1da7f033dSHerbert Xu /* 2da7f033dSHerbert Xu * Algorithm testing framework and tests. 3da7f033dSHerbert Xu * 4da7f033dSHerbert Xu * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 5da7f033dSHerbert Xu * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 6da7f033dSHerbert Xu * Copyright (c) 2007 Nokia Siemens Networks 7da7f033dSHerbert Xu * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au> 8da7f033dSHerbert Xu * 969435b94SAdrian Hoban * Updated RFC4106 AES-GCM testing. 1069435b94SAdrian Hoban * Authors: Aidan O'Mahony (aidan.o.mahony@intel.com) 1169435b94SAdrian Hoban * Adrian Hoban <adrian.hoban@intel.com> 1269435b94SAdrian Hoban * Gabriele Paoloni <gabriele.paoloni@intel.com> 1369435b94SAdrian Hoban * Tadeusz Struk (tadeusz.struk@intel.com) 1469435b94SAdrian Hoban * Copyright (c) 2010, Intel Corporation. 1569435b94SAdrian Hoban * 16da7f033dSHerbert Xu * This program is free software; you can redistribute it and/or modify it 17da7f033dSHerbert Xu * under the terms of the GNU General Public License as published by the Free 18da7f033dSHerbert Xu * Software Foundation; either version 2 of the License, or (at your option) 19da7f033dSHerbert Xu * any later version. 20da7f033dSHerbert Xu * 21da7f033dSHerbert Xu */ 22da7f033dSHerbert Xu 231ce33115SHerbert Xu #include <crypto/aead.h> 24da7f033dSHerbert Xu #include <crypto/hash.h> 2512773d93SHerbert Xu #include <crypto/skcipher.h> 26da7f033dSHerbert Xu #include <linux/err.h> 271c41b882SHerbert Xu #include <linux/fips.h> 28da7f033dSHerbert Xu #include <linux/module.h> 29da7f033dSHerbert Xu #include <linux/scatterlist.h> 30da7f033dSHerbert Xu #include <linux/slab.h> 31da7f033dSHerbert Xu #include <linux/string.h> 327647d6ceSJarod Wilson #include <crypto/rng.h> 3364d1cdfbSStephan Mueller #include <crypto/drbg.h> 34946cc463STadeusz Struk #include <crypto/akcipher.h> 35da7f033dSHerbert Xu 36da7f033dSHerbert Xu #include "internal.h" 370b767f96SAlexander Shishkin 38326a6346SHerbert Xu #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS 390b767f96SAlexander Shishkin 400b767f96SAlexander Shishkin /* a perfect nop */ 410b767f96SAlexander Shishkin int alg_test(const char *driver, const char *alg, u32 type, u32 mask) 420b767f96SAlexander Shishkin { 430b767f96SAlexander Shishkin return 0; 440b767f96SAlexander Shishkin } 450b767f96SAlexander Shishkin 460b767f96SAlexander Shishkin #else 470b767f96SAlexander Shishkin 48da7f033dSHerbert Xu #include "testmgr.h" 49da7f033dSHerbert Xu 50da7f033dSHerbert Xu /* 51da7f033dSHerbert Xu * Need slab memory for testing (size in number of pages). 52da7f033dSHerbert Xu */ 53da7f033dSHerbert Xu #define XBUFSIZE 8 54da7f033dSHerbert Xu 55da7f033dSHerbert Xu /* 56da7f033dSHerbert Xu * Indexes into the xbuf to simulate cross-page access. 57da7f033dSHerbert Xu */ 58da7f033dSHerbert Xu #define IDX1 32 59da7f033dSHerbert Xu #define IDX2 32400 60da7f033dSHerbert Xu #define IDX3 1 61da7f033dSHerbert Xu #define IDX4 8193 62da7f033dSHerbert Xu #define IDX5 22222 63da7f033dSHerbert Xu #define IDX6 17101 64da7f033dSHerbert Xu #define IDX7 27333 65da7f033dSHerbert Xu #define IDX8 3000 66da7f033dSHerbert Xu 67da7f033dSHerbert Xu /* 68da7f033dSHerbert Xu * Used by test_cipher() 69da7f033dSHerbert Xu */ 70da7f033dSHerbert Xu #define ENCRYPT 1 71da7f033dSHerbert Xu #define DECRYPT 0 72da7f033dSHerbert Xu 73da7f033dSHerbert Xu struct tcrypt_result { 74da7f033dSHerbert Xu struct completion completion; 75da7f033dSHerbert Xu int err; 76da7f033dSHerbert Xu }; 77da7f033dSHerbert Xu 78da7f033dSHerbert Xu struct aead_test_suite { 79da7f033dSHerbert Xu struct { 80da7f033dSHerbert Xu struct aead_testvec *vecs; 81da7f033dSHerbert Xu unsigned int count; 82da7f033dSHerbert Xu } enc, dec; 83da7f033dSHerbert Xu }; 84da7f033dSHerbert Xu 85da7f033dSHerbert Xu struct cipher_test_suite { 86da7f033dSHerbert Xu struct { 87da7f033dSHerbert Xu struct cipher_testvec *vecs; 88da7f033dSHerbert Xu unsigned int count; 89da7f033dSHerbert Xu } enc, dec; 90da7f033dSHerbert Xu }; 91da7f033dSHerbert Xu 92da7f033dSHerbert Xu struct comp_test_suite { 93da7f033dSHerbert Xu struct { 94da7f033dSHerbert Xu struct comp_testvec *vecs; 95da7f033dSHerbert Xu unsigned int count; 96da7f033dSHerbert Xu } comp, decomp; 97da7f033dSHerbert Xu }; 98da7f033dSHerbert Xu 99da7f033dSHerbert Xu struct hash_test_suite { 100da7f033dSHerbert Xu struct hash_testvec *vecs; 101da7f033dSHerbert Xu unsigned int count; 102da7f033dSHerbert Xu }; 103da7f033dSHerbert Xu 1047647d6ceSJarod Wilson struct cprng_test_suite { 1057647d6ceSJarod Wilson struct cprng_testvec *vecs; 1067647d6ceSJarod Wilson unsigned int count; 1077647d6ceSJarod Wilson }; 1087647d6ceSJarod Wilson 10964d1cdfbSStephan Mueller struct drbg_test_suite { 11064d1cdfbSStephan Mueller struct drbg_testvec *vecs; 11164d1cdfbSStephan Mueller unsigned int count; 11264d1cdfbSStephan Mueller }; 11364d1cdfbSStephan Mueller 114946cc463STadeusz Struk struct akcipher_test_suite { 115946cc463STadeusz Struk struct akcipher_testvec *vecs; 116946cc463STadeusz Struk unsigned int count; 117946cc463STadeusz Struk }; 118946cc463STadeusz Struk 119da7f033dSHerbert Xu struct alg_test_desc { 120da7f033dSHerbert Xu const char *alg; 121da7f033dSHerbert Xu int (*test)(const struct alg_test_desc *desc, const char *driver, 122da7f033dSHerbert Xu u32 type, u32 mask); 123a1915d51SJarod Wilson int fips_allowed; /* set if alg is allowed in fips mode */ 124da7f033dSHerbert Xu 125da7f033dSHerbert Xu union { 126da7f033dSHerbert Xu struct aead_test_suite aead; 127da7f033dSHerbert Xu struct cipher_test_suite cipher; 128da7f033dSHerbert Xu struct comp_test_suite comp; 129da7f033dSHerbert Xu struct hash_test_suite hash; 1307647d6ceSJarod Wilson struct cprng_test_suite cprng; 13164d1cdfbSStephan Mueller struct drbg_test_suite drbg; 132946cc463STadeusz Struk struct akcipher_test_suite akcipher; 133da7f033dSHerbert Xu } suite; 134da7f033dSHerbert Xu }; 135da7f033dSHerbert Xu 136da7f033dSHerbert Xu static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 }; 137da7f033dSHerbert Xu 138da7f033dSHerbert Xu static void hexdump(unsigned char *buf, unsigned int len) 139da7f033dSHerbert Xu { 140da7f033dSHerbert Xu print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET, 141da7f033dSHerbert Xu 16, 1, 142da7f033dSHerbert Xu buf, len, false); 143da7f033dSHerbert Xu } 144da7f033dSHerbert Xu 145da7f033dSHerbert Xu static void tcrypt_complete(struct crypto_async_request *req, int err) 146da7f033dSHerbert Xu { 147da7f033dSHerbert Xu struct tcrypt_result *res = req->data; 148da7f033dSHerbert Xu 149da7f033dSHerbert Xu if (err == -EINPROGRESS) 150da7f033dSHerbert Xu return; 151da7f033dSHerbert Xu 152da7f033dSHerbert Xu res->err = err; 153da7f033dSHerbert Xu complete(&res->completion); 154da7f033dSHerbert Xu } 155da7f033dSHerbert Xu 156f8b0d4d0SHerbert Xu static int testmgr_alloc_buf(char *buf[XBUFSIZE]) 157f8b0d4d0SHerbert Xu { 158f8b0d4d0SHerbert Xu int i; 159f8b0d4d0SHerbert Xu 160f8b0d4d0SHerbert Xu for (i = 0; i < XBUFSIZE; i++) { 161f8b0d4d0SHerbert Xu buf[i] = (void *)__get_free_page(GFP_KERNEL); 162f8b0d4d0SHerbert Xu if (!buf[i]) 163f8b0d4d0SHerbert Xu goto err_free_buf; 164f8b0d4d0SHerbert Xu } 165f8b0d4d0SHerbert Xu 166f8b0d4d0SHerbert Xu return 0; 167f8b0d4d0SHerbert Xu 168f8b0d4d0SHerbert Xu err_free_buf: 169f8b0d4d0SHerbert Xu while (i-- > 0) 170f8b0d4d0SHerbert Xu free_page((unsigned long)buf[i]); 171f8b0d4d0SHerbert Xu 172f8b0d4d0SHerbert Xu return -ENOMEM; 173f8b0d4d0SHerbert Xu } 174f8b0d4d0SHerbert Xu 175f8b0d4d0SHerbert Xu static void testmgr_free_buf(char *buf[XBUFSIZE]) 176f8b0d4d0SHerbert Xu { 177f8b0d4d0SHerbert Xu int i; 178f8b0d4d0SHerbert Xu 179f8b0d4d0SHerbert Xu for (i = 0; i < XBUFSIZE; i++) 180f8b0d4d0SHerbert Xu free_page((unsigned long)buf[i]); 181f8b0d4d0SHerbert Xu } 182f8b0d4d0SHerbert Xu 183d4c85f9bSCristian Stoica static int wait_async_op(struct tcrypt_result *tr, int ret) 184a8f1a052SDavid S. Miller { 185a8f1a052SDavid S. Miller if (ret == -EINPROGRESS || ret == -EBUSY) { 1868a45ac12SRabin Vincent wait_for_completion(&tr->completion); 18716735d02SWolfram Sang reinit_completion(&tr->completion); 1888a45ac12SRabin Vincent ret = tr->err; 189a8f1a052SDavid S. Miller } 190a8f1a052SDavid S. Miller return ret; 191a8f1a052SDavid S. Miller } 192a8f1a052SDavid S. Miller 193018ba95cSWang, Rui Y static int ahash_partial_update(struct ahash_request **preq, 194018ba95cSWang, Rui Y struct crypto_ahash *tfm, struct hash_testvec *template, 195018ba95cSWang, Rui Y void *hash_buff, int k, int temp, struct scatterlist *sg, 196018ba95cSWang, Rui Y const char *algo, char *result, struct tcrypt_result *tresult) 197018ba95cSWang, Rui Y { 198018ba95cSWang, Rui Y char *state; 199018ba95cSWang, Rui Y struct ahash_request *req; 200018ba95cSWang, Rui Y int statesize, ret = -EINVAL; 201018ba95cSWang, Rui Y 202018ba95cSWang, Rui Y req = *preq; 203018ba95cSWang, Rui Y statesize = crypto_ahash_statesize( 204018ba95cSWang, Rui Y crypto_ahash_reqtfm(req)); 205018ba95cSWang, Rui Y state = kmalloc(statesize, GFP_KERNEL); 206018ba95cSWang, Rui Y if (!state) { 207018ba95cSWang, Rui Y pr_err("alt: hash: Failed to alloc state for %s\n", algo); 208018ba95cSWang, Rui Y goto out_nostate; 209018ba95cSWang, Rui Y } 210018ba95cSWang, Rui Y ret = crypto_ahash_export(req, state); 211018ba95cSWang, Rui Y if (ret) { 212018ba95cSWang, Rui Y pr_err("alt: hash: Failed to export() for %s\n", algo); 213018ba95cSWang, Rui Y goto out; 214018ba95cSWang, Rui Y } 215018ba95cSWang, Rui Y ahash_request_free(req); 216018ba95cSWang, Rui Y req = ahash_request_alloc(tfm, GFP_KERNEL); 217018ba95cSWang, Rui Y if (!req) { 218018ba95cSWang, Rui Y pr_err("alg: hash: Failed to alloc request for %s\n", algo); 219018ba95cSWang, Rui Y goto out_noreq; 220018ba95cSWang, Rui Y } 221018ba95cSWang, Rui Y ahash_request_set_callback(req, 222018ba95cSWang, Rui Y CRYPTO_TFM_REQ_MAY_BACKLOG, 223018ba95cSWang, Rui Y tcrypt_complete, tresult); 224018ba95cSWang, Rui Y 225018ba95cSWang, Rui Y memcpy(hash_buff, template->plaintext + temp, 226018ba95cSWang, Rui Y template->tap[k]); 227018ba95cSWang, Rui Y sg_init_one(&sg[0], hash_buff, template->tap[k]); 228018ba95cSWang, Rui Y ahash_request_set_crypt(req, sg, result, template->tap[k]); 229018ba95cSWang, Rui Y ret = crypto_ahash_import(req, state); 230018ba95cSWang, Rui Y if (ret) { 231018ba95cSWang, Rui Y pr_err("alg: hash: Failed to import() for %s\n", algo); 232018ba95cSWang, Rui Y goto out; 233018ba95cSWang, Rui Y } 234018ba95cSWang, Rui Y ret = wait_async_op(tresult, crypto_ahash_update(req)); 235018ba95cSWang, Rui Y if (ret) 236018ba95cSWang, Rui Y goto out; 237018ba95cSWang, Rui Y *preq = req; 238018ba95cSWang, Rui Y ret = 0; 239018ba95cSWang, Rui Y goto out_noreq; 240018ba95cSWang, Rui Y out: 241018ba95cSWang, Rui Y ahash_request_free(req); 242018ba95cSWang, Rui Y out_noreq: 243018ba95cSWang, Rui Y kfree(state); 244018ba95cSWang, Rui Y out_nostate: 245018ba95cSWang, Rui Y return ret; 246018ba95cSWang, Rui Y } 247018ba95cSWang, Rui Y 248da5ffe11SJussi Kivilinna static int __test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, 249da5ffe11SJussi Kivilinna unsigned int tcount, bool use_digest, 250da5ffe11SJussi Kivilinna const int align_offset) 251da7f033dSHerbert Xu { 252da7f033dSHerbert Xu const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm)); 253da7f033dSHerbert Xu unsigned int i, j, k, temp; 254da7f033dSHerbert Xu struct scatterlist sg[8]; 25529b77e5dSHoria Geanta char *result; 25629b77e5dSHoria Geanta char *key; 257da7f033dSHerbert Xu struct ahash_request *req; 258da7f033dSHerbert Xu struct tcrypt_result tresult; 259da7f033dSHerbert Xu void *hash_buff; 260f8b0d4d0SHerbert Xu char *xbuf[XBUFSIZE]; 261f8b0d4d0SHerbert Xu int ret = -ENOMEM; 262f8b0d4d0SHerbert Xu 26329b77e5dSHoria Geanta result = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL); 26429b77e5dSHoria Geanta if (!result) 26529b77e5dSHoria Geanta return ret; 26629b77e5dSHoria Geanta key = kmalloc(MAX_KEYLEN, GFP_KERNEL); 26729b77e5dSHoria Geanta if (!key) 26829b77e5dSHoria Geanta goto out_nobuf; 269f8b0d4d0SHerbert Xu if (testmgr_alloc_buf(xbuf)) 270f8b0d4d0SHerbert Xu goto out_nobuf; 271da7f033dSHerbert Xu 272da7f033dSHerbert Xu init_completion(&tresult.completion); 273da7f033dSHerbert Xu 274da7f033dSHerbert Xu req = ahash_request_alloc(tfm, GFP_KERNEL); 275da7f033dSHerbert Xu if (!req) { 276da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: Failed to allocate request for " 277da7f033dSHerbert Xu "%s\n", algo); 278da7f033dSHerbert Xu goto out_noreq; 279da7f033dSHerbert Xu } 280da7f033dSHerbert Xu ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG, 281da7f033dSHerbert Xu tcrypt_complete, &tresult); 282da7f033dSHerbert Xu 283a0cfae59SHerbert Xu j = 0; 284da7f033dSHerbert Xu for (i = 0; i < tcount; i++) { 285a0cfae59SHerbert Xu if (template[i].np) 286a0cfae59SHerbert Xu continue; 287a0cfae59SHerbert Xu 288da5ffe11SJussi Kivilinna ret = -EINVAL; 289da5ffe11SJussi Kivilinna if (WARN_ON(align_offset + template[i].psize > PAGE_SIZE)) 290da5ffe11SJussi Kivilinna goto out; 291da5ffe11SJussi Kivilinna 292a0cfae59SHerbert Xu j++; 29329b77e5dSHoria Geanta memset(result, 0, MAX_DIGEST_SIZE); 294da7f033dSHerbert Xu 295da7f033dSHerbert Xu hash_buff = xbuf[0]; 296da5ffe11SJussi Kivilinna hash_buff += align_offset; 297da7f033dSHerbert Xu 298da7f033dSHerbert Xu memcpy(hash_buff, template[i].plaintext, template[i].psize); 299da7f033dSHerbert Xu sg_init_one(&sg[0], hash_buff, template[i].psize); 300da7f033dSHerbert Xu 301da7f033dSHerbert Xu if (template[i].ksize) { 302da7f033dSHerbert Xu crypto_ahash_clear_flags(tfm, ~0); 30329b77e5dSHoria Geanta if (template[i].ksize > MAX_KEYLEN) { 30429b77e5dSHoria Geanta pr_err("alg: hash: setkey failed on test %d for %s: key size %d > %d\n", 30529b77e5dSHoria Geanta j, algo, template[i].ksize, MAX_KEYLEN); 30629b77e5dSHoria Geanta ret = -EINVAL; 30729b77e5dSHoria Geanta goto out; 30829b77e5dSHoria Geanta } 30929b77e5dSHoria Geanta memcpy(key, template[i].key, template[i].ksize); 31029b77e5dSHoria Geanta ret = crypto_ahash_setkey(tfm, key, template[i].ksize); 311da7f033dSHerbert Xu if (ret) { 312da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: