1189 goto out;
1190
1191 data = xbuf[0];
1192 data += align_offset;
1193 memcpy(data, input, template[i].len);
1194
1195 crypto_skcipher_clear_flags(tfm, ~0);
1196 if (template[i].wk)
1084
1085 ret = crypto_cipher_setkey(tfm, template[i].key,
1086 template[i].klen);
1087 if (template[i].fail == !ret) {
1088 printk(KERN_ERR "alg: cipher: setkey failed "
1089 "on test %d for %s: flags=%x\n", j,
1090 algo, crypto_cipher_get_flags(tfm));
1091 goto out;

--- 99 unchanged lines hidden (view full) ---

1191 goto out;
1192
1193 data = xbuf[0];
1194 data += align_offset;
1195 memcpy(data, input, template[i].len);
1196
1197 crypto_skcipher_clear_flags(tfm, ~0);
1198 if (template[i].wk)
1197 crypto_skcipher_set_flags(tfm,
1198 CRYPTO_TFM_REQ_WEAK_KEY);
1199 crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
1199
1200 ret = crypto_skcipher_setkey(tfm, template[i].key,
1201 template[i].klen);
1202 if (template[i].fail == !ret) {
1203 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n",
1204 d, j, algo, crypto_skcipher_get_flags(tfm));
1205 goto out;
1206 } else if (ret)

--- 53 unchanged lines hidden (view full) ---

1260 else
1261 memset(iv, 0, MAX_IVLEN);
1262
1263 input = enc ? template[i].ptext : template[i].ctext;
1264 result = enc ? template[i].ctext : template[i].ptext;
1265 j++;
1266 crypto_skcipher_clear_flags(tfm, ~0);
1267 if (template[i].wk)
1200
1201 ret = crypto_skcipher_setkey(tfm, template[i].key,
1202 template[i].klen);
1203 if (template[i].fail == !ret) {
1204 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n",
1205 d, j, algo, crypto_skcipher_get_flags(tfm));
1206 goto out;
1207 } else if (ret)

--- 53 unchanged lines hidden (view full) ---

1261 else
1262 memset(iv, 0, MAX_IVLEN);
1263
1264 input = enc ? template[i].ptext : template[i].ctext;
1265 result = enc ? template[i].ctext : template[i].ptext;
1266 j++;
1267 crypto_skcipher_clear_flags(tfm, ~0);
1268 if (template[i].wk)
1268 crypto_skcipher_set_flags(tfm,
1269 CRYPTO_TFM_REQ_WEAK_KEY);
1269 crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
1270
1271 ret = crypto_skcipher_setkey(tfm, template[i].key,
1272 template[i].klen);
1273 if (template[i].fail == !ret) {
1274 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n",
1275 d, j, algo, crypto_skcipher_get_flags(tfm));
1276 goto out;
1277 } else if (ret)

--- 2496 unchanged lines hidden ---
1270
1271 ret = crypto_skcipher_setkey(tfm, template[i].key,
1272 template[i].klen);
1273 if (template[i].fail == !ret) {
1274 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n",
1275 d, j, algo, crypto_skcipher_get_flags(tfm));
1276 goto out;
1277 } else if (ret)

--- 2496 unchanged lines hidden ---