setkey failed on " 313a0cfae59SHerbert Xu "test %d for %s: ret=%d\n", j, algo, 314da7f033dSHerbert Xu -ret); 315da7f033dSHerbert Xu goto out; 316da7f033dSHerbert Xu } 317da7f033dSHerbert Xu } 318da7f033dSHerbert Xu 319da7f033dSHerbert Xu ahash_request_set_crypt(req, sg, result, template[i].psize); 320a8f1a052SDavid S. Miller if (use_digest) { 321d4c85f9bSCristian Stoica ret = wait_async_op(&tresult, crypto_ahash_digest(req)); 322a8f1a052SDavid S. Miller if (ret) { 323a8f1a052SDavid S. Miller pr_err("alg: hash: digest failed on test %d " 324a0cfae59SHerbert Xu "for %s: ret=%d\n", j, algo, -ret); 325da7f033dSHerbert Xu goto out; 326da7f033dSHerbert Xu } 327a8f1a052SDavid S. Miller } else { 328d4c85f9bSCristian Stoica ret = wait_async_op(&tresult, crypto_ahash_init(req)); 329a8f1a052SDavid S. Miller if (ret) { 330a8f1a052SDavid S. Miller pr_err("alt: hash: init failed on test %d " 331a8f1a052SDavid S. Miller "for %s: ret=%d\n", j, algo, -ret); 332a8f1a052SDavid S. Miller goto out; 333a8f1a052SDavid S. Miller } 334d4c85f9bSCristian Stoica ret = wait_async_op(&tresult, crypto_ahash_update(req)); 335a8f1a052SDavid S. Miller if (ret) { 336a8f1a052SDavid S. Miller pr_err("alt: hash: update failed on test %d " 337a8f1a052SDavid S. Miller "for %s: ret=%d\n", j, algo, -ret); 338a8f1a052SDavid S. Miller goto out; 339a8f1a052SDavid S. Miller } 340d4c85f9bSCristian Stoica ret = wait_async_op(&tresult, crypto_ahash_final(req)); 341a8f1a052SDavid S. Miller if (ret) { 342a8f1a052SDavid S. Miller pr_err("alt: hash: final failed on test %d " 343a8f1a052SDavid S. Miller "for %s: ret=%d\n", j, algo, -ret); 344a8f1a052SDavid S. Miller goto out; 345a8f1a052SDavid S. Miller } 346a8f1a052SDavid S. Miller } 347da7f033dSHerbert Xu 348da7f033dSHerbert Xu if (memcmp(result, template[i].digest, 349da7f033dSHerbert Xu crypto_ahash_digestsize(tfm))) { 350da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: Test %d failed for %s\n", 351a0cfae59SHerbert Xu j, algo); 352da7f033dSHerbert Xu hexdump(result, crypto_ahash_digestsize(tfm)); 353da7f033dSHerbert Xu ret = -EINVAL; 354da7f033dSHerbert Xu goto out; 355da7f033dSHerbert Xu } 356da7f033dSHerbert Xu } 357da7f033dSHerbert Xu 358da7f033dSHerbert Xu j = 0; 359da7f033dSHerbert Xu for (i = 0; i < tcount; i++) { 360da5ffe11SJussi Kivilinna /* alignment tests are only done with continuous buffers */ 361da5ffe11SJussi Kivilinna if (align_offset != 0) 362da5ffe11SJussi Kivilinna break; 363da5ffe11SJussi Kivilinna 3645f2b424eSCristian Stoica if (!template[i].np) 3655f2b424eSCristian Stoica continue; 3665f2b424eSCristian Stoica 367da7f033dSHerbert Xu j++; 36829b77e5dSHoria Geanta memset(result, 0, MAX_DIGEST_SIZE); 369da7f033dSHerbert Xu 370da7f033dSHerbert Xu temp = 0; 371da7f033dSHerbert Xu sg_init_table(sg, template[i].np); 372fd57f22aSHerbert Xu ret = -EINVAL; 373da7f033dSHerbert Xu for (k = 0; k < template[i].np; k++) { 374fd57f22aSHerbert Xu if (WARN_ON(offset_in_page(IDX[k]) + 375fd57f22aSHerbert Xu template[i].tap[k] > PAGE_SIZE)) 376fd57f22aSHerbert Xu goto out; 377da7f033dSHerbert Xu sg_set_buf(&sg[k], 378da7f033dSHerbert Xu memcpy(xbuf[IDX[k] >> PAGE_SHIFT] + 379da7f033dSHerbert Xu offset_in_page(IDX[k]), 380da7f033dSHerbert Xu template[i].plaintext + temp, 381da7f033dSHerbert Xu template[i].tap[k]), 382da7f033dSHerbert Xu template[i].tap[k]); 383da7f033dSHerbert Xu temp += template[i].tap[k]; 384da7f033dSHerbert Xu } 385da7f033dSHerbert Xu 386da7f033dSHerbert Xu if (template[i].ksize) { 38729b77e5dSHoria Geanta if (template[i].ksize > MAX_KEYLEN) { 38829b77e5dSHoria Geanta pr_err("alg: hash: setkey failed on test %d for %s: key size %d > %d\n", 3895f2b424eSCristian Stoica j, algo, template[i].ksize, MAX_KEYLEN); 39029b77e5dSHoria Geanta ret = -EINVAL; 39129b77e5dSHoria Geanta goto out; 39229b77e5dSHoria Geanta } 393da7f033dSHerbert Xu crypto_ahash_clear_flags(tfm, ~0); 39429b77e5dSHoria Geanta memcpy(key, template[i].key, template[i].ksize); 3955f2b424eSCristian Stoica ret = crypto_ahash_setkey(tfm, key, template[i].ksize); 396da7f033dSHerbert Xu 397da7f033dSHerbert Xu if (ret) { 398da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: setkey " 399da7f033dSHerbert Xu "failed on chunking test %d " 4005f2b424eSCristian Stoica "for %s: ret=%d\n", j, algo, -ret); 401da7f033dSHerbert Xu goto out; 402da7f033dSHerbert Xu } 403da7f033dSHerbert Xu } 404da7f033dSHerbert Xu 4055f2b424eSCristian Stoica ahash_request_set_crypt(req, sg, result, template[i].psize); 406da7f033dSHerbert Xu ret = crypto_ahash_digest(req); 407da7f033dSHerbert Xu switch (ret) { 408da7f033dSHerbert Xu case 0: 409da7f033dSHerbert Xu break; 410da7f033dSHerbert Xu case -EINPROGRESS: 411da7f033dSHerbert Xu case -EBUSY: 4128a45ac12SRabin Vincent wait_for_completion(&tresult.completion); 41316735d02SWolfram Sang reinit_completion(&tresult.completion); 4148a45ac12SRabin Vincent ret = tresult.err; 4158a45ac12SRabin Vincent if (!ret) 416da7f033dSHerbert Xu break; 417da7f033dSHerbert Xu /* fall through */ 418da7f033dSHerbert Xu default: 419da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: digest failed " 420da7f033dSHerbert Xu "on chunking test %d for %s: " 421da7f033dSHerbert Xu "ret=%d\n", j, algo, -ret); 422da7f033dSHerbert Xu goto out; 423da7f033dSHerbert Xu } 424da7f033dSHerbert Xu 425da7f033dSHerbert Xu if (memcmp(result, template[i].digest, 426da7f033dSHerbert Xu crypto_ahash_digestsize(tfm))) { 427da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: Chunking test %d " 428da7f033dSHerbert Xu "failed for %s\n", j, algo); 429da7f033dSHerbert Xu hexdump(result, crypto_ahash_digestsize(tfm)); 430da7f033dSHerbert Xu ret = -EINVAL; 431da7f033dSHerbert Xu goto out; 432da7f033dSHerbert Xu } 433da7f033dSHerbert Xu } 434da7f033dSHerbert Xu 435018ba95cSWang, Rui Y /* partial update exercise */ 436018ba95cSWang, Rui Y j = 0; 437018ba95cSWang, Rui Y for (i = 0; i < tcount; i++) { 438018ba95cSWang, Rui Y /* alignment tests are only done with continuous buffers */ 439018ba95cSWang, Rui Y if (align_offset != 0) 440018ba95cSWang, Rui Y break; 441018ba95cSWang, Rui Y 442018ba95cSWang, Rui Y if (template[i].np < 2) 443018ba95cSWang, Rui Y continue; 444018ba95cSWang, Rui Y 445018ba95cSWang, Rui Y j++; 446018ba95cSWang, Rui Y memset(result, 0, MAX_DIGEST_SIZE); 447018ba95cSWang, Rui Y 448018ba95cSWang, Rui Y ret = -EINVAL; 449018ba95cSWang, Rui Y hash_buff = xbuf[0]; 450018ba95cSWang, Rui Y memcpy(hash_buff, template[i].plaintext, 451018ba95cSWang, Rui Y template[i].tap[0]); 452018ba95cSWang, Rui Y sg_init_one(&sg[0], hash_buff, template[i].tap[0]); 453018ba95cSWang, Rui Y 454018ba95cSWang, Rui Y if (template[i].ksize) { 455018ba95cSWang, Rui Y crypto_ahash_clear_flags(tfm, ~0); 456018ba95cSWang, Rui Y if (template[i].ksize > MAX_KEYLEN) { 457018ba95cSWang, Rui Y pr_err("alg: hash: setkey failed on test %d for %s: key size %d > %d\n", 458018ba95cSWang, Rui Y j, algo, template[i].ksize, MAX_KEYLEN); 459018ba95cSWang, Rui Y ret = -EINVAL; 460018ba95cSWang, Rui Y goto out; 461018ba95cSWang, Rui Y } 462018ba95cSWang, Rui Y memcpy(key, template[i].key, template[i].ksize); 463018ba95cSWang, Rui Y ret = crypto_ahash_setkey(tfm, key, template[i].ksize); 464018ba95cSWang, Rui Y if (ret) { 465018ba95cSWang, Rui Y pr_err("alg: hash: setkey failed on test %d for %s: ret=%d\n", 466018ba95cSWang, Rui Y j, algo, -ret); 467018ba95cSWang, Rui Y goto out; 468018ba95cSWang, Rui Y } 469018ba95cSWang, Rui Y } 470018ba95cSWang, Rui Y 471018ba95cSWang, Rui Y ahash_request_set_crypt(req, sg, result, template[i].tap[0]); 472018ba95cSWang, Rui Y ret = wait_async_op(&tresult, crypto_ahash_init(req)); 473018ba95cSWang, Rui Y if (ret) { 474018ba95cSWang, Rui Y pr_err("alt: hash: init failed on test %d for %s: ret=%d\n", 475018ba95cSWang, Rui Y j, algo, -ret); 476018ba95cSWang, Rui Y goto out; 477018ba95cSWang, Rui Y } 478018ba95cSWang, Rui Y ret = wait_async_op(&tresult, crypto_ahash_update(req)); 479018ba95cSWang, Rui Y if (ret) { 480018ba95cSWang, Rui Y pr_err("alt: hash: update failed on test %d for %s: ret=%d\n", 481018ba95cSWang, Rui Y j, algo, -ret); 482018ba95cSWang, Rui Y goto out; 483018ba95cSWang, Rui Y } 484018ba95cSWang, Rui Y 485018ba95cSWang, Rui Y temp = template[i].tap[0]; 486018ba95cSWang, Rui Y for (k = 1; k < template[i].np; k++) { 487018ba95cSWang, Rui Y ret = ahash_partial_update(&req, tfm, &template[i], 488018ba95cSWang, Rui Y hash_buff, k, temp, &sg[0], algo, result, 489018ba95cSWang, Rui Y &tresult); 490018ba95cSWang, Rui Y if (ret) { 491018ba95cSWang, Rui Y pr_err("hash: partial update failed on test %d for %s: ret=%d\n", 492018ba95cSWang, Rui Y j, algo, -ret); 493018ba95cSWang, Rui Y goto out_noreq; 494018ba95cSWang, Rui Y } 495018ba95cSWang, Rui Y temp += template[i].tap[k]; 496018ba95cSWang, Rui Y } 497018ba95cSWang, Rui Y ret = wait_async_op(&tresult, crypto_ahash_final(req)); 498018ba95cSWang, Rui Y if (ret) { 499018ba95cSWang, Rui Y pr_err("alt: hash: final failed on test %d for %s: ret=%d\n", 500018ba95cSWang, Rui Y j, algo, -ret); 501018ba95cSWang, Rui Y goto out; 502018ba95cSWang, Rui Y } 503018ba95cSWang, Rui Y if (memcmp(result, template[i].digest, 504018ba95cSWang, Rui Y crypto_ahash_digestsize(tfm))) { 505018ba95cSWang, Rui Y pr_err("alg: hash: Partial Test %d failed for %s\n", 506018ba95cSWang, Rui Y j, algo); 507018ba95cSWang, Rui Y hexdump(result, crypto_ahash_digestsize(tfm)); 508018ba95cSWang, Rui Y ret = -EINVAL; 509018ba95cSWang, Rui Y goto out; 510018ba95cSWang, Rui Y } 511018ba95cSWang, Rui Y } 512018ba95cSWang, Rui Y 513da7f033dSHerbert Xu ret = 0; 514da7f033dSHerbert Xu 515da7f033dSHerbert Xu out: 516da7f033dSHerbert Xu ahash_request_free(req); 517da7f033dSHerbert Xu out_noreq: 518f8b0d4d0SHerbert Xu testmgr_free_buf(xbuf); 519f8b0d4d0SHerbert Xu out_nobuf: 52029b77e5dSHoria Geanta kfree(key); 52129b77e5dSHoria Geanta kfree(result); 522da7f033dSHerbert Xu return ret; 523da7f033dSHerbert Xu } 524da7f033dSHerbert Xu 525da5ffe11SJussi Kivilinna static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, 526da5ffe11SJussi Kivilinna unsigned int tcount, bool use_digest) 527da5ffe11SJussi Kivilinna { 528da5ffe11SJussi Kivilinna unsigned int alignmask; 529da5ffe11SJussi Kivilinna int ret; 530da5ffe11SJussi Kivilinna 531da5ffe11SJussi Kivilinna ret = __test_hash(tfm, template, tcount, use_digest, 0); 532da5ffe11SJussi Kivilinna if (ret) 533da5ffe11SJussi Kivilinna return ret; 534da5ffe11SJussi Kivilinna 535da5ffe11SJussi Kivilinna /* test unaligned buffers, check with one byte offset */ 536da5ffe11SJussi Kivilinna ret = __test_hash(tfm, template, tcount, use_digest, 1); 537da5ffe11SJussi Kivilinna if (ret) 538da5ffe11SJussi Kivilinna return ret; 539da5ffe11SJussi Kivilinna 540da5ffe11SJussi Kivilinna alignmask = crypto_tfm_alg_alignmask(&tfm->base); 541da5ffe11SJussi Kivilinna if (alignmask) { 542da5ffe11SJussi Kivilinna /* Check if alignment mask for tfm is correctly set. */ 543da5ffe11SJussi Kivilinna ret = __test_hash(tfm, template, tcount, use_digest, 544da5ffe11SJussi Kivilinna alignmask + 1); 545da5ffe11SJussi Kivilinna if (ret) 546da5ffe11SJussi Kivilinna return ret; 547da5ffe11SJussi Kivilinna } 548da5ffe11SJussi Kivilinna 549da5ffe11SJussi Kivilinna return 0; 550da5ffe11SJussi Kivilinna } 551da5ffe11SJussi Kivilinna 552d8a32ac2SJussi Kivilinna static int __test_aead(struct crypto_aead *tfm, int enc, 553d8a32ac2SJussi Kivilinna struct aead_testvec *template, unsigned int tcount, 55458dcf548SJussi Kivilinna const bool diff_dst, const int align_offset) 555da7f033dSHerbert Xu { 556da7f033dSHerbert Xu const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)); 557da7f033dSHerbert Xu unsigned int i, j, k, n, temp; 558f8b0d4d0SHerbert Xu int ret = -ENOMEM; 559da7f033dSHerbert Xu char *q; 560da7f033dSHerbert Xu char *key; 561da7f033dSHerbert Xu struct aead_request *req; 562d8a32ac2SJussi Kivilinna struct scatterlist *sg; 563d8a32ac2SJussi Kivilinna struct scatterlist *sgout; 564d8a32ac2SJussi Kivilinna const char *e, *d; 565da7f033dSHerbert Xu struct tcrypt_result result; 566424a5da6SCristian Stoica unsigned int authsize, iv_len; 567da7f033dSHerbert Xu void *input; 568d8a32ac2SJussi Kivilinna void *output; 569da7f033dSHerbert Xu void *assoc; 5709bac019dSTadeusz Struk char *iv; 571f8b0d4d0SHerbert Xu char *xbuf[XBUFSIZE]; 572d8a32ac2SJussi Kivilinna char *xoutbuf[XBUFSIZE]; 573f8b0d4d0SHerbert Xu char *axbuf[XBUFSIZE]; 574f8b0d4d0SHerbert Xu 5759bac019dSTadeusz Struk iv = kzalloc(MAX_IVLEN, GFP_KERNEL); 5769bac019dSTadeusz Struk if (!iv) 5779bac019dSTadeusz Struk return ret; 57829b77e5dSHoria Geanta key = kmalloc(MAX_KEYLEN, GFP_KERNEL); 57929b77e5dSHoria Geanta if (!key) 58029b77e5dSHoria Geanta goto out_noxbuf; 581f8b0d4d0SHerbert Xu if (testmgr_alloc_buf(xbuf)) 582f8b0d4d0SHerbert Xu goto out_noxbuf; 583f8b0d4d0SHerbert Xu if (testmgr_alloc_buf(axbuf)) 584f8b0d4d0SHerbert Xu goto out_noaxbuf; 585d8a32ac2SJussi Kivilinna if (diff_dst && testmgr_alloc_buf(xoutbuf)) 586d8a32ac2SJussi Kivilinna goto out_nooutbuf; 587d8a32ac2SJussi Kivilinna 588d8a32ac2SJussi Kivilinna /* avoid "the frame size is larger than 1024 bytes" compiler warning */ 5898a525fcdSHerbert Xu sg = kmalloc(sizeof(*sg) * 8 * (diff_dst ? 4 : 2), GFP_KERNEL); 590d8a32ac2SJussi Kivilinna if (!sg) 591d8a32ac2SJussi Kivilinna goto out_nosg; 5928a525fcdSHerbert Xu sgout = &sg[16]; 593d8a32ac2SJussi Kivilinna 594d8a32ac2SJussi Kivilinna if (diff_dst) 595d8a32ac2SJussi Kivilinna d = "-ddst"; 596d8a32ac2SJussi Kivilinna else 597d8a32ac2SJussi Kivilinna d = ""; 598d8a32ac2SJussi Kivilinna 599da7f033dSHerbert Xu if (enc == ENCRYPT) 600da7f033dSHerbert Xu e = "encryption"; 601da7f033dSHerbert Xu else 602da7f033dSHerbert Xu e = "decryption"; 603da7f033dSHerbert Xu 604da7f033dSHerbert Xu init_completion(&result.completion); 605da7f033dSHerbert Xu 606da7f033dSHerbert Xu req = aead_request_alloc(tfm, GFP_KERNEL); 607da7f033dSHerbert Xu if (!req) { 608d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Failed to allocate request for %s\n", 609d8a32ac2SJussi Kivilinna d, algo); 610da7f033dSHerbert Xu goto out; 611da7f033dSHerbert Xu } 612da7f033dSHerbert Xu 613da7f033dSHerbert Xu aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG, 614da7f033dSHerbert Xu tcrypt_complete, &result); 615da7f033dSHerbert Xu 616abfa7f43SJerome Marchand iv_len = crypto_aead_ivsize(tfm); 617abfa7f43SJerome Marchand 618da7f033dSHerbert Xu for (i = 0, j = 0; i < tcount; i++) { 61905b1d338SCristian Stoica if (template[i].np) 62005b1d338SCristian Stoica continue; 62105b1d338SCristian Stoica 622da7f033dSHerbert Xu j++; 623da7f033dSHerbert Xu 62458dcf548SJussi Kivilinna /* some templates have no input data but they will 625da7f033dSHerbert Xu * touch input 626da7f033dSHerbert Xu */ 627da7f033dSHerbert Xu input = xbuf[0]; 62858dcf548SJussi Kivilinna input += align_offset; 629da7f033dSHerbert Xu assoc = axbuf[0]; 630da7f033dSHerbert Xu 631fd57f22aSHerbert Xu ret = -EINVAL; 63258dcf548SJussi Kivilinna if (WARN_ON(align_offset + template[i].ilen > 63358dcf548SJussi Kivilinna PAGE_SIZE || template[i].alen > PAGE_SIZE)) 634fd57f22aSHerbert Xu goto out; 635fd57f22aSHerbert Xu 636da7f033dSHerbert Xu memcpy(input, template[i].input, template[i].ilen); 637da7f033dSHerbert Xu memcpy(assoc, template[i].assoc, template[i].alen); 638da7f033dSHerbert Xu if (template[i].iv) 639424a5da6SCristian Stoica memcpy(iv, template[i].iv, iv_len); 640da7f033dSHerbert Xu else 641424a5da6SCristian Stoica memset(iv, 0, iv_len); 642da7f033dSHerbert Xu 643da7f033dSHerbert Xu crypto_aead_clear_flags(tfm, ~0); 644da7f033dSHerbert Xu if (template[i].wk) 64505b1d338SCristian Stoica crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); 646da7f033dSHerbert Xu 64729b77e5dSHoria Geanta if (template[i].klen > MAX_KEYLEN) { 64829b77e5dSHoria Geanta pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 64929b77e5dSHoria Geanta d, j, algo, template[i].klen, 65029b77e5dSHoria Geanta MAX_KEYLEN); 65129b77e5dSHoria Geanta ret = -EINVAL; 65229b77e5dSHoria Geanta goto out; 65329b77e5dSHoria Geanta } 65429b77e5dSHoria Geanta memcpy(key, template[i].key, template[i].klen); 655da7f033dSHerbert Xu 65605b1d338SCristian Stoica ret = crypto_aead_setkey(tfm, key, template[i].klen); 657da7f033dSHerbert Xu if (!ret == template[i].fail) { 658d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: setkey failed on test %d for %s: flags=%x\n", 659d8a32ac2SJussi Kivilinna d, j, algo, crypto_aead_get_flags(tfm)); 660da7f033dSHerbert Xu goto out; 661da7f033dSHerbert Xu } else if (ret) 662da7f033dSHerbert Xu continue; 663da7f033dSHerbert Xu 664da7f033dSHerbert Xu authsize = abs(template[i].rlen - template[i].ilen); 665da7f033dSHerbert Xu ret = crypto_aead_setauthsize(tfm, authsize); 666da7f033dSHerbert Xu if (ret) { 667d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Failed to set authsize to %u on test %d for %s\n", 668d8a32ac2SJussi Kivilinna d, authsize, j, algo); 669da7f033dSHerbert Xu goto out; 670da7f033dSHerbert Xu } 671da7f033dSHerbert Xu 6728a525fcdSHerbert Xu k = !!template[i].alen; 6738a525fcdSHerbert Xu sg_init_table(sg, k + 1); 6748a525fcdSHerbert Xu sg_set_buf(&sg[0], assoc, template[i].alen); 6758a525fcdSHerbert Xu sg_set_buf(&sg[k], input, 67605b1d338SCristian Stoica template[i].ilen + (enc ? authsize : 0)); 677d8a32ac2SJussi Kivilinna output = input; 678d8a32ac2SJussi Kivilinna 6798a525fcdSHerbert Xu if (diff_dst) { 6808a525fcdSHerbert Xu sg_init_table(sgout, k + 1); 6818a525fcdSHerbert Xu sg_set_buf(&sgout[0], assoc, template[i].alen); 6828a525fcdSHerbert Xu 6838a525fcdSHerbert Xu output = xoutbuf[0]; 6848a525fcdSHerbert Xu output += align_offset; 6858a525fcdSHerbert Xu sg_set_buf(&sgout[k], output, 6868a525fcdSHerbert Xu template[i].rlen + (enc ? 0 : authsize)); 6878a525fcdSHerbert Xu } 688da7f033dSHerbert Xu 689d8a32ac2SJussi Kivilinna aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg, 690da7f033dSHerbert Xu template[i].ilen, iv); 691da7f033dSHerbert Xu 6928a525fcdSHerbert Xu aead_request_set_ad(req, template[i].alen); 693da7f033dSHerbert Xu 69405b1d338SCristian Stoica ret = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req); 695da7f033dSHerbert Xu 696da7f033dSHerbert Xu switch (ret) { 697da7f033dSHerbert Xu case 0: 698e44a1b44SJarod Wilson if (template[i].novrfy) { 699e44a1b44SJarod Wilson /* verification was supposed to fail */ 700d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: %s failed on test %d for %s: ret was 0, expected -EBADMSG\n", 701d8a32ac2SJussi Kivilinna d, e, j, algo); 702e44a1b44SJarod Wilson /* so really, we got a bad message */ 703e44a1b44SJarod Wilson ret = -EBADMSG; 704e44a1b44SJarod Wilson goto out; 705e44a1b44SJarod Wilson } 706da7f033dSHerbert Xu break; 707da7f033dSHerbert Xu case -EINPROGRESS: 708da7f033dSHerbert Xu case -EBUSY: 7098a45ac12SRabin Vincent wait_for_completion(&result.completion); 71016735d02SWolfram Sang reinit_completion(&result.completion); 7118a45ac12SRabin Vincent ret = result.err; 7128a45ac12SRabin Vincent if (!ret) 713da7f033dSHerbert Xu break; 714e44a1b44SJarod Wilson case -EBADMSG: 715e44a1b44SJarod Wilson if (template[i].novrfy) 716e44a1b44SJarod Wilson /* verification failure was expected */ 717e44a1b44SJarod Wilson continue; 718da7f033dSHerbert Xu /* fall through */ 719da7f033dSHerbert Xu default: 720d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: %s failed on test %d for %s: ret=%d\n", 721d8a32ac2SJussi Kivilinna d, e, j, algo, -ret); 722da7f033dSHerbert Xu goto out; 723da7f033dSHerbert Xu } 724da7f033dSHerbert Xu 725d8a32ac2SJussi Kivilinna q = output; 726da7f033dSHerbert Xu if (memcmp(q, template[i].result, template[i].rlen)) { 727d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Test %d failed on %s for %s\n", 728d8a32ac2SJussi Kivilinna d, j, e, algo); 729da7f033dSHerbert Xu hexdump(q, template[i].rlen); 730da7f033dSHerbert Xu ret = -EINVAL; 731da7f033dSHerbert Xu goto out; 732da7f033dSHerbert Xu } 733da7f033dSHerbert Xu } 734da7f033dSHerbert Xu 735da7f033dSHerbert Xu for (i = 0, j = 0; i < tcount; i++) { 73658dcf548SJussi Kivilinna /* alignment tests are only done with continuous buffers */ 73758dcf548SJussi Kivilinna if (align_offset != 0) 73858dcf548SJussi Kivilinna break; 73958dcf548SJussi Kivilinna 74005b1d338SCristian Stoica if (!template[i].np) 74105b1d338SCristian Stoica continue; 74205b1d338SCristian Stoica 743da7f033dSHerbert Xu j++; 744da7f033dSHerbert Xu 745da7f033dSHerbert Xu if (template[i].iv) 746abfa7f43SJerome Marchand memcpy(iv, template[i].iv, iv_len); 747da7f033dSHerbert Xu else 748da7f033dSHerbert Xu memset(iv, 0, MAX_IVLEN); 749da7f033dSHerbert Xu 750da7f033dSHerbert Xu crypto_aead_clear_flags(tfm, ~0); 751da7f033dSHerbert Xu if (template[i].wk) 75205b1d338SCristian Stoica crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); 75329b77e5dSHoria Geanta if (template[i].klen > MAX_KEYLEN) { 75429b77e5dSHoria Geanta pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n", 75505b1d338SCristian Stoica d, j, algo, template[i].klen, MAX_KEYLEN); 75629b77e5dSHoria Geanta ret = -EINVAL; 75729b77e5dSHoria Geanta goto out; 75829b77e5dSHoria Geanta } 75929b77e5dSHoria Geanta memcpy(key, template[i].key, template[i].klen); 760da7f033dSHerbert Xu 761da7f033dSHerbert Xu ret = crypto_aead_setkey(tfm, key, template[i].klen); 762da7f033dSHerbert Xu if (!ret == template[i].fail) { 763d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: setkey failed on chunk test %d for %s: flags=%x\n", 764d8a32ac2SJussi Kivilinna d, j, algo, crypto_aead_get_flags(tfm)); 765da7f033dSHerbert Xu goto out; 766da7f033dSHerbert Xu } else if (ret) 767da7f033dSHerbert Xu continue; 768da7f033dSHerbert Xu 769da7f033dSHerbert Xu authsize = abs(template[i].rlen - template[i].ilen); 770da7f033dSHerbert Xu 771da7f033dSHerbert Xu ret = -EINVAL; 7728a525fcdSHerbert Xu sg_init_table(sg, template[i].anp + template[i].np); 773d8a32ac2SJussi Kivilinna if (diff_dst) 7748a525fcdSHerbert Xu sg_init_table(sgout, template[i].anp + template[i].np); 7758a525fcdSHerbert Xu 7768a525fcdSHerbert Xu ret = -EINVAL; 7778a525fcdSHerbert Xu for (k = 0, temp = 0; k < template[i].anp; k++) { 7788a525fcdSHerbert Xu if (WARN_ON(offset_in_page(IDX[k]) + 7798a525fcdSHerbert Xu template[i].atap[k] > PAGE_SIZE)) 7808a525fcdSHerbert Xu goto out; 7818a525fcdSHerbert Xu sg_set_buf(&sg[k], 7828a525fcdSHerbert Xu memcpy(axbuf[IDX[k] >> PAGE_SHIFT] + 7838a525fcdSHerbert Xu offset_in_page(IDX[k]), 7848a525fcdSHerbert Xu template[i].assoc + temp, 7858a525fcdSHerbert Xu template[i].atap[k]), 7868a525fcdSHerbert Xu template[i].atap[k]); 7878a525fcdSHerbert Xu if (diff_dst) 7888a525fcdSHerbert Xu sg_set_buf(&sgout[k], 7898a525fcdSHerbert Xu axbuf[IDX[k] >> PAGE_SHIFT] + 7908a525fcdSHerbert Xu offset_in_page(IDX[k]), 7918a525fcdSHerbert Xu template[i].atap[k]); 7928a525fcdSHerbert Xu temp += template[i].atap[k]; 7938a525fcdSHerbert Xu } 7948a525fcdSHerbert Xu 795da7f033dSHerbert Xu for (k = 0, temp = 0; k < template[i].np; k++) { 796da7f033dSHerbert Xu if (WARN_ON(offset_in_page(IDX[k]) + 797da7f033dSHerbert Xu template[i].tap[k] > PAGE_SIZE)) 798da7f033dSHerbert Xu goto out; 799da7f033dSHerbert Xu 80005b1d338SCristian Stoica q = xbuf[IDX[k] >> PAGE_SHIFT] + offset_in_page(IDX[k]); 80105b1d338SCristian Stoica memcpy(q, template[i].input + temp, template[i].tap[k]); 8028a525fcdSHerbert Xu sg_set_buf(&sg[template[i].anp + k], 8038a525fcdSHerbert Xu q, template[i].tap[k]); 804d8a32ac2SJussi Kivilinna 805d8a32ac2SJussi Kivilinna if (diff_dst) { 806d8a32ac2SJussi Kivilinna q = xoutbuf[IDX[k] >> PAGE_SHIFT] + 807d8a32ac2SJussi Kivilinna offset_in_page(IDX[k]); 808d8a32ac2SJussi Kivilinna 809d8a32ac2SJussi Kivilinna memset(q, 0, template[i].tap[k]); 810d8a32ac2SJussi Kivilinna 8118a525fcdSHerbert Xu sg_set_buf(&sgout[template[i].anp + k], 8128a525fcdSHerbert Xu q, template[i].tap[k]); 813d8a32ac2SJussi Kivilinna } 814d8a32ac2SJussi Kivilinna 8158ec25c51SHoria Geanta n = template[i].tap[k]; 8168ec25c51SHoria Geanta if (k == template[i].np - 1 && enc) 8178ec25c51SHoria Geanta n += authsize; 8188ec25c51SHoria Geanta if (offset_in_page(q) + n < PAGE_SIZE) 8198ec25c51SHoria Geanta q[n] = 0; 8208ec25c51SHoria Geanta 821da7f033dSHerbert Xu temp += template[i].tap[k]; 822da7f033dSHerbert Xu } 823da7f033dSHerbert Xu 824da7f033dSHerbert Xu ret = crypto_aead_setauthsize(tfm, authsize); 825da7f033dSHerbert Xu if (ret) { 826d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Failed to set authsize to %u on chunk test %d for %s\n", 827d8a32ac2SJussi Kivilinna d, authsize, j, algo); 828da7f033dSHerbert Xu goto out; 829da7f033dSHerbert Xu } 830da7f033dSHerbert Xu 831da7f033dSHerbert Xu if (enc) { 8328a525fcdSHerbert Xu if (WARN_ON(sg[template[i].anp + k - 1].offset + 8338a525fcdSHerbert Xu sg[template[i].anp + k - 1].length + 8348a525fcdSHerbert Xu authsize > PAGE_SIZE)) { 835da7f033dSHerbert Xu ret = -EINVAL; 836da7f033dSHerbert Xu goto out; 837da7f033dSHerbert Xu } 838da7f033dSHerbert Xu 839d8a32ac2SJussi Kivilinna if (diff_dst) 8408a525fcdSHerbert Xu sgout[template[i].anp + k - 1].length += 8418a525fcdSHerbert Xu authsize; 8428a525fcdSHerbert Xu sg[template[i].anp + k - 1].length += authsize; 843da7f033dSHerbert Xu } 844da7f033dSHerbert Xu 845d8a32ac2SJussi Kivilinna aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg, 846da7f033dSHerbert Xu template[i].ilen, 847da7f033dSHerbert Xu iv); 848da7f033dSHerbert Xu 8498a525fcdSHerbert Xu aead_request_set_ad(req, template[i].alen); 850da7f033dSHerbert Xu 85105b1d338SCristian Stoica ret = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req); 852da7f033dSHerbert Xu 853da7f033dSHerbert Xu switch (ret) { 854da7f033dSHerbert Xu case 0: 855e44a1b44SJarod Wilson if (template[i].novrfy) { 856e44a1b44SJarod Wilson /* verification was supposed to fail */ 857d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret was 0, expected -EBADMSG\n", 858d8a32ac2SJussi Kivilinna d, e, j, algo); 859e44a1b44SJarod Wilson /* so really, we got a bad message */ 860e44a1b44SJarod Wilson ret = -EBADMSG; 861e44a1b44SJarod Wilson goto out; 862e44a1b44SJarod Wilson } 863da7f033dSHerbert Xu break; 864da7f033dSHerbert Xu case -EINPROGRESS: 865da7f033dSHerbert Xu case -EBUSY: 8668a45ac12SRabin Vincent wait_for_completion(&result.completion); 86716735d02SWolfram Sang reinit_completion(&result.completion); 8688a45ac12SRabin Vincent ret = result.err; 8698a45ac12SRabin Vincent if (!ret) 870da7f033dSHerbert Xu break; 871e44a1b44SJarod Wilson case -EBADMSG: 872e44a1b44SJarod Wilson if (template[i].novrfy) 873e44a1b44SJarod Wilson /* verification failure was expected */ 874e44a1b44SJarod Wilson continue; 875da7f033dSHerbert Xu /* fall through */ 876da7f033dSHerbert Xu default: 877d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret=%d\n", 878d8a32ac2SJussi Kivilinna d, e, j, algo, -ret); 879da7f033dSHerbert Xu goto out; 880da7f033dSHerbert Xu } 881da7f033dSHerbert Xu 882da7f033dSHerbert Xu ret = -EINVAL; 883da7f033dSHerbert Xu for (k = 0, temp = 0; k < template[i].np; k++) { 884d8a32ac2SJussi Kivilinna if (diff_dst) 885d8a32ac2SJussi Kivilinna q = xoutbuf[IDX[k] >> PAGE_SHIFT] + 886d8a32ac2SJussi Kivilinna offset_in_page(IDX[k]); 887d8a32ac2SJussi Kivilinna else 888da7f033dSHerbert Xu q = xbuf[IDX[k] >> PAGE_SHIFT] + 889da7f033dSHerbert Xu offset_in_page(IDX[k]); 890da7f033dSHerbert Xu 891da7f033dSHerbert Xu n = template[i].tap[k]; 892da7f033dSHerbert Xu if (k == template[i].np - 1) 893da7f033dSHerbert Xu n += enc ? authsize : -authsize; 894da7f033dSHerbert Xu 895da7f033dSHerbert Xu if (memcmp(q, template[i].result + temp, n)) { 896d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Chunk test %d failed on %s at page %u for %s\n", 897d8a32ac2SJussi Kivilinna d, j, e, k, algo); 898da7f033dSHerbert Xu hexdump(q, n); 899da7f033dSHerbert Xu goto out; 900da7f033dSHerbert Xu } 901da7f033dSHerbert Xu 902da7f033dSHerbert Xu q += n; 903da7f033dSHerbert Xu if (k == template[i].np - 1 && !enc) { 904d8a32ac2SJussi Kivilinna if (!diff_dst && 905d8a32ac2SJussi Kivilinna memcmp(q, template[i].input + 906da7f033dSHerbert Xu temp + n, authsize)) 907da7f033dSHerbert Xu n = authsize; 908da7f033dSHerbert Xu else 909da7f033dSHerbert Xu n = 0; 910da7f033dSHerbert Xu } else { 91105b1d338SCristian Stoica for (n = 0; offset_in_page(q + n) && q[n]; n++) 912da7f033dSHerbert Xu ; 913da7f033dSHerbert Xu } 914da7f033dSHerbert Xu if (n) { 915d8a32ac2SJussi Kivilinna pr_err("alg: aead%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n", 916d8a32ac2SJussi Kivilinna d, j, e, k, algo, n); 917da7f033dSHerbert Xu hexdump(q, n); 918da7f033dSHerbert Xu goto out; 919da7f033dSHerbert Xu } 920da7f033dSHerbert Xu 921da7f033dSHerbert Xu temp += template[i].tap[k]; 922da7f033dSHerbert Xu } 923da7f033dSHerbert Xu } 924da7f033dSHerbert Xu 925da7f033dSHerbert Xu ret = 0; 926da7f033dSHerbert Xu 927da7f033dSHerbert Xu out: 928da7f033dSHerbert Xu aead_request_free(req); 929d8a32ac2SJussi Kivilinna kfree(sg); 930d8a32ac2SJussi Kivilinna out_nosg: 931d8a32ac2SJussi Kivilinna if (diff_dst) 932d8a32ac2SJussi Kivilinna testmgr_free_buf(xoutbuf); 933d8a32ac2SJussi Kivilinna out_nooutbuf: 934f8b0d4d0SHerbert Xu testmgr_free_buf(axbuf); 935f8b0d4d0SHerbert Xu out_noaxbuf: 936f8b0d4d0SHerbert Xu testmgr_free_buf(xbuf); 937f8b0d4d0SHerbert Xu out_noxbuf: 93829b77e5dSHoria Geanta kfree(key); 9399bac019dSTadeusz Struk kfree(iv); 940da7f033dSHerbert Xu return ret; 941da7f033dSHerbert Xu } 942da7f033dSHerbert Xu 943d8a32ac2SJussi Kivilinna static int test_aead(struct crypto_aead *tfm, int enc, 944d8a32ac2SJussi Kivilinna struct aead_testvec *template, unsigned int tcount) 945d8a32ac2SJussi Kivilinna { 94658dcf548SJussi Kivilinna unsigned int alignmask; 947d8a32ac2SJussi Kivilinna int ret; 948d8a32ac2SJussi Kivilinna 949d8a32ac2SJussi Kivilinna /* test 'dst == src' case */ 95058dcf548SJussi Kivilinna ret = __test_aead(tfm, enc, template, tcount, false, 0); 951d8a32ac2SJussi Kivilinna if (ret) 952d8a32ac2SJussi Kivilinna return ret; 953d8a32ac2SJussi Kivilinna 954d8a32ac2SJussi Kivilinna /* test 'dst != src' case */ 95558dcf548SJussi Kivilinna ret = __test_aead(tfm, enc, template, tcount, true, 0); 95658dcf548SJussi Kivilinna if (ret) 95758dcf548SJussi Kivilinna return ret; 95858dcf548SJussi Kivilinna 95958dcf548SJussi Kivilinna /* test unaligned buffers, check with one byte offset */ 96058dcf548SJussi Kivilinna ret = __test_aead(tfm, enc, template, tcount, true, 1); 96158dcf548SJussi Kivilinna if (ret) 96258dcf548SJussi Kivilinna return ret; 96358dcf548SJussi Kivilinna 96458dcf548SJussi Kivilinna alignmask = crypto_tfm_alg_alignmask(&tfm->base); 96558dcf548SJussi Kivilinna if (alignmask) { 96658dcf548SJussi Kivilinna /* Check if alignment mask for tfm is correctly set. */ 96758dcf548SJussi Kivilinna ret = __test_aead(tfm, enc, template, tcount, true, 96858dcf548SJussi Kivilinna alignmask + 1); 96958dcf548SJussi Kivilinna if (ret) 97058dcf548SJussi Kivilinna return ret; 97158dcf548SJussi Kivilinna } 97258dcf548SJussi Kivilinna 97358dcf548SJussi Kivilinna return 0; 974d8a32ac2SJussi Kivilinna } 975d8a32ac2SJussi Kivilinna 9761aa4ecd9SHerbert Xu static int test_cipher(struct crypto_cipher *tfm, int enc, 9771aa4ecd9SHerbert Xu struct cipher_testvec *template, unsigned int tcount) 9781aa4ecd9SHerbert Xu { 9791aa4ecd9SHerbert Xu const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm)); 9801aa4ecd9SHerbert Xu unsigned int i, j, k; 9811aa4ecd9SHerbert Xu char *q; 9821aa4ecd9SHerbert Xu const char *e; 9831aa4ecd9SHerbert Xu void *data; 984f8b0d4d0SHerbert Xu char *xbuf[XBUFSIZE]; 985f8b0d4d0SHerbert Xu int ret = -ENOMEM; 986f8b0d4d0SHerbert Xu 987f8b0d4d0SHerbert Xu if (testmgr_alloc_buf(xbuf)) 988f8b0d4d0SHerbert Xu goto out_nobuf; 9891aa4ecd9SHerbert Xu 9901aa4ecd9SHerbert Xu if (enc == ENCRYPT) 9911aa4ecd9SHerbert Xu e = "encryption"; 9921aa4ecd9SHerbert Xu else 9931aa4ecd9SHerbert Xu e = "decryption"; 9941aa4ecd9SHerbert Xu 9951aa4ecd9SHerbert Xu j = 0; 9961aa4ecd9SHerbert Xu for (i = 0; i < tcount; i++) { 9971aa4ecd9SHerbert Xu if (template[i].np) 9981aa4ecd9SHerbert Xu continue; 9991aa4ecd9SHerbert Xu 10001aa4ecd9SHerbert Xu j++; 10011aa4ecd9SHerbert Xu 1002fd57f22aSHerbert Xu ret = -EINVAL; 1003fd57f22aSHerbert Xu if (WARN_ON(template[i].ilen > PAGE_SIZE)) 1004fd57f22aSHerbert Xu goto out; 1005fd57f22aSHerbert Xu 10061aa4ecd9SHerbert Xu data = xbuf[0]; 10071aa4ecd9SHerbert Xu memcpy(data, template[i].input, template[i].ilen); 10081aa4ecd9SHerbert Xu 10091aa4ecd9SHerbert Xu crypto_cipher_clear_flags(tfm, ~0); 10101aa4ecd9SHerbert Xu if (template[i].wk) 10111aa4ecd9SHerbert Xu crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY); 10121aa4ecd9SHerbert Xu 10131aa4ecd9SHerbert Xu ret = crypto_cipher_setkey(tfm, template[i].key, 10141aa4ecd9SHerbert Xu template[i].klen); 10151aa4ecd9SHerbert Xu if (!ret == template[i].fail) { 10161aa4ecd9SHerbert Xu printk(KERN_ERR "alg: cipher: setkey failed " 10171aa4ecd9SHerbert Xu "on test %d for %s: flags=%x\n", j, 10181aa4ecd9SHerbert Xu algo, crypto_cipher_get_flags(tfm)); 10191aa4ecd9SHerbert Xu goto out; 10201aa4ecd9SHerbert Xu } else if (ret) 10211aa4ecd9SHerbert Xu continue; 10221aa4ecd9SHerbert Xu 10231aa4ecd9SHerbert Xu for (k = 0; k < template[i].ilen; 10241aa4ecd9SHerbert Xu k += crypto_cipher_blocksize(tfm)) { 10251aa4ecd9SHerbert Xu if (enc) 10261aa4ecd9SHerbert Xu crypto_cipher_encrypt_one(tfm, data + k, 10271aa4ecd9SHerbert Xu data + k); 10281aa4ecd9SHerbert Xu else 10291aa4ecd9SHerbert Xu crypto_cipher_decrypt_one(tfm, data + k, 10301aa4ecd9SHerbert Xu data + k); 10311aa4ecd9SHerbert Xu } 10321aa4ecd9SHerbert Xu 10331aa4ecd9SHerbert Xu q = data; 10341aa4ecd9SHerbert Xu if (memcmp(q, template[i].result, template[i].rlen)) { 10351aa4ecd9SHerbert Xu printk(KERN_ERR "alg: cipher: Test %d failed " 10361aa4ecd9SHerbert Xu "on %s for %s\n", j, e, algo); 10371aa4ecd9SHerbert Xu hexdump(q, template[i].rlen); 10381aa4ecd9SHerbert Xu ret = -EINVAL; 10391aa4ecd9SHerbert Xu goto out; 10401aa4ecd9SHerbert Xu } 10411aa4ecd9SHerbert Xu } 10421aa4ecd9SHerbert Xu 10431aa4ecd9SHerbert Xu ret = 0; 10441aa4ecd9SHerbert Xu 10451aa4ecd9SHerbert Xu out: 1046f8b0d4d0SHerbert Xu testmgr_free_buf(xbuf); 1047f8b0d4d0SHerbert Xu out_nobuf: 10481aa4ecd9SHerbert Xu return ret; 10491aa4ecd9SHerbert Xu } 10501aa4ecd9SHerbert Xu 105112773d93SHerbert Xu static int __test_skcipher(struct crypto_skcipher *tfm, int enc, 105208d6af8cSJussi Kivilinna struct cipher_testvec *template, unsigned int tcount, 10533a338f20SJussi Kivilinna const bool diff_dst, const int align_offset) 1054da7f033dSHerbert Xu { 1055da7f033dSHerbert Xu const char *algo = 105612773d93SHerbert Xu crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)); 1057da7f033dSHerbert Xu unsigned int i, j, k, n, temp; 1058da7f033dSHerbert Xu char *q; 105912773d93SHerbert Xu struct skcipher_request *req; 1060da7f033dSHerbert Xu struct scatterlist sg[8]; 106108d6af8cSJussi Kivilinna struct scatterlist sgout[8]; 106208d6af8cSJussi Kivilinna const char *e, *d; 1063da7f033dSHerbert Xu struct tcrypt_result result; 1064da7f033dSHerbert Xu void *data; 1065da7f033dSHerbert Xu char iv[MAX_IVLEN]; 1066f8b0d4d0SHerbert Xu char *xbuf[XBUFSIZE]; 106708d6af8cSJussi Kivilinna char *xoutbuf[XBUFSIZE]; 1068f8b0d4d0SHerbert Xu int ret = -ENOMEM; 106984cba178SAndrey Ryabinin unsigned int ivsize = crypto_skcipher_ivsize(tfm); 1070f8b0d4d0SHerbert Xu 1071f8b0d4d0SHerbert Xu if (testmgr_alloc_buf(xbuf)) 1072f8b0d4d0SHerbert Xu goto out_nobuf; 1073da7f033dSHerbert Xu 107408d6af8cSJussi Kivilinna if (diff_dst && testmgr_alloc_buf(xoutbuf)) 107508d6af8cSJussi Kivilinna goto out_nooutbuf; 107608d6af8cSJussi Kivilinna 107708d6af8cSJussi Kivilinna if (diff_dst) 107808d6af8cSJussi Kivilinna d = "-ddst"; 107908d6af8cSJussi Kivilinna else 108008d6af8cSJussi Kivilinna d = ""; 108108d6af8cSJussi Kivilinna 1082da7f033dSHerbert Xu if (enc == ENCRYPT) 1083da7f033dSHerbert Xu e = "encryption"; 1084da7f033dSHerbert Xu else 1085da7f033dSHerbert Xu e = "decryption"; 1086da7f033dSHerbert Xu 1087da7f033dSHerbert Xu init_completion(&result.completion); 1088da7f033dSHerbert Xu 108912773d93SHerbert Xu req = skcipher_request_alloc(tfm, GFP_KERNEL); 1090da7f033dSHerbert Xu if (!req) { 109108d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: Failed to allocate request for %s\n", 109208d6af8cSJussi Kivilinna d, algo); 1093da7f033dSHerbert Xu goto out; 1094da7f033dSHerbert Xu } 1095da7f033dSHerbert Xu 109612773d93SHerbert Xu skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG, 1097da7f033dSHerbert Xu tcrypt_complete, &result); 1098da7f033dSHerbert Xu 1099da7f033dSHerbert Xu j = 0; 1100da7f033dSHerbert Xu for (i = 0; i < tcount; i++) { 1101bbb9a7ddSCristian Stoica if (template[i].np && !template[i].also_non_np) 1102bbb9a7ddSCristian Stoica continue; 1103bbb9a7ddSCristian Stoica 1104da7f033dSHerbert Xu if (template[i].iv) 110584cba178SAndrey Ryabinin memcpy(iv, template[i].iv, ivsize); 1106da7f033dSHerbert Xu else 1107da7f033dSHerbert Xu memset(iv, 0, MAX_IVLEN); 1108da7f033dSHerbert Xu 1109da7f033dSHerbert Xu j++; 1110fd57f22aSHerbert Xu ret = -EINVAL; 1111a1aa44a2SCristian Stoica if (WARN_ON(align_offset + template[i].ilen > PAGE_SIZE)) 1112fd57f22aSHerbert Xu goto out; 1113fd57f22aSHerbert Xu 1114da7f033dSHerbert Xu data = xbuf[0]; 11153a338f20SJussi Kivilinna data += align_offset; 1116da7f033dSHerbert Xu memcpy(data, template[i].input, template[i].ilen); 1117da7f033dSHerbert Xu 111812773d93SHerbert Xu crypto_skcipher_clear_flags(tfm, ~0); 1119da7f033dSHerbert Xu if (template[i].wk) 112012773d93SHerbert Xu crypto_skcipher_set_flags(tfm, 112112773d93SHerbert Xu CRYPTO_TFM_REQ_WEAK_KEY); 1122da7f033dSHerbert Xu 112312773d93SHerbert Xu ret = crypto_skcipher_setkey(tfm, template[i].key, 1124da7f033dSHerbert Xu template[i].klen); 1125da7f033dSHerbert Xu if (!ret == template[i].fail) { 112608d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n", 112712773d93SHerbert Xu d, j, algo, crypto_skcipher_get_flags(tfm)); 1128da7f033dSHerbert Xu goto out; 1129da7f033dSHerbert Xu } else if (ret) 1130da7f033dSHerbert Xu continue; 1131da7f033dSHerbert Xu 1132da7f033dSHerbert Xu sg_init_one(&sg[0], data, template[i].ilen); 113308d6af8cSJussi Kivilinna if (diff_dst) { 113408d6af8cSJussi Kivilinna data = xoutbuf[0]; 11353a338f20SJussi Kivilinna data += align_offset; 113608d6af8cSJussi Kivilinna sg_init_one(&sgout[0], data, template[i].ilen); 113708d6af8cSJussi Kivilinna } 1138da7f033dSHerbert Xu 113912773d93SHerbert Xu skcipher_request_set_crypt(req, sg, (diff_dst) ? sgout : sg, 1140da7f033dSHerbert Xu template[i].ilen, iv); 114112773d93SHerbert Xu ret = enc ? crypto_skcipher_encrypt(req) : 114212773d93SHerbert Xu crypto_skcipher_decrypt(req); 1143da7f033dSHerbert Xu 1144da7f033dSHerbert Xu switch (ret) { 1145da7f033dSHerbert Xu case 0: 1146da7f033dSHerbert Xu break; 1147da7f033dSHerbert Xu case -EINPROGRESS: 1148da7f033dSHerbert Xu case -EBUSY: 11498a45ac12SRabin Vincent wait_for_completion(&result.completion); 115016735d02SWolfram Sang reinit_completion(&result.completion); 11518a45ac12SRabin Vincent ret = result.err; 11528a45ac12SRabin Vincent if (!ret) 1153da7f033dSHerbert Xu break; 1154da7f033dSHerbert Xu /* fall through */ 1155da7f033dSHerbert Xu default: 115608d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: %s failed on test %d for %s: ret=%d\n", 115708d6af8cSJussi Kivilinna d, e, j, algo, -ret); 1158da7f033dSHerbert Xu goto out; 1159da7f033dSHerbert Xu } 1160da7f033dSHerbert Xu 1161da7f033dSHerbert Xu q = data; 1162da7f033dSHerbert Xu if (memcmp(q, template[i].result, template[i].rlen)) { 11638a826a34SBoris BREZILLON pr_err("alg: skcipher%s: Test %d failed (invalid result) on %s for %s\n", 116408d6af8cSJussi Kivilinna d, j, e, algo); 1165da7f033dSHerbert Xu hexdump(q, template[i].rlen); 1166da7f033dSHerbert Xu ret = -EINVAL; 1167da7f033dSHerbert Xu goto out; 1168da7f033dSHerbert Xu } 11698a826a34SBoris BREZILLON 11708a826a34SBoris BREZILLON if (template[i].iv_out && 11718a826a34SBoris BREZILLON memcmp(iv, template[i].iv_out, 11728a826a34SBoris BREZILLON crypto_skcipher_ivsize(tfm))) { 11738a826a34SBoris BREZILLON pr_err("alg: skcipher%s: Test %d failed (invalid output IV) on %s for %s\n", 11748a826a34SBoris BREZILLON d, j, e, algo); 11758a826a34SBoris BREZILLON hexdump(iv, crypto_skcipher_ivsize(tfm)); 11768a826a34SBoris BREZILLON ret = -EINVAL; 11778a826a34SBoris BREZILLON goto out; 11788a826a34SBoris BREZILLON } 1179da7f033dSHerbert Xu } 1180da7f033dSHerbert Xu 1181da7f033dSHerbert Xu j = 0; 1182da7f033dSHerbert Xu for (i = 0; i < tcount; i++) { 11833a338f20SJussi Kivilinna /* alignment tests are only done with continuous buffers */ 11843a338f20SJussi Kivilinna if (align_offset != 0) 11853a338f20SJussi Kivilinna break; 1186da7f033dSHerbert Xu 1187bbb9a7ddSCristian Stoica if (!template[i].np) 1188bbb9a7ddSCristian Stoica continue; 1189bbb9a7ddSCristian Stoica 1190da7f033dSHerbert Xu if (template[i].iv) 119184cba178SAndrey Ryabinin memcpy(iv, template[i].iv, ivsize); 1192da7f033dSHerbert Xu else 1193da7f033dSHerbert Xu memset(iv, 0, MAX_IVLEN); 1194da7f033dSHerbert Xu 1195da7f033dSHerbert Xu j++; 119612773d93SHerbert Xu crypto_skcipher_clear_flags(tfm, ~0); 1197da7f033dSHerbert Xu if (template[i].wk) 119812773d93SHerbert Xu crypto_skcipher_set_flags(tfm, 119912773d93SHerbert Xu CRYPTO_TFM_REQ_WEAK_KEY); 1200da7f033dSHerbert Xu 120112773d93SHerbert Xu ret = crypto_skcipher_setkey(tfm, template[i].key, 1202da7f033dSHerbert Xu template[i].klen); 1203da7f033dSHerbert Xu if (!ret == template[i].fail) { 120408d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n", 120512773d93SHerbert Xu d, j, algo, crypto_skcipher_get_flags(tfm)); 1206da7f033dSHerbert Xu goto out; 1207da7f033dSHerbert Xu } else if (ret) 1208da7f033dSHerbert Xu continue; 1209da7f033dSHerbert Xu 1210da7f033dSHerbert Xu temp = 0; 1211da7f033dSHerbert Xu ret = -EINVAL; 1212da7f033dSHerbert Xu sg_init_table(sg, template[i].np); 121308d6af8cSJussi Kivilinna if (diff_dst) 121408d6af8cSJussi Kivilinna sg_init_table(sgout, template[i].np); 1215da7f033dSHerbert Xu for (k = 0; k < template[i].np; k++) { 1216da7f033dSHerbert Xu if (WARN_ON(offset_in_page(IDX[k]) + 1217da7f033dSHerbert Xu template[i].tap[k] > PAGE_SIZE)) 1218da7f033dSHerbert Xu goto out; 1219da7f033dSHerbert Xu 1220a1aa44a2SCristian Stoica q = xbuf[IDX[k] >> PAGE_SHIFT] + offset_in_page(IDX[k]); 1221da7f033dSHerbert Xu 1222a1aa44a2SCristian Stoica memcpy(q, template[i].input + temp, template[i].tap[k]); 1223da7f033dSHerbert Xu 1224a1aa44a2SCristian Stoica if (offset_in_page(q) + template[i].tap[k] < PAGE_SIZE) 1225da7f033dSHerbert Xu q[template[i].tap[k]] = 0; 1226da7f033dSHerbert Xu 1227da7f033dSHerbert Xu sg_set_buf(&sg[k], q, template[i].tap[k]); 122808d6af8cSJussi Kivilinna if (diff_dst) { 122908d6af8cSJussi Kivilinna q = xoutbuf[IDX[k] >> PAGE_SHIFT] + 123008d6af8cSJussi Kivilinna offset_in_page(IDX[k]); 123108d6af8cSJussi Kivilinna 1232a1aa44a2SCristian Stoica sg_set_buf(&sgout[k], q, template[i].tap[k]); 123308d6af8cSJussi Kivilinna 123408d6af8cSJussi Kivilinna memset(q, 0, template[i].tap[k]); 123508d6af8cSJussi Kivilinna if (offset_in_page(q) + 123608d6af8cSJussi Kivilinna template[i].tap[k] < PAGE_SIZE) 123708d6af8cSJussi Kivilinna q[template[i].tap[k]] = 0; 123808d6af8cSJussi Kivilinna } 1239da7f033dSHerbert Xu 1240da7f033dSHerbert Xu temp += template[i].tap[k]; 1241da7f033dSHerbert Xu } 1242da7f033dSHerbert Xu 124312773d93SHerbert Xu skcipher_request_set_crypt(req, sg, (diff_dst) ? sgout : sg, 1244da7f033dSHerbert Xu template[i].ilen, iv); 1245da7f033dSHerbert Xu 124612773d93SHerbert Xu ret = enc ? crypto_skcipher_encrypt(req) : 124712773d93SHerbert Xu crypto_skcipher_decrypt(req); 1248da7f033dSHerbert Xu 1249da7f033dSHerbert Xu switch (ret) { 1250da7f033dSHerbert Xu case 0: 1251da7f033dSHerbert Xu break; 1252da7f033dSHerbert Xu case -EINPROGRESS: 1253da7f033dSHerbert Xu case -EBUSY: 12548a45ac12SRabin Vincent wait_for_completion(&result.completion); 125516735d02SWolfram Sang reinit_completion(&result.completion); 12568a45ac12SRabin Vincent ret = result.err; 12578a45ac12SRabin Vincent if (!ret) 1258da7f033dSHerbert Xu break; 1259da7f033dSHerbert Xu /* fall through */ 1260da7f033dSHerbert Xu default: 126108d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: %s failed on chunk test %d for %s: ret=%d\n", 126208d6af8cSJussi Kivilinna d, e, j, algo, -ret); 1263da7f033dSHerbert Xu goto out; 1264da7f033dSHerbert Xu } 1265da7f033dSHerbert Xu 1266da7f033dSHerbert Xu temp = 0; 1267da7f033dSHerbert Xu ret = -EINVAL; 1268da7f033dSHerbert Xu for (k = 0; k < template[i].np; k++) { 126908d6af8cSJussi Kivilinna if (diff_dst) 127008d6af8cSJussi Kivilinna q = xoutbuf[IDX[k] >> PAGE_SHIFT] + 127108d6af8cSJussi Kivilinna offset_in_page(IDX[k]); 127208d6af8cSJussi Kivilinna else 1273da7f033dSHerbert Xu q = xbuf[IDX[k] >> PAGE_SHIFT] + 1274da7f033dSHerbert Xu offset_in_page(IDX[k]); 1275da7f033dSHerbert Xu 1276da7f033dSHerbert Xu if (memcmp(q, template[i].result + temp, 1277da7f033dSHerbert Xu template[i].tap[k])) { 127808d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: Chunk test %d failed on %s at page %u for %s\n", 127908d6af8cSJussi Kivilinna d, j, e, k, algo); 1280da7f033dSHerbert Xu hexdump(q, template[i].tap[k]); 1281da7f033dSHerbert Xu goto out; 1282da7f033dSHerbert Xu } 1283da7f033dSHerbert Xu 1284da7f033dSHerbert Xu q += template[i].tap[k]; 1285da7f033dSHerbert Xu for (n = 0; offset_in_page(q + n) && q[n]; n++) 1286da7f033dSHerbert Xu ; 1287da7f033dSHerbert Xu if (n) { 128808d6af8cSJussi Kivilinna pr_err("alg: skcipher%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n", 128908d6af8cSJussi Kivilinna d, j, e, k, algo, n); 1290da7f033dSHerbert Xu hexdump(q, n); 1291da7f033dSHerbert Xu goto out; 1292da7f033dSHerbert Xu } 1293da7f033dSHerbert Xu temp += template[i].tap[k]; 1294da7f033dSHerbert Xu } 1295da7f033dSHerbert Xu } 1296da7f033dSHerbert Xu 1297da7f033dSHerbert Xu ret = 0; 1298da7f033dSHerbert Xu 1299da7f033dSHerbert Xu out: 130012773d93SHerbert Xu skcipher_request_free(req); 130108d6af8cSJussi Kivilinna if (diff_dst) 130208d6af8cSJussi Kivilinna testmgr_free_buf(xoutbuf); 130308d6af8cSJussi Kivilinna out_nooutbuf: 1304f8b0d4d0SHerbert Xu testmgr_free_buf(xbuf); 1305f8b0d4d0SHerbert Xu out_nobuf: 1306da7f033dSHerbert Xu return ret; 1307da7f033dSHerbert Xu } 1308da7f033dSHerbert Xu 130912773d93SHerbert Xu static int test_skcipher(struct crypto_skcipher *tfm, int enc, 131008d6af8cSJussi Kivilinna struct cipher_testvec *template, unsigned int tcount) 131108d6af8cSJussi Kivilinna { 13123a338f20SJussi Kivilinna unsigned int alignmask; 131308d6af8cSJussi Kivilinna int ret; 131408d6af8cSJussi Kivilinna 131508d6af8cSJussi Kivilinna /* test 'dst == src' case */ 13163a338f20SJussi Kivilinna ret = __test_skcipher(tfm, enc, template, tcount, false, 0); 131708d6af8cSJussi Kivilinna if (ret) 131808d6af8cSJussi Kivilinna return ret; 131908d6af8cSJussi Kivilinna 132008d6af8cSJussi Kivilinna /* test 'dst != src' case */ 13213a338f20SJussi Kivilinna ret = __test_skcipher(tfm, enc, template, tcount, true, 0); 13223a338f20SJussi Kivilinna if (ret) 13233a338f20SJussi Kivilinna return ret; 13243a338f20SJussi Kivilinna 13253a338f20SJussi Kivilinna /* test unaligned buffers, check with one byte offset */ 13263a338f20SJussi Kivilinna ret = __test_skcipher(tfm, enc, template, tcount, true, 1); 13273a338f20SJussi Kivilinna if (ret) 13283a338f20SJussi Kivilinna return ret; 13293a338f20SJussi Kivilinna 13303a338f20SJussi Kivilinna alignmask = crypto_tfm_alg_alignmask(&tfm->base); 13313a338f20SJussi Kivilinna if (alignmask) { 13323a338f20SJussi Kivilinna /* Check if alignment mask for tfm is correctly set. */ 13333a338f20SJussi Kivilinna ret = __test_skcipher(tfm, enc, template, tcount, true, 13343a338f20SJussi Kivilinna alignmask + 1); 13353a338f20SJussi Kivilinna if (ret) 13363a338f20SJussi Kivilinna return ret; 13373a338f20SJussi Kivilinna } 13383a338f20SJussi Kivilinna 13393a338f20SJussi Kivilinna return 0; 134008d6af8cSJussi Kivilinna } 134108d6af8cSJussi Kivilinna 1342da7f033dSHerbert Xu static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate, 1343da7f033dSHerbert Xu struct comp_testvec *dtemplate, int ctcount, int dtcount) 1344da7f033dSHerbert Xu { 1345da7f033dSHerbert Xu const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm)); 1346da7f033dSHerbert Xu unsigned int i; 1347da7f033dSHerbert Xu char result[COMP_BUF_SIZE]; 1348da7f033dSHerbert Xu int ret; 1349da7f033dSHerbert Xu 1350da7f033dSHerbert Xu for (i = 0; i < ctcount; i++) { 1351c79cf910SGeert Uytterhoeven int ilen; 1352c79cf910SGeert Uytterhoeven unsigned int dlen = COMP_BUF_SIZE; 1353da7f033dSHerbert Xu 1354da7f033dSHerbert Xu memset(result, 0, sizeof (result)); 1355da7f033dSHerbert Xu 1356da7f033dSHerbert Xu ilen = ctemplate[i].inlen; 1357da7f033dSHerbert Xu ret = crypto_comp_compress(tfm, ctemplate[i].input, 1358da7f033dSHerbert Xu ilen, result, &dlen); 1359da7f033dSHerbert Xu if (ret) { 1360da7f033dSHerbert Xu printk(KERN_ERR "alg: comp: compression failed " 1361da7f033dSHerbert Xu "on test %d for %s: ret=%d\n", i + 1, algo, 1362da7f033dSHerbert Xu -ret); 1363da7f033dSHerbert Xu goto out; 1364da7f033dSHerbert Xu } 1365da7f033dSHerbert Xu 1366b812eb00SGeert Uytterhoeven if (dlen != ctemplate[i].outlen) { 1367b812eb00SGeert Uytterhoeven printk(KERN_ERR "alg: comp: Compression test %d " 1368b812eb00SGeert Uytterhoeven "failed for %s: output len = %d\n", i + 1, algo, 1369b812eb00SGeert Uytterhoeven dlen); 1370b812eb00SGeert Uytterhoeven ret = -EINVAL; 1371b812eb00SGeert Uytterhoeven goto out; 1372b812eb00SGeert Uytterhoeven } 1373b812eb00SGeert Uytterhoeven 1374da7f033dSHerbert Xu if (memcmp(result, ctemplate[i].output, dlen)) { 1375da7f033dSHerbert Xu printk(KERN_ERR "alg: comp: Compression test %d " 1376da7f033dSHerbert Xu "failed for %s\n", i + 1, algo); 1377da7f033dSHerbert Xu hexdump(result, dlen); 1378da7f033dSHerbert Xu ret = -EINVAL; 1379da7f033dSHerbert Xu goto out; 1380da7f033dSHerbert Xu } 1381da7f033dSHerbert Xu } 1382da7f033dSHerbert Xu 1383da7f033dSHerbert Xu for (i = 0; i < dtcount; i++) { 1384c79cf910SGeert Uytterhoeven int ilen; 1385c79cf910SGeert Uytterhoeven unsigned int dlen = COMP_BUF_SIZE; 1386da7f033dSHerbert Xu 1387da7f033dSHerbert Xu memset(result, 0, sizeof (result)); 1388da7f033dSHerbert Xu 1389da7f033dSHerbert Xu ilen = dtemplate[i].inlen; 1390da7f033dSHerbert Xu ret = crypto_comp_decompress(tfm, dtemplate[i].input, 1391da7f033dSHerbert Xu ilen, result, &dlen); 1392da7f033dSHerbert Xu if (ret) { 1393da7f033dSHerbert Xu printk(KERN_ERR "alg: comp: decompression failed " 1394da7f033dSHerbert Xu "on test %d for %s: ret=%d\n", i + 1, algo, 1395da7f033dSHerbert Xu -ret); 1396da7f033dSHerbert Xu goto out; 1397da7f033dSHerbert Xu } 1398da7f033dSHerbert Xu 1399b812eb00SGeert Uytterhoeven if (dlen != dtemplate[i].outlen) { 1400b812eb00SGeert Uytterhoeven printk(KERN_ERR "alg: comp: Decompression test %d " 1401b812eb00SGeert Uytterhoeven "failed for %s: output len = %d\n", i + 1, algo, 1402b812eb00SGeert Uytterhoeven dlen); 1403b812eb00SGeert Uytterhoeven ret = -EINVAL; 1404b812eb00SGeert Uytterhoeven goto out; 1405b812eb00SGeert Uytterhoeven } 1406b812eb00SGeert Uytterhoeven 1407da7f033dSHerbert Xu if (memcmp(result, dtemplate[i].output, dlen)) { 1408da7f033dSHerbert Xu printk(KERN_ERR "alg: comp: Decompression test %d " 1409da7f033dSHerbert Xu "failed for %s\n", i + 1, algo); 1410da7f033dSHerbert Xu hexdump(result, dlen); 1411da7f033dSHerbert Xu ret = -EINVAL; 1412da7f033dSHerbert Xu goto out; 1413da7f033dSHerbert Xu } 1414da7f033dSHerbert Xu } 1415da7f033dSHerbert Xu 1416da7f033dSHerbert Xu ret = 0; 1417da7f033dSHerbert Xu 1418da7f033dSHerbert Xu out: 1419da7f033dSHerbert Xu return ret; 1420da7f033dSHerbert Xu } 1421da7f033dSHerbert Xu 14227647d6ceSJarod Wilson static int test_cprng(struct crypto_rng *tfm, struct cprng_testvec *template, 14237647d6ceSJarod Wilson unsigned int tcount) 14247647d6ceSJarod Wilson { 14257647d6ceSJarod Wilson const char *algo = crypto_tfm_alg_driver_name(crypto_rng_tfm(tfm)); 1426fa4ef8a6SFelipe Contreras int err = 0, i, j, seedsize; 14277647d6ceSJarod Wilson u8 *seed; 14287647d6ceSJarod Wilson char result[32]; 14297647d6ceSJarod Wilson 14307647d6ceSJarod Wilson seedsize = crypto_rng_seedsize(tfm); 14317647d6ceSJarod Wilson 14327647d6ceSJarod Wilson seed = kmalloc(seedsize, GFP_KERNEL); 14337647d6ceSJarod Wilson if (!seed) { 14347647d6ceSJarod Wilson printk(KERN_ERR "alg: cprng: Failed to allocate seed space " 14357647d6ceSJarod Wilson "for %s\n", algo); 14367647d6ceSJarod Wilson return -ENOMEM; 14377647d6ceSJarod Wilson } 14387647d6ceSJarod Wilson 14397647d6ceSJarod Wilson for (i = 0; i < tcount; i++) { 14407647d6ceSJarod Wilson memset(result, 0, 32); 14417647d6ceSJarod Wilson 14427647d6ceSJarod Wilson memcpy(seed, template[i].v, template[i].vlen); 14437647d6ceSJarod Wilson memcpy(seed + template[i].vlen, template[i].key, 14447647d6ceSJarod Wilson template[i].klen); 14457647d6ceSJarod Wilson memcpy(seed + template[i].vlen + template[i].klen, 14467647d6ceSJarod Wilson template[i].dt, template[i].dtlen); 14477647d6ceSJarod Wilson 14487647d6ceSJarod Wilson err = crypto_rng_reset(tfm, seed, seedsize); 14497647d6ceSJarod Wilson if (err) { 14507647d6ceSJarod Wilson printk(KERN_ERR "alg: cprng: Failed to reset rng " 14517647d6ceSJarod Wilson "for %s\n", algo); 14527647d6ceSJarod Wilson goto out; 14537647d6ceSJarod Wilson } 14547647d6ceSJarod Wilson 14557647d6ceSJarod Wilson for (j = 0; j < template[i].loops; j++) { 14567647d6ceSJarod Wilson err = crypto_rng_get_bytes(tfm, result, 14577647d6ceSJarod Wilson template[i].rlen); 145819e60e13SStephan Mueller if (err < 0) { 14597647d6ceSJarod Wilson printk(KERN_ERR "alg: cprng: Failed to obtain " 14607647d6ceSJarod Wilson "the correct amount of random data for " 146119e60e13SStephan Mueller "%s (requested %d)\n", algo, 146219e60e13SStephan Mueller template[i].rlen); 14637647d6ceSJarod Wilson goto out; 14647647d6ceSJarod Wilson } 14657647d6ceSJarod Wilson } 14667647d6ceSJarod Wilson 14677647d6ceSJarod Wilson err = memcmp(result, template[i].result, 14687647d6ceSJarod Wilson template[i].rlen); 14697647d6ceSJarod Wilson if (err) { 14707647d6ceSJarod Wilson printk(KERN_ERR "alg: cprng: Test %d failed for %s\n", 14717647d6ceSJarod Wilson i, algo); 14727647d6ceSJarod Wilson hexdump(result, template[i].rlen); 14737647d6ceSJarod Wilson err = -EINVAL; 14747647d6ceSJarod Wilson goto out; 14757647d6ceSJarod Wilson } 14767647d6ceSJarod Wilson } 14777647d6ceSJarod Wilson 14787647d6ceSJarod Wilson out: 14797647d6ceSJarod Wilson kfree(seed); 14807647d6ceSJarod Wilson return err; 14817647d6ceSJarod Wilson } 14827647d6ceSJarod Wilson 1483da7f033dSHerbert Xu static int alg_test_aead(const struct alg_test_desc *desc, const char *driver, 1484da7f033dSHerbert Xu u32 type, u32 mask) 1485da7f033dSHerbert Xu { 1486da7f033dSHerbert Xu struct crypto_aead *tfm; 1487da7f033dSHerbert Xu int err = 0; 1488da7f033dSHerbert Xu 1489425a8829SStephan Mueller tfm = crypto_alloc_aead(driver, type | CRYPTO_ALG_INTERNAL, mask); 1490da7f033dSHerbert Xu if (IS_ERR(tfm)) { 1491da7f033dSHerbert Xu printk(KERN_ERR "alg: aead: Failed to load transform for %s: " 1492da7f033dSHerbert Xu "%ld\n", driver, PTR_ERR(tfm)); 1493da7f033dSHerbert Xu return PTR_ERR(tfm); 1494da7f033dSHerbert Xu } 1495da7f033dSHerbert Xu 1496da7f033dSHerbert Xu if (desc->suite.aead.enc.vecs) { 1497da7f033dSHerbert Xu err = test_aead(tfm, ENCRYPT, desc->suite.aead.enc.vecs, 1498da7f033dSHerbert Xu desc->suite.aead.enc.count); 1499da7f033dSHerbert Xu if (err) 1500da7f033dSHerbert Xu goto out; 1501da7f033dSHerbert Xu } 1502da7f033dSHerbert Xu 1503da7f033dSHerbert Xu if (!err && desc->suite.aead.dec.vecs) 1504da7f033dSHerbert Xu err = test_aead(tfm, DECRYPT, desc->suite.aead.dec.vecs, 1505da7f033dSHerbert Xu desc->suite.aead.dec.count); 1506da7f033dSHerbert Xu 1507da7f033dSHerbert Xu out: 1508da7f033dSHerbert Xu crypto_free_aead(tfm); 1509da7f033dSHerbert Xu return err; 1510da7f033dSHerbert Xu } 1511da7f033dSHerbert Xu 1512da7f033dSHerbert Xu static int alg_test_cipher(const struct alg_test_desc *desc, 1513da7f033dSHerbert Xu const char *driver, u32 type, u32 mask) 1514da7f033dSHerbert Xu { 15151aa4ecd9SHerbert Xu struct crypto_cipher *tfm; 1516da7f033dSHerbert Xu int err = 0; 1517da7f033dSHerbert Xu 1518425a8829SStephan Mueller tfm = crypto_alloc_cipher(driver, type | CRYPTO_ALG_INTERNAL, mask); 1519da7f033dSHerbert Xu if (IS_ERR(tfm)) { 1520da7f033dSHerbert Xu printk(KERN_ERR "alg: cipher: Failed to load transform for " 1521da7f033dSHerbert Xu "%s: %ld\n", driver, PTR_ERR(tfm)); 1522da7f033dSHerbert Xu return PTR_ERR(tfm); 1523da7f033dSHerbert Xu } 1524da7f033dSHerbert Xu 1525da7f033dSHerbert Xu if (desc->suite.cipher.enc.vecs) { 1526da7f033dSHerbert Xu err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, 1527da7f033dSHerbert Xu desc->suite.cipher.enc.count); 1528da7f033dSHerbert Xu if (err) 1529da7f033dSHerbert Xu goto out; 1530da7f033dSHerbert Xu } 1531da7f033dSHerbert Xu 1532da7f033dSHerbert Xu if (desc->suite.cipher.dec.vecs) 1533da7f033dSHerbert Xu err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, 1534da7f033dSHerbert Xu desc->suite.cipher.dec.count); 1535da7f033dSHerbert Xu 1536da7f033dSHerbert Xu out: 15371aa4ecd9SHerbert Xu crypto_free_cipher(tfm); 15381aa4ecd9SHerbert Xu return err; 15391aa4ecd9SHerbert Xu } 15401aa4ecd9SHerbert Xu 15411aa4ecd9SHerbert Xu static int alg_test_skcipher(const struct alg_test_desc *desc, 15421aa4ecd9SHerbert Xu const char *driver, u32 type, u32 mask) 15431aa4ecd9SHerbert Xu { 154412773d93SHerbert Xu struct crypto_skcipher *tfm; 15451aa4ecd9SHerbert Xu int err = 0; 15461aa4ecd9SHerbert Xu 154712773d93SHerbert Xu tfm = crypto_alloc_skcipher(driver, type | CRYPTO_ALG_INTERNAL, mask); 15481aa4ecd9SHerbert Xu if (IS_ERR(tfm)) { 15491aa4ecd9SHerbert Xu printk(KERN_ERR "alg: skcipher: Failed to load transform for " 15501aa4ecd9SHerbert Xu "%s: %ld\n", driver, PTR_ERR(tfm)); 15511aa4ecd9SHerbert Xu return PTR_ERR(tfm); 15521aa4ecd9SHerbert Xu } 15531aa4ecd9SHerbert Xu 15541aa4ecd9SHerbert Xu if (desc->suite.cipher.enc.vecs) { 15551aa4ecd9SHerbert Xu err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, 15561aa4ecd9SHerbert Xu desc->suite.cipher.enc.count); 15571aa4ecd9SHerbert Xu if (err) 15581aa4ecd9SHerbert Xu goto out; 15591aa4ecd9SHerbert Xu } 15601aa4ecd9SHerbert Xu 15611aa4ecd9SHerbert Xu if (desc->suite.cipher.dec.vecs) 15621aa4ecd9SHerbert Xu err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, 15631aa4ecd9SHerbert Xu desc->suite.cipher.dec.count); 15641aa4ecd9SHerbert Xu 15651aa4ecd9SHerbert Xu out: 156612773d93SHerbert Xu crypto_free_skcipher(tfm); 1567da7f033dSHerbert Xu return err; 1568da7f033dSHerbert Xu } 1569da7f033dSHerbert Xu 1570da7f033dSHerbert Xu static int alg_test_comp(const struct alg_test_desc *desc, const char *driver, 1571da7f033dSHerbert Xu u32 type, u32 mask) 1572da7f033dSHerbert Xu { 1573da7f033dSHerbert Xu struct crypto_comp *tfm; 1574da7f033dSHerbert Xu int err; 1575da7f033dSHerbert Xu 1576da7f033dSHerbert Xu tfm = crypto_alloc_comp(driver, type, mask); 1577da7f033dSHerbert Xu if (IS_ERR(tfm)) { 1578da7f033dSHerbert Xu printk(KERN_ERR "alg: comp: Failed to load transform for %s: " 1579da7f033dSHerbert Xu "%ld\n", driver, PTR_ERR(tfm)); 1580da7f033dSHerbert Xu return PTR_ERR(tfm); 1581da7f033dSHerbert Xu } 1582da7f033dSHerbert Xu 1583da7f033dSHerbert Xu err = test_comp(tfm, desc->suite.comp.comp.vecs, 1584da7f033dSHerbert Xu desc->suite.comp.decomp.vecs, 1585da7f033dSHerbert Xu desc->suite.comp.comp.count, 1586da7f033dSHerbert Xu desc->suite.comp.decomp.count); 1587da7f033dSHerbert Xu 1588da7f033dSHerbert Xu crypto_free_comp(tfm); 1589da7f033dSHerbert Xu return err; 1590da7f033dSHerbert Xu } 1591da7f033dSHerbert Xu 1592da7f033dSHerbert Xu static int alg_test_hash(const struct alg_test_desc *desc, const char *driver, 1593da7f033dSHerbert Xu u32 type, u32 mask) 1594da7f033dSHerbert Xu { 1595da7f033dSHerbert Xu struct crypto_ahash *tfm; 1596da7f033dSHerbert Xu int err; 1597da7f033dSHerbert Xu 1598425a8829SStephan Mueller tfm = crypto_alloc_ahash(driver, type | CRYPTO_ALG_INTERNAL, mask); 1599da7f033dSHerbert Xu if (IS_ERR(tfm)) { 1600da7f033dSHerbert Xu printk(KERN_ERR "alg: hash: Failed to load transform for %s: " 1601da7f033dSHerbert Xu "%ld\n", driver, PTR_ERR(tfm)); 1602da7f033dSHerbert Xu return PTR_ERR(tfm); 1603da7f033dSHerbert Xu } 1604da7f033dSHerbert Xu 1605a8f1a052SDavid S. Miller err = test_hash(tfm, desc->suite.hash.vecs, 1606a8f1a052SDavid S. Miller desc->suite.hash.count, true); 1607a8f1a052SDavid S. Miller if (!err) 1608a8f1a052SDavid S. Miller err = test_hash(tfm, desc->suite.hash.vecs, 1609a8f1a052SDavid S. Miller desc->suite.hash.count, false); 1610da7f033dSHerbert Xu 1611da7f033dSHerbert Xu crypto_free_ahash(tfm); 1612da7f033dSHerbert Xu return err; 1613da7f033dSHerbert Xu } 1614da7f033dSHerbert Xu 16158e3ee85eSHerbert Xu static int alg_test_crc32c(const struct alg_test_desc *desc, 16168e3ee85eSHerbert Xu const char *driver, u32 type, u32 mask) 16178e3ee85eSHerbert Xu { 16188e3ee85eSHerbert Xu struct crypto_shash *tfm; 16198e3ee85eSHerbert Xu u32 val; 16208e3ee85eSHerbert Xu int err; 16218e3ee85eSHerbert Xu 16228e3ee85eSHerbert Xu err = alg_test_hash(desc, driver, type, mask); 16238e3ee85eSHerbert Xu if (err) 16248e3ee85eSHerbert Xu goto out; 16258e3ee85eSHerbert Xu 1626425a8829SStephan Mueller tfm = crypto_alloc_shash(driver, type | CRYPTO_ALG_INTERNAL, mask); 16278e3ee85eSHerbert Xu if (IS_ERR(tfm)) { 16288e3ee85eSHerbert Xu printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: " 16298e3ee85eSHerbert Xu "%ld\n", driver, PTR_ERR(tfm)); 16308e3ee85eSHerbert Xu err = PTR_ERR(tfm); 16318e3ee85eSHerbert Xu goto out; 16328e3ee85eSHerbert Xu } 16338e3ee85eSHerbert Xu 16348e3ee85eSHerbert Xu do { 16354c5c3024SJan-Simon Möller SHASH_DESC_ON_STACK(shash, tfm); 16364c5c3024SJan-Simon Möller u32 *ctx = (u32 *)shash_desc_ctx(shash); 16378e3ee85eSHerbert Xu 16384c5c3024SJan-Simon Möller shash->tfm = tfm; 16394c5c3024SJan-Simon Möller shash->flags = 0; 16408e3ee85eSHerbert Xu 16414c5c3024SJan-Simon Möller *ctx = le32_to_cpu(420553207); 16424c5c3024SJan-Simon Möller err = crypto_shash_final(shash, (u8 *)&val); 16438e3ee85eSHerbert Xu if (err) { 16448e3ee85eSHerbert Xu printk(KERN_ERR "alg: crc32c: Operation failed for " 16458e3ee85eSHerbert Xu "%s: %d\n", driver, err); 16468e3ee85eSHerbert Xu break; 16478e3ee85eSHerbert Xu } 16488e3ee85eSHerbert Xu 16498e3ee85eSHerbert Xu if (val != ~420553207) { 16508e3ee85eSHerbert Xu printk(KERN_ERR "alg: crc32c: Test failed for %s: " 16518e3ee85eSHerbert Xu "%d\n", driver, val); 16528e3ee85eSHerbert Xu err = -EINVAL; 16538e3ee85eSHerbert Xu } 16548e3ee85eSHerbert Xu } while (0); 16558e3ee85eSHerbert Xu 16568e3ee85eSHerbert Xu crypto_free_shash(tfm); 16578e3ee85eSHerbert Xu 16588e3ee85eSHerbert Xu out: 16598e3ee85eSHerbert Xu return err; 16608e3ee85eSHerbert Xu } 16618e3ee85eSHerbert Xu 16627647d6ceSJarod Wilson static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver, 16637647d6ceSJarod Wilson u32 type, u32 mask) 16647647d6ceSJarod Wilson { 16657647d6ceSJarod Wilson struct crypto_rng *rng; 16667647d6ceSJarod Wilson int err; 16677647d6ceSJarod Wilson 1668425a8829SStephan Mueller rng = crypto_alloc_rng(driver, type | CRYPTO_ALG_INTERNAL, mask); 16697647d6ceSJarod Wilson if (IS_ERR(rng)) { 16707647d6ceSJarod Wilson printk(KERN_ERR "alg: cprng: Failed to load transform for %s: " 16717647d6ceSJarod Wilson "%ld\n", driver, PTR_ERR(rng)); 16727647d6ceSJarod Wilson return PTR_ERR(rng); 16737647d6ceSJarod Wilson } 16747647d6ceSJarod Wilson 16757647d6ceSJarod Wilson err = test_cprng(rng, desc->suite.cprng.vecs, desc->suite.cprng.count); 16767647d6ceSJarod Wilson 16777647d6ceSJarod Wilson crypto_free_rng(rng); 16787647d6ceSJarod Wilson 16797647d6ceSJarod Wilson return err; 16807647d6ceSJarod Wilson } 16817647d6ceSJarod Wilson 168264d1cdfbSStephan Mueller 168364d1cdfbSStephan Mueller static int drbg_cavs_test(struct drbg_testvec *test, int pr, 168464d1cdfbSStephan Mueller const char *driver, u32 type, u32 mask) 168564d1cdfbSStephan Mueller { 168664d1cdfbSStephan Mueller int ret = -EAGAIN; 168764d1cdfbSStephan Mueller struct crypto_rng *drng; 168864d1cdfbSStephan Mueller struct drbg_test_data test_data; 168964d1cdfbSStephan Mueller struct drbg_string addtl, pers, testentropy; 169064d1cdfbSStephan Mueller unsigned char *buf = kzalloc(test->expectedlen, GFP_KERNEL); 169164d1cdfbSStephan Mueller 169264d1cdfbSStephan Mueller if (!buf) 169364d1cdfbSStephan Mueller return -ENOMEM; 169464d1cdfbSStephan Mueller 1695425a8829SStephan Mueller drng = crypto_alloc_rng(driver, type | CRYPTO_ALG_INTERNAL, mask); 169664d1cdfbSStephan Mueller if (IS_ERR(drng)) { 169764d1cdfbSStephan Mueller printk(KERN_ERR "alg: drbg: could not allocate DRNG handle for " 169864d1cdfbSStephan Mueller "%s\n", driver); 169964d1cdfbSStephan Mueller kzfree(buf); 170064d1cdfbSStephan Mueller return -ENOMEM; 170164d1cdfbSStephan Mueller } 170264d1cdfbSStephan Mueller 170364d1cdfbSStephan Mueller test_data.testentropy = &testentropy; 170464d1cdfbSStephan Mueller drbg_string_fill(&testentropy, test->entropy, test->entropylen); 170564d1cdfbSStephan Mueller drbg_string_fill(&pers, test->pers, test->perslen); 170664d1cdfbSStephan Mueller ret = crypto_drbg_reset_test(drng, &pers, &test_data); 170764d1cdfbSStephan Mueller if (ret) { 170864d1cdfbSStephan Mueller printk(KERN_ERR "alg: drbg: Failed to reset rng\n"); 170964d1cdfbSStephan Mueller goto outbuf; 171064d1cdfbSStephan Mueller } 171164d1cdfbSStephan Mueller 171264d1cdfbSStephan Mueller drbg_string_fill(&addtl, test->addtla, test->addtllen); 171364d1cdfbSStephan Mueller if (pr) { 171464d1cdfbSStephan Mueller drbg_string_fill(&testentropy, test->entpra, test->entprlen); 171564d1cdfbSStephan Mueller ret = crypto_drbg_get_bytes_addtl_test(drng, 171664d1cdfbSStephan Mueller buf, test->expectedlen, &addtl, &test_data); 171764d1cdfbSStephan Mueller } else { 171864d1cdfbSStephan Mueller ret = crypto_drbg_get_bytes_addtl(drng, 171964d1cdfbSStephan Mueller buf, test->expectedlen, &addtl); 172064d1cdfbSStephan Mueller } 172119e60e13SStephan Mueller if (ret < 0) { 172264d1cdfbSStephan Mueller printk(KERN_ERR "alg: drbg: could not obtain random data for " 172364d1cdfbSStephan Mueller "driver %s\n", driver); 172464d1cdfbSStephan Mueller goto outbuf; 172564d1cdfbSStephan Mueller } 172664d1cdfbSStephan Mueller 172764d1cdfbSStephan Mueller drbg_string_fill(&addtl, test->addtlb, test->addtllen); 172864d1cdfbSStephan Mueller if (pr) { 172964d1cdfbSStephan Mueller drbg_string_fill(&testentropy, test->entprb, test->entprlen); 173064d1cdfbSStephan Mueller ret = crypto_drbg_get_bytes_addtl_test(drng, 173164d1cdfbSStephan Mueller buf, test->expectedlen, &addtl, &test_data); 173264d1cdfbSStephan Mueller } else { 173364d1cdfbSStephan Mueller ret = crypto_drbg_get_bytes_addtl(drng, 173464d1cdfbSStephan Mueller buf, test->expectedlen, &addtl); 173564d1cdfbSStephan Mueller } 173619e60e13SStephan Mueller if (ret < 0) { 173764d1cdfbSStephan Mueller printk(KERN_ERR "alg: drbg: could not obtain random data for " 173864d1cdfbSStephan Mueller "driver %s\n", driver); 173964d1cdfbSStephan Mueller goto outbuf; 174064d1cdfbSStephan Mueller } 174164d1cdfbSStephan Mueller 174264d1cdfbSStephan Mueller ret = memcmp(test->expected, buf, test->expectedlen); 174364d1cdfbSStephan Mueller 174464d1cdfbSStephan Mueller outbuf: 174564d1cdfbSStephan Mueller crypto_free_rng(drng); 174664d1cdfbSStephan Mueller kzfree(buf); 174764d1cdfbSStephan Mueller return ret; 174864d1cdfbSStephan Mueller } 174964d1cdfbSStephan Mueller 175064d1cdfbSStephan Mueller 175164d1cdfbSStephan Mueller static int alg_test_drbg(const struct alg_test_desc *desc, const char *driver, 175264d1cdfbSStephan Mueller u32 type, u32 mask) 175364d1cdfbSStephan Mueller { 175464d1cdfbSStephan Mueller int err = 0; 175564d1cdfbSStephan Mueller int pr = 0; 175664d1cdfbSStephan Mueller int i = 0; 175764d1cdfbSStephan Mueller struct drbg_testvec *template = desc->suite.drbg.vecs; 175864d1cdfbSStephan Mueller unsigned int tcount = desc->suite.drbg.count; 175964d1cdfbSStephan Mueller 176064d1cdfbSStephan Mueller if (0 == memcmp(driver, "drbg_pr_", 8)) 176164d1cdfbSStephan Mueller pr = 1; 176264d1cdfbSStephan Mueller 176364d1cdfbSStephan Mueller for (i = 0; i < tcount; i++) { 176464d1cdfbSStephan Mueller err = drbg_cavs_test(&template[i], pr, driver, type, mask); 176564d1cdfbSStephan Mueller if (err) { 176664d1cdfbSStephan Mueller printk(KERN_ERR "alg: drbg: Test %d failed for %s\n", 176764d1cdfbSStephan Mueller i, driver); 176864d1cdfbSStephan Mueller err = -EINVAL; 176964d1cdfbSStephan Mueller break; 177064d1cdfbSStephan Mueller } 177164d1cdfbSStephan Mueller } 177264d1cdfbSStephan Mueller return err; 177364d1cdfbSStephan Mueller 177464d1cdfbSStephan Mueller } 177564d1cdfbSStephan Mueller 1776946cc463STadeusz Struk static int do_test_rsa(struct crypto_akcipher *tfm, 1777946cc463STadeusz Struk struct akcipher_testvec *vecs) 1778946cc463STadeusz Struk { 1779946cc463STadeusz Struk struct akcipher_request *req; 1780946cc463STadeusz Struk void *outbuf_enc = NULL; 1781946cc463STadeusz Struk void *outbuf_dec = NULL; 1782946cc463STadeusz Struk struct tcrypt_result result; 1783946cc463STadeusz Struk unsigned int out_len_max, out_len = 0; 1784946cc463STadeusz Struk int err = -ENOMEM; 178522287b0bSTadeusz Struk struct scatterlist src, dst, src_tab[2]; 1786946cc463STadeusz Struk 1787946cc463STadeusz Struk req = akcipher_request_alloc(tfm, GFP_KERNEL); 1788946cc463STadeusz Struk if (!req) 1789946cc463STadeusz Struk return err; 1790946cc463STadeusz Struk 1791946cc463STadeusz Struk init_completion(&result.completion); 179222287b0bSTadeusz Struk 179322287b0bSTadeusz Struk if (vecs->public_key_vec) 179422287b0bSTadeusz Struk err = crypto_akcipher_set_pub_key(tfm, vecs->key, 179522287b0bSTadeusz Struk vecs->key_len); 179622287b0bSTadeusz Struk else 179722287b0bSTadeusz Struk err = crypto_akcipher_set_priv_key(tfm, vecs->key, 179822287b0bSTadeusz Struk vecs->key_len); 1799946cc463STadeusz Struk if (err) 1800946cc463STadeusz Struk goto free_req; 1801946cc463STadeusz Struk 180222287b0bSTadeusz Struk out_len_max = crypto_akcipher_maxsize(tfm); 1803946cc463STadeusz Struk outbuf_enc = kzalloc(out_len_max, GFP_KERNEL); 1804946cc463STadeusz Struk if (!outbuf_enc) 1805946cc463STadeusz Struk goto free_req; 1806946cc463STadeusz Struk 180722287b0bSTadeusz Struk sg_init_table(src_tab, 2); 180822287b0bSTadeusz Struk sg_set_buf(&src_tab[0], vecs->m, 8); 180922287b0bSTadeusz Struk sg_set_buf(&src_tab[1], vecs->m + 8, vecs->m_size - 8); 181022287b0bSTadeusz Struk sg_init_one(&dst, outbuf_enc, out_len_max); 181122287b0bSTadeusz Struk akcipher_request_set_crypt(req, src_tab, &dst, vecs->m_size, 181222287b0bSTadeusz Struk out_len_max); 1813946cc463STadeusz Struk akcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG, 1814946cc463STadeusz Struk tcrypt_complete, &result); 1815946cc463STadeusz Struk 1816946cc463STadeusz Struk /* Run RSA encrypt - c = m^e mod n;*/ 1817946cc463STadeusz Struk err = wait_async_op(&result, crypto_akcipher_encrypt(req)); 1818946cc463STadeusz Struk if (err) { 1819946cc463STadeusz Struk pr_err("alg: rsa: encrypt test failed. err %d\n", err); 1820946cc463STadeusz Struk goto free_all; 1821946cc463STadeusz Struk } 182222287b0bSTadeusz Struk if (req->dst_len != vecs->c_size) { 1823946cc463STadeusz Struk pr_err("alg: rsa: encrypt test failed. Invalid output len\n"); 1824946cc463STadeusz Struk err = -EINVAL; 1825946cc463STadeusz Struk goto free_all; 1826946cc463STadeusz Struk } 1827946cc463STadeusz Struk /* verify that encrypted message is equal to expected */ 182822287b0bSTadeusz Struk if (memcmp(vecs->c, sg_virt(req->dst), vecs->c_size)) { 1829946cc463STadeusz Struk pr_err("alg: rsa: encrypt test failed. Invalid output\n"); 1830946cc463STadeusz Struk err = -EINVAL; 1831946cc463STadeusz Struk goto free_all; 1832946cc463STadeusz Struk } 1833946cc463STadeusz Struk /* Don't invoke decrypt for vectors with public key */ 1834946cc463STadeusz Struk if (vecs->public_key_vec) { 1835946cc463STadeusz Struk err = 0; 1836946cc463STadeusz Struk goto free_all; 1837946cc463STadeusz Struk } 1838946cc463STadeusz Struk outbuf_dec = kzalloc(out_len_max, GFP_KERNEL); 1839946cc463STadeusz Struk if (!outbuf_dec) { 1840946cc463STadeusz Struk err = -ENOMEM; 1841946cc463STadeusz Struk goto free_all; 1842946cc463STadeusz Struk } 184322287b0bSTadeusz Struk sg_init_one(&src, vecs->c, vecs->c_size); 184422287b0bSTadeusz Struk sg_init_one(&dst, outbuf_dec, out_len_max); 1845946cc463STadeusz Struk init_completion(&result.completion); 184622287b0bSTadeusz Struk akcipher_request_set_crypt(req, &src, &dst, vecs->c_size, out_len_max); 1847946cc463STadeusz Struk 1848946cc463STadeusz Struk /* Run RSA decrypt - m = c^d mod n;*/ 1849946cc463STadeusz Struk err = wait_async_op(&result, crypto_akcipher_decrypt(req)); 1850946cc463STadeusz Struk if (err) { 1851946cc463STadeusz Struk pr_err("alg: rsa: decrypt test failed. err %d\n", err); 1852946cc463STadeusz Struk goto free_all; 1853946cc463STadeusz Struk } 1854946cc463STadeusz Struk out_len = req->dst_len; 1855946cc463STadeusz Struk if (out_len != vecs->m_size) { 1856946cc463STadeusz Struk pr_err("alg: rsa: decrypt test failed. Invalid output len\n"); 1857946cc463STadeusz Struk err = -EINVAL; 1858946cc463STadeusz Struk goto free_all; 1859946cc463STadeusz Struk } 1860946cc463STadeusz Struk /* verify that decrypted message is equal to the original msg */ 1861946cc463STadeusz Struk if (memcmp(vecs->m, outbuf_dec, vecs->m_size)) { 1862946cc463STadeusz Struk pr_err("alg: rsa: decrypt test failed. Invalid output\n"); 1863946cc463STadeusz Struk err = -EINVAL; 1864946cc463STadeusz Struk } 1865946cc463STadeusz Struk free_all: 1866946cc463STadeusz Struk kfree(outbuf_dec); 1867946cc463STadeusz Struk kfree(outbuf_enc); 1868946cc463STadeusz Struk free_req: 1869946cc463STadeusz Struk akcipher_request_free(req); 1870946cc463STadeusz Struk return err; 1871946cc463STadeusz Struk } 1872946cc463STadeusz Struk 1873946cc463STadeusz Struk static int test_rsa(struct crypto_akcipher *tfm, struct akcipher_testvec *vecs, 1874946cc463STadeusz Struk unsigned int tcount) 1875946cc463STadeusz Struk { 1876946cc463STadeusz Struk int ret, i; 1877946cc463STadeusz Struk 1878946cc463STadeusz Struk for (i = 0; i < tcount; i++) { 1879946cc463STadeusz Struk ret = do_test_rsa(tfm, vecs++); 1880946cc463STadeusz Struk if (ret) { 1881946cc463STadeusz Struk pr_err("alg: rsa: test failed on vector %d, err=%d\n", 1882946cc463STadeusz Struk i + 1, ret); 1883946cc463STadeusz Struk return ret; 1884946cc463STadeusz Struk } 1885946cc463STadeusz Struk } 1886946cc463STadeusz Struk return 0; 1887946cc463STadeusz Struk } 1888946cc463STadeusz Struk 1889946cc463STadeusz Struk static int test_akcipher(struct crypto_akcipher *tfm, const char *alg, 1890946cc463STadeusz Struk struct akcipher_testvec *vecs, unsigned int tcount) 1891946cc463STadeusz Struk { 1892946cc463STadeusz Struk if (strncmp(alg, "rsa", 3) == 0) 1893946cc463STadeusz Struk return test_rsa(tfm, vecs, tcount); 1894946cc463STadeusz Struk 1895946cc463STadeusz Struk return 0; 1896946cc463STadeusz Struk } 1897946cc463STadeusz Struk 1898946cc463STadeusz Struk static int alg_test_akcipher(const struct alg_test_desc *desc, 1899946cc463STadeusz Struk const char *driver, u32 type, u32 mask) 1900946cc463STadeusz Struk { 1901946cc463STadeusz Struk struct crypto_akcipher *tfm; 1902946cc463STadeusz Struk int err = 0; 1903946cc463STadeusz Struk 1904946cc463STadeusz Struk tfm = crypto_alloc_akcipher(driver, type | CRYPTO_ALG_INTERNAL, mask); 1905946cc463STadeusz Struk if (IS_ERR(tfm)) { 1906946cc463STadeusz Struk pr_err("alg: akcipher: Failed to load tfm for %s: %ld\n", 1907946cc463STadeusz Struk driver, PTR_ERR(tfm)); 1908946cc463STadeusz Struk return PTR_ERR(tfm); 1909946cc463STadeusz Struk } 1910946cc463STadeusz Struk if (desc->suite.akcipher.vecs) 1911946cc463STadeusz Struk err = test_akcipher(tfm, desc->alg, desc->suite.akcipher.vecs, 1912946cc463STadeusz Struk desc->suite.akcipher.count); 1913946cc463STadeusz Struk 1914946cc463STadeusz Struk crypto_free_akcipher(tfm); 1915946cc463STadeusz Struk return err; 1916946cc463STadeusz Struk } 1917946cc463STadeusz Struk 1918863b557aSYouquan, Song static int alg_test_null(const struct alg_test_desc *desc, 1919863b557aSYouquan, Song const char *driver, u32 type, u32 mask) 1920863b557aSYouquan, Song { 1921863b557aSYouquan, Song return 0; 1922863b557aSYouquan, Song } 1923863b557aSYouquan, Song 1924da7f033dSHerbert Xu /* Please keep this list sorted by algorithm name. */ 1925da7f033dSHerbert Xu static const struct alg_test_desc alg_test_descs[] = { 1926da7f033dSHerbert Xu { 19274d6d6a2cSJohannes Goetzfried .alg = "__cbc-cast5-avx", 19284d6d6a2cSJohannes Goetzfried .test = alg_test_null, 19294d6d6a2cSJohannes Goetzfried }, { 19304ea1277dSJohannes Goetzfried .alg = "__cbc-cast6-avx", 19314ea1277dSJohannes Goetzfried .test = alg_test_null, 19324ea1277dSJohannes Goetzfried }, { 19337efe4076SJohannes Goetzfried .alg = "__cbc-serpent-avx", 19347efe4076SJohannes Goetzfried .test = alg_test_null, 19357efe4076SJohannes Goetzfried }, { 193656d76c96SJussi Kivilinna .alg = "__cbc-serpent-avx2", 193756d76c96SJussi Kivilinna .test = alg_test_null, 193856d76c96SJussi Kivilinna }, { 1939937c30d7SJussi Kivilinna .alg = "__cbc-serpent-sse2", 1940937c30d7SJussi Kivilinna .test = alg_test_null, 1941937c30d7SJussi Kivilinna }, { 1942107778b5SJohannes Goetzfried .alg = "__cbc-twofish-avx", 1943107778b5SJohannes Goetzfried .test = alg_test_null, 1944107778b5SJohannes Goetzfried }, { 1945863b557aSYouquan, Song .alg = "__driver-cbc-aes-aesni", 1946863b557aSYouquan, Song .test = alg_test_null, 19476c79294fSMilan Broz .fips_allowed = 1, 1948863b557aSYouquan, Song }, { 1949d9b1d2e7SJussi Kivilinna .alg = "__driver-cbc-camellia-aesni", 1950d9b1d2e7SJussi Kivilinna .test = alg_test_null, 1951d9b1d2e7SJussi Kivilinna }, { 1952f3f935a7SJussi Kivilinna .alg = "__driver-cbc-camellia-aesni-avx2", 1953f3f935a7SJussi Kivilinna .test = alg_test_null, 1954f3f935a7SJussi Kivilinna }, { 19554d6d6a2cSJohannes Goetzfried .alg = "__driver-cbc-cast5-avx", 19564d6d6a2cSJohannes Goetzfried .test = alg_test_null, 19574d6d6a2cSJohannes Goetzfried }, { 19584ea1277dSJohannes Goetzfried .alg = "__driver-cbc-cast6-avx", 19594ea1277dSJohannes Goetzfried .test = alg_test_null, 19604ea1277dSJohannes Goetzfried }, { 19617efe4076SJohannes Goetzfried .alg = "__driver-cbc-serpent-avx", 19627efe4076SJohannes Goetzfried .test = alg_test_null, 19637efe4076SJohannes Goetzfried }, { 196456d76c96SJussi Kivilinna .alg = "__driver-cbc-serpent-avx2", 196556d76c96SJussi Kivilinna .test = alg_test_null, 196656d76c96SJussi Kivilinna }, { 1967937c30d7SJussi Kivilinna .alg = "__driver-cbc-serpent-sse2", 1968937c30d7SJussi Kivilinna .test = alg_test_null, 1969937c30d7SJussi Kivilinna }, { 1970107778b5SJohannes Goetzfried .alg = "__driver-cbc-twofish-avx", 1971107778b5SJohannes Goetzfried .test = alg_test_null, 1972107778b5SJohannes Goetzfried }, { 1973863b557aSYouquan, Song .alg = "__driver-ecb-aes-aesni", 1974863b557aSYouquan, Song .test = alg_test_null, 19756c79294fSMilan Broz .fips_allowed = 1, 1976863b557aSYouquan, Song }, { 1977d9b1d2e7SJussi Kivilinna .alg = "__driver-ecb-camellia-aesni", 1978d9b1d2e7SJussi Kivilinna .test = alg_test_null, 1979d9b1d2e7SJussi Kivilinna }, { 1980f3f935a7SJussi Kivilinna .alg = "__driver-ecb-camellia-aesni-avx2", 1981f3f935a7SJussi Kivilinna .test = alg_test_null, 1982f3f935a7SJussi Kivilinna }, { 19834d6d6a2cSJohannes Goetzfried .alg = "__driver-ecb-cast5-avx", 19844d6d6a2cSJohannes Goetzfried .test = alg_test_null, 19854d6d6a2cSJohannes Goetzfried }, { 19864ea1277dSJohannes Goetzfried .alg = "__driver-ecb-cast6-avx", 19874ea1277dSJohannes Goetzfried .test = alg_test_null, 19884ea1277dSJohannes Goetzfried }, { 19897efe4076SJohannes Goetzfried .alg = "__driver-ecb-serpent-avx", 19907efe4076SJohannes Goetzfried .test = alg_test_null, 19917efe4076SJohannes Goetzfried }, { 199256d76c96SJussi Kivilinna .alg = "__driver-ecb-serpent-avx2", 199356d76c96SJussi Kivilinna .test = alg_test_null, 199456d76c96SJussi Kivilinna }, { 1995937c30d7SJussi Kivilinna .alg = "__driver-ecb-serpent-sse2", 1996937c30d7SJussi Kivilinna .test = alg_test_null, 1997937c30d7SJussi Kivilinna }, { 1998107778b5SJohannes Goetzfried .alg = "__driver-ecb-twofish-avx", 1999107778b5SJohannes Goetzfried .test = alg_test_null, 2000107778b5SJohannes Goetzfried }, { 20019d77b6c2STadeusz Struk .alg = "__driver-gcm-aes-aesni", 20029d77b6c2STadeusz Struk .test = alg_test_null, 20039d77b6c2STadeusz Struk .fips_allowed = 1, 20049d77b6c2STadeusz Struk }, { 2005863b557aSYouquan, Song .alg = "__ghash-pclmulqdqni", 2006863b557aSYouquan, Song .test = alg_test_null, 20076c79294fSMilan Broz .fips_allowed = 1, 2008863b557aSYouquan, Song }, { 2009e08ca2daSJarod Wilson .alg = "ansi_cprng", 2010e08ca2daSJarod Wilson .test = alg_test_cprng, 2011e08ca2daSJarod Wilson .suite = { 2012e08ca2daSJarod Wilson .cprng = { 2013e08ca2daSJarod Wilson .vecs = ansi_cprng_aes_tv_template, 2014e08ca2daSJarod Wilson .count = ANSI_CPRNG_AES_TEST_VECTORS 2015e08ca2daSJarod Wilson } 2016e08ca2daSJarod Wilson } 2017e08ca2daSJarod Wilson }, { 2018bca4feb0SHoria Geanta .alg = "authenc(hmac(md5),ecb(cipher_null))", 2019bca4feb0SHoria Geanta .test = alg_test_aead, 2020bca4feb0SHoria Geanta .suite = { 2021bca4feb0SHoria Geanta .aead = { 2022bca4feb0SHoria Geanta .enc = { 2023bca4feb0SHoria Geanta .vecs = hmac_md5_ecb_cipher_null_enc_tv_template, 2024bca4feb0SHoria Geanta .count = HMAC_MD5_ECB_CIPHER_NULL_ENC_TEST_VECTORS 2025bca4feb0SHoria Geanta }, 2026bca4feb0SHoria Geanta .dec = { 2027bca4feb0SHoria Geanta .vecs = hmac_md5_ecb_cipher_null_dec_tv_template, 2028bca4feb0SHoria Geanta .count = HMAC_MD5_ECB_CIPHER_NULL_DEC_TEST_VECTORS 2029bca4feb0SHoria Geanta } 2030bca4feb0SHoria Geanta } 2031bca4feb0SHoria Geanta } 2032bca4feb0SHoria Geanta }, { 2033a4198fd4SHerbert Xu .alg = "authenc(hmac(sha1),cbc(aes))", 2034e46e9a46SHoria Geanta .test = alg_test_aead, 2035e46e9a46SHoria Geanta .suite = { 2036e46e9a46SHoria Geanta .aead = { 2037e46e9a46SHoria Geanta .enc = { 20385208ed2cSNitesh Lal .vecs = 20395208ed2cSNitesh Lal hmac_sha1_aes_cbc_enc_tv_temp, 20405208ed2cSNitesh Lal .count = 20415208ed2cSNitesh Lal HMAC_SHA1_AES_CBC_ENC_TEST_VEC 20425208ed2cSNitesh Lal } 20435208ed2cSNitesh Lal } 20445208ed2cSNitesh Lal } 20455208ed2cSNitesh Lal }, { 2046a4198fd4SHerbert Xu .alg = "authenc(hmac(sha1),cbc(des))", 20475208ed2cSNitesh Lal .test = alg_test_aead, 20485208ed2cSNitesh Lal .suite = { 20495208ed2cSNitesh Lal .aead = { 20505208ed2cSNitesh Lal .enc = { 20515208ed2cSNitesh Lal .vecs = 20525208ed2cSNitesh Lal hmac_sha1_des_cbc_enc_tv_temp, 20535208ed2cSNitesh Lal .count = 20545208ed2cSNitesh Lal HMAC_SHA1_DES_CBC_ENC_TEST_VEC 20555208ed2cSNitesh Lal } 20565208ed2cSNitesh Lal } 20575208ed2cSNitesh Lal } 20585208ed2cSNitesh Lal }, { 2059a4198fd4SHerbert Xu .alg = "authenc(hmac(sha1),cbc(des3_ede))", 20605208ed2cSNitesh Lal .test = alg_test_aead, 2061ed1afac9SMarcus Meissner .fips_allowed = 1, 20625208ed2cSNitesh Lal .suite = { 20635208ed2cSNitesh Lal .aead = { 20645208ed2cSNitesh Lal .enc = { 20655208ed2cSNitesh Lal .vecs = 20665208ed2cSNitesh Lal hmac_sha1_des3_ede_cbc_enc_tv_temp, 20675208ed2cSNitesh Lal .count = 20685208ed2cSNitesh Lal HMAC_SHA1_DES3_EDE_CBC_ENC_TEST_VEC 2069e46e9a46SHoria Geanta } 2070e46e9a46SHoria Geanta } 2071e46e9a46SHoria Geanta } 2072e46e9a46SHoria Geanta }, { 2073fb16abc2SMarcus Meissner .alg = "authenc(hmac(sha1),ctr(aes))", 2074fb16abc2SMarcus Meissner .test = alg_test_null, 2075fb16abc2SMarcus Meissner .fips_allowed = 1, 2076fb16abc2SMarcus Meissner }, { 2077bca4feb0SHoria Geanta .alg = "authenc(hmac(sha1),ecb(cipher_null))", 2078bca4feb0SHoria Geanta .test = alg_test_aead, 2079bca4feb0SHoria Geanta .suite = { 2080bca4feb0SHoria Geanta .aead = { 2081bca4feb0SHoria Geanta .enc = { 20825208ed2cSNitesh Lal .vecs = 20835208ed2cSNitesh Lal hmac_sha1_ecb_cipher_null_enc_tv_temp, 20845208ed2cSNitesh Lal .count = 20855208ed2cSNitesh Lal HMAC_SHA1_ECB_CIPHER_NULL_ENC_TEST_VEC 2086bca4feb0SHoria Geanta }, 2087bca4feb0SHoria Geanta .dec = { 20885208ed2cSNitesh Lal .vecs = 20895208ed2cSNitesh Lal hmac_sha1_ecb_cipher_null_dec_tv_temp, 20905208ed2cSNitesh Lal .count = 20915208ed2cSNitesh Lal HMAC_SHA1_ECB_CIPHER_NULL_DEC_TEST_VEC 20925208ed2cSNitesh Lal } 20935208ed2cSNitesh Lal } 20945208ed2cSNitesh Lal } 20955208ed2cSNitesh Lal }, { 2096a4198fd4SHerbert Xu .alg = "authenc(hmac(sha224),cbc(des))", 20975208ed2cSNitesh Lal .test = alg_test_aead, 20985208ed2cSNitesh Lal .suite = { 20995208ed2cSNitesh Lal .aead = { 21005208ed2cSNitesh Lal .enc = { 21015208ed2cSNitesh Lal .vecs = 21025208ed2cSNitesh Lal hmac_sha224_des_cbc_enc_tv_temp, 21035208ed2cSNitesh Lal .count = 21045208ed2cSNitesh Lal HMAC_SHA224_DES_CBC_ENC_TEST_VEC 21055208ed2cSNitesh Lal } 21065208ed2cSNitesh Lal } 21075208ed2cSNitesh Lal } 21085208ed2cSNitesh Lal }, { 2109a4198fd4SHerbert Xu .alg = "authenc(hmac(sha224),cbc(des3_ede))", 21105208ed2cSNitesh Lal .test = alg_test_aead, 2111ed1afac9SMarcus Meissner .fips_allowed = 1, 21125208ed2cSNitesh Lal .suite = { 21135208ed2cSNitesh Lal .aead = { 21145208ed2cSNitesh Lal .enc = { 21155208ed2cSNitesh Lal .vecs = 21165208ed2cSNitesh Lal hmac_sha224_des3_ede_cbc_enc_tv_temp, 21175208ed2cSNitesh Lal .count = 21185208ed2cSNitesh Lal HMAC_SHA224_DES3_EDE_CBC_ENC_TEST_VEC 2119bca4feb0SHoria Geanta } 2120bca4feb0SHoria Geanta } 2121bca4feb0SHoria Geanta } 2122bca4feb0SHoria Geanta }, { 2123a4198fd4SHerbert Xu .alg = "authenc(hmac(sha256),cbc(aes))", 2124e46e9a46SHoria Geanta .test = alg_test_aead, 2125ed1afac9SMarcus Meissner .fips_allowed = 1, 2126e46e9a46SHoria Geanta .suite = { 2127e46e9a46SHoria Geanta .aead = { 2128e46e9a46SHoria Geanta .enc = { 21295208ed2cSNitesh Lal .vecs = 21305208ed2cSNitesh Lal hmac_sha256_aes_cbc_enc_tv_temp, 21315208ed2cSNitesh Lal .count = 21325208ed2cSNitesh Lal HMAC_SHA256_AES_CBC_ENC_TEST_VEC 21335208ed2cSNitesh Lal } 21345208ed2cSNitesh Lal } 21355208ed2cSNitesh Lal } 21365208ed2cSNitesh Lal }, { 2137a4198fd4SHerbert Xu .alg = "authenc(hmac(sha256),cbc(des))", 21385208ed2cSNitesh Lal .test = alg_test_aead, 21395208ed2cSNitesh Lal .suite = { 21405208ed2cSNitesh Lal .aead = { 21415208ed2cSNitesh Lal .enc = { 21425208ed2cSNitesh Lal .vecs = 21435208ed2cSNitesh Lal hmac_sha256_des_cbc_enc_tv_temp, 21445208ed2cSNitesh Lal .count = 21455208ed2cSNitesh Lal HMAC_SHA256_DES_CBC_ENC_TEST_VEC 21465208ed2cSNitesh Lal } 21475208ed2cSNitesh Lal } 21485208ed2cSNitesh Lal } 21495208ed2cSNitesh Lal }, { 2150a4198fd4SHerbert Xu .alg = "authenc(hmac(sha256),cbc(des3_ede))", 21515208ed2cSNitesh Lal .test = alg_test_aead, 2152ed1afac9SMarcus Meissner .fips_allowed = 1, 21535208ed2cSNitesh Lal .suite = { 21545208ed2cSNitesh Lal .aead = { 21555208ed2cSNitesh Lal .enc = { 21565208ed2cSNitesh Lal .vecs = 21575208ed2cSNitesh Lal hmac_sha256_des3_ede_cbc_enc_tv_temp, 21585208ed2cSNitesh Lal .count = 21595208ed2cSNitesh Lal HMAC_SHA256_DES3_EDE_CBC_ENC_TEST_VEC 21605208ed2cSNitesh Lal } 21615208ed2cSNitesh Lal } 21625208ed2cSNitesh Lal } 21635208ed2cSNitesh Lal }, { 2164fb16abc2SMarcus Meissner .alg = "authenc(hmac(sha256),ctr(aes))", 2165fb16abc2SMarcus Meissner .test = alg_test_null, 2166fb16abc2SMarcus Meissner .fips_allowed = 1, 2167fb16abc2SMarcus Meissner }, { 2168a4198fd4SHerbert Xu .alg = "authenc(hmac(sha384),cbc(des))", 21695208ed2cSNitesh Lal .test = alg_test_aead, 21705208ed2cSNitesh Lal .suite = { 21715208ed2cSNitesh Lal .aead = { 21725208ed2cSNitesh Lal .enc = { 21735208ed2cSNitesh Lal .vecs = 21745208ed2cSNitesh Lal hmac_sha384_des_cbc_enc_tv_temp, 21755208ed2cSNitesh Lal .count = 21765208ed2cSNitesh Lal HMAC_SHA384_DES_CBC_ENC_TEST_VEC 21775208ed2cSNitesh Lal } 21785208ed2cSNitesh Lal } 21795208ed2cSNitesh Lal } 21805208ed2cSNitesh Lal }, { 2181a4198fd4SHerbert Xu .alg = "authenc(hmac(sha384),cbc(des3_ede))", 21825208ed2cSNitesh Lal .test = alg_test_aead, 2183ed1afac9SMarcus Meissner .fips_allowed = 1, 21845208ed2cSNitesh Lal .suite = { 21855208ed2cSNitesh Lal .aead = { 21865208ed2cSNitesh Lal .enc = { 21875208ed2cSNitesh Lal .vecs = 21885208ed2cSNitesh Lal hmac_sha384_des3_ede_cbc_enc_tv_temp, 21895208ed2cSNitesh Lal .count = 21905208ed2cSNitesh Lal HMAC_SHA384_DES3_EDE_CBC_ENC_TEST_VEC 2191e46e9a46SHoria Geanta } 2192e46e9a46SHoria Geanta } 2193e46e9a46SHoria Geanta } 2194e46e9a46SHoria Geanta }, { 2195fb16abc2SMarcus Meissner .alg = "authenc(hmac(sha384),ctr(aes))", 2196fb16abc2SMarcus Meissner .test = alg_test_null, 2197fb16abc2SMarcus Meissner .fips_allowed = 1, 2198fb16abc2SMarcus Meissner }, { 2199a4198fd4SHerbert Xu .alg = "authenc(hmac(sha512),cbc(aes))", 2200ed1afac9SMarcus Meissner .fips_allowed = 1, 2201e46e9a46SHoria Geanta .test = alg_test_aead, 2202e46e9a46SHoria Geanta .suite = { 2203e46e9a46SHoria Geanta .aead = { 2204e46e9a46SHoria Geanta .enc = { 22055208ed2cSNitesh Lal .vecs = 22065208ed2cSNitesh Lal hmac_sha512_aes_cbc_enc_tv_temp, 22075208ed2cSNitesh Lal .count = 22085208ed2cSNitesh Lal HMAC_SHA512_AES_CBC_ENC_TEST_VEC 22095208ed2cSNitesh Lal } 22105208ed2cSNitesh Lal } 22115208ed2cSNitesh Lal } 22125208ed2cSNitesh Lal }, { 2213a4198fd4SHerbert Xu .alg = "authenc(hmac(sha512),cbc(des))", 22145208ed2cSNitesh Lal .test = alg_test_aead, 22155208ed2cSNitesh Lal .suite = { 22165208ed2cSNitesh Lal .aead = { 22175208ed2cSNitesh Lal .enc = { 22185208ed2cSNitesh Lal .vecs = 22195208ed2cSNitesh Lal hmac_sha512_des_cbc_enc_tv_temp, 22205208ed2cSNitesh Lal .count = 22215208ed2cSNitesh Lal HMAC_SHA512_DES_CBC_ENC_TEST_VEC 22225208ed2cSNitesh Lal } 22235208ed2cSNitesh Lal } 22245208ed2cSNitesh Lal } 22255208ed2cSNitesh Lal }, { 2226a4198fd4SHerbert Xu .alg = "authenc(hmac(sha512),cbc(des3_ede))", 22275208ed2cSNitesh Lal .test = alg_test_aead, 2228ed1afac9SMarcus Meissner .fips_allowed = 1, 22295208ed2cSNitesh Lal .suite = { 22305208ed2cSNitesh Lal .aead = { 22315208ed2cSNitesh Lal .enc = { 22325208ed2cSNitesh Lal .vecs = 22335208ed2cSNitesh Lal hmac_sha512_des3_ede_cbc_enc_tv_temp, 22345208ed2cSNitesh Lal .count = 22355208ed2cSNitesh Lal HMAC_SHA512_DES3_EDE_CBC_ENC_TEST_VEC 2236e46e9a46SHoria Geanta } 2237e46e9a46SHoria Geanta } 2238e46e9a46SHoria Geanta } 2239e46e9a46SHoria Geanta }, { 2240fb16abc2SMarcus Meissner .alg = "authenc(hmac(sha512),ctr(aes))", 2241fb16abc2SMarcus Meissner .test = alg_test_null, 2242fb16abc2SMarcus Meissner .fips_allowed = 1, 2243fb16abc2SMarcus Meissner }, { 2244da7f033dSHerbert Xu .alg = "cbc(aes)", 22451aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2246a1915d51SJarod Wilson .fips_allowed = 1, 2247da7f033dSHerbert Xu .suite = { 2248da7f033dSHerbert Xu .cipher = { 2249da7f033dSHerbert Xu .enc = { 2250da7f033dSHerbert Xu .vecs = aes_cbc_enc_tv_template, 2251da7f033dSHerbert Xu .count = AES_CBC_ENC_TEST_VECTORS 2252da7f033dSHerbert Xu }, 2253da7f033dSHerbert Xu .dec = { 2254da7f033dSHerbert Xu .vecs = aes_cbc_dec_tv_template, 2255da7f033dSHerbert Xu .count = AES_CBC_DEC_TEST_VECTORS 2256da7f033dSHerbert Xu } 2257da7f033dSHerbert Xu } 2258da7f033dSHerbert Xu } 2259da7f033dSHerbert Xu }, { 2260da7f033dSHerbert Xu .alg = "cbc(anubis)", 22611aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2262da7f033dSHerbert Xu .suite = { 2263da7f033dSHerbert Xu .cipher = { 2264da7f033dSHerbert Xu .enc = { 2265da7f033dSHerbert Xu .vecs = anubis_cbc_enc_tv_template, 2266da7f033dSHerbert Xu .count = ANUBIS_CBC_ENC_TEST_VECTORS 2267da7f033dSHerbert Xu }, 2268da7f033dSHerbert Xu .dec = { 2269da7f033dSHerbert Xu .vecs = anubis_cbc_dec_tv_template, 2270da7f033dSHerbert Xu .count = ANUBIS_CBC_DEC_TEST_VECTORS 2271da7f033dSHerbert Xu } 2272da7f033dSHerbert Xu } 2273da7f033dSHerbert Xu } 2274da7f033dSHerbert Xu }, { 2275da7f033dSHerbert Xu .alg = "cbc(blowfish)", 22761aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2277da7f033dSHerbert Xu .suite = { 2278da7f033dSHerbert Xu .cipher = { 2279da7f033dSHerbert Xu .enc = { 2280da7f033dSHerbert Xu .vecs = bf_cbc_enc_tv_template, 2281da7f033dSHerbert Xu .count = BF_CBC_ENC_TEST_VECTORS 2282da7f033dSHerbert Xu }, 2283da7f033dSHerbert Xu .dec = { 2284da7f033dSHerbert Xu .vecs = bf_cbc_dec_tv_template, 2285da7f033dSHerbert Xu .count = BF_CBC_DEC_TEST_VECTORS 2286da7f033dSHerbert Xu } 2287da7f033dSHerbert Xu } 2288da7f033dSHerbert Xu } 2289da7f033dSHerbert Xu }, { 2290da7f033dSHerbert Xu .alg = "cbc(camellia)", 22911aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2292da7f033dSHerbert Xu .suite = { 2293da7f033dSHerbert Xu .cipher = { 2294da7f033dSHerbert Xu .enc = { 2295da7f033dSHerbert Xu .vecs = camellia_cbc_enc_tv_template, 2296da7f033dSHerbert Xu .count = CAMELLIA_CBC_ENC_TEST_VECTORS 2297da7f033dSHerbert Xu }, 2298da7f033dSHerbert Xu .dec = { 2299da7f033dSHerbert Xu .vecs = camellia_cbc_dec_tv_template, 2300da7f033dSHerbert Xu .count = CAMELLIA_CBC_DEC_TEST_VECTORS 2301da7f033dSHerbert Xu } 2302da7f033dSHerbert Xu } 2303da7f033dSHerbert Xu } 2304da7f033dSHerbert Xu }, { 2305a2c58260SJohannes Goetzfried .alg = "cbc(cast5)", 2306a2c58260SJohannes Goetzfried .test = alg_test_skcipher, 2307a2c58260SJohannes Goetzfried .suite = { 2308a2c58260SJohannes Goetzfried .cipher = { 2309a2c58260SJohannes Goetzfried .enc = { 2310a2c58260SJohannes Goetzfried .vecs = cast5_cbc_enc_tv_template, 2311a2c58260SJohannes Goetzfried .count = CAST5_CBC_ENC_TEST_VECTORS 2312a2c58260SJohannes Goetzfried }, 2313a2c58260SJohannes Goetzfried .dec = { 2314a2c58260SJohannes Goetzfried .vecs = cast5_cbc_dec_tv_template, 2315a2c58260SJohannes Goetzfried .count = CAST5_CBC_DEC_TEST_VECTORS 2316a2c58260SJohannes Goetzfried } 2317a2c58260SJohannes Goetzfried } 2318a2c58260SJohannes Goetzfried } 2319a2c58260SJohannes Goetzfried }, { 23209b8b0405SJohannes Goetzfried .alg = "cbc(cast6)", 23219b8b0405SJohannes Goetzfried .test = alg_test_skcipher, 23229b8b0405SJohannes Goetzfried .suite = { 23239b8b0405SJohannes Goetzfried .cipher = { 23249b8b0405SJohannes Goetzfried .enc = { 23259b8b0405SJohannes Goetzfried .vecs = cast6_cbc_enc_tv_template, 23269b8b0405SJohannes Goetzfried .count = CAST6_CBC_ENC_TEST_VECTORS 23279b8b0405SJohannes Goetzfried }, 23289b8b0405SJohannes Goetzfried .dec = { 23299b8b0405SJohannes Goetzfried .vecs = cast6_cbc_dec_tv_template, 23309b8b0405SJohannes Goetzfried .count = CAST6_CBC_DEC_TEST_VECTORS 23319b8b0405SJohannes Goetzfried } 23329b8b0405SJohannes Goetzfried } 23339b8b0405SJohannes Goetzfried } 23349b8b0405SJohannes Goetzfried }, { 2335da7f033dSHerbert Xu .alg = "cbc(des)", 23361aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2337da7f033dSHerbert Xu .suite = { 2338da7f033dSHerbert Xu .cipher = { 2339da7f033dSHerbert Xu .enc = { 2340da7f033dSHerbert Xu .vecs = des_cbc_enc_tv_template, 2341da7f033dSHerbert Xu .count = DES_CBC_ENC_TEST_VECTORS 2342da7f033dSHerbert Xu }, 2343da7f033dSHerbert Xu .dec = { 2344da7f033dSHerbert Xu .vecs = des_cbc_dec_tv_template, 2345da7f033dSHerbert Xu .count = DES_CBC_DEC_TEST_VECTORS 2346da7f033dSHerbert Xu } 2347da7f033dSHerbert Xu } 2348da7f033dSHerbert Xu } 2349da7f033dSHerbert Xu }, { 2350da7f033dSHerbert Xu .alg = "cbc(des3_ede)", 23511aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2352a1915d51SJarod Wilson .fips_allowed = 1, 2353da7f033dSHerbert Xu .suite = { 2354da7f033dSHerbert Xu .cipher = { 2355da7f033dSHerbert Xu .enc = { 2356da7f033dSHerbert Xu .vecs = des3_ede_cbc_enc_tv_template, 2357da7f033dSHerbert Xu .count = DES3_EDE_CBC_ENC_TEST_VECTORS 2358da7f033dSHerbert Xu }, 2359da7f033dSHerbert Xu .dec = { 2360da7f033dSHerbert Xu .vecs = des3_ede_cbc_dec_tv_template, 2361da7f033dSHerbert Xu .count = DES3_EDE_CBC_DEC_TEST_VECTORS 2362da7f033dSHerbert Xu } 2363da7f033dSHerbert Xu } 2364da7f033dSHerbert Xu } 2365da7f033dSHerbert Xu }, { 23669d25917dSJussi Kivilinna .alg = "cbc(serpent)", 23679d25917dSJussi Kivilinna .test = alg_test_skcipher, 23689d25917dSJussi Kivilinna .suite = { 23699d25917dSJussi Kivilinna .cipher = { 23709d25917dSJussi Kivilinna .enc = { 23719d25917dSJussi Kivilinna .vecs = serpent_cbc_enc_tv_template, 23729d25917dSJussi Kivilinna .count = SERPENT_CBC_ENC_TEST_VECTORS 23739d25917dSJussi Kivilinna }, 23749d25917dSJussi Kivilinna .dec = { 23759d25917dSJussi Kivilinna .vecs = serpent_cbc_dec_tv_template, 23769d25917dSJussi Kivilinna .count = SERPENT_CBC_DEC_TEST_VECTORS 23779d25917dSJussi Kivilinna } 23789d25917dSJussi Kivilinna } 23799d25917dSJussi Kivilinna } 23809d25917dSJussi Kivilinna }, { 2381da7f033dSHerbert Xu .alg = "cbc(twofish)", 23821aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2383da7f033dSHerbert Xu .suite = { 2384da7f033dSHerbert Xu .cipher = { 2385da7f033dSHerbert Xu .enc = { 2386da7f033dSHerbert Xu .vecs = tf_cbc_enc_tv_template, 2387da7f033dSHerbert Xu .count = TF_CBC_ENC_TEST_VECTORS 2388da7f033dSHerbert Xu }, 2389da7f033dSHerbert Xu .dec = { 2390da7f033dSHerbert Xu .vecs = tf_cbc_dec_tv_template, 2391da7f033dSHerbert Xu .count = TF_CBC_DEC_TEST_VECTORS 2392da7f033dSHerbert Xu } 2393da7f033dSHerbert Xu } 2394da7f033dSHerbert Xu } 2395da7f033dSHerbert Xu }, { 2396da7f033dSHerbert Xu .alg = "ccm(aes)", 2397da7f033dSHerbert Xu .test = alg_test_aead, 2398a1915d51SJarod Wilson .fips_allowed = 1, 2399da7f033dSHerbert Xu .suite = { 2400da7f033dSHerbert Xu .aead = { 2401da7f033dSHerbert Xu .enc = { 2402da7f033dSHerbert Xu .vecs = aes_ccm_enc_tv_template, 2403da7f033dSHerbert Xu .count = AES_CCM_ENC_TEST_VECTORS 2404da7f033dSHerbert Xu }, 2405da7f033dSHerbert Xu .dec = { 2406da7f033dSHerbert Xu .vecs = aes_ccm_dec_tv_template, 2407da7f033dSHerbert Xu .count = AES_CCM_DEC_TEST_VECTORS 2408da7f033dSHerbert Xu } 2409da7f033dSHerbert Xu } 2410da7f033dSHerbert Xu } 2411da7f033dSHerbert Xu }, { 24123590ebf2SMartin Willi .alg = "chacha20", 24133590ebf2SMartin Willi .test = alg_test_skcipher, 24143590ebf2SMartin Willi .suite = { 24153590ebf2SMartin Willi .cipher = { 24163590ebf2SMartin Willi .enc = { 24173590ebf2SMartin Willi .vecs = chacha20_enc_tv_template, 24183590ebf2SMartin Willi .count = CHACHA20_ENC_TEST_VECTORS 24193590ebf2SMartin Willi }, 24203590ebf2SMartin Willi .dec = { 24213590ebf2SMartin Willi .vecs = chacha20_enc_tv_template, 24223590ebf2SMartin Willi .count = CHACHA20_ENC_TEST_VECTORS 24233590ebf2SMartin Willi }, 24243590ebf2SMartin Willi } 24253590ebf2SMartin Willi } 24263590ebf2SMartin Willi }, { 242793b5e86aSJussi Kivilinna .alg = "cmac(aes)", 24288f183751SStephan Mueller .fips_allowed = 1, 242993b5e86aSJussi Kivilinna .test = alg_test_hash, 243093b5e86aSJussi Kivilinna .suite = { 243193b5e86aSJussi Kivilinna .hash = { 243293b5e86aSJussi Kivilinna .vecs = aes_cmac128_tv_template, 243393b5e86aSJussi Kivilinna .count = CMAC_AES_TEST_VECTORS 243493b5e86aSJussi Kivilinna } 243593b5e86aSJussi Kivilinna } 243693b5e86aSJussi Kivilinna }, { 243793b5e86aSJussi Kivilinna .alg = "cmac(des3_ede)", 24388f183751SStephan Mueller .fips_allowed = 1, 243993b5e86aSJussi Kivilinna .test = alg_test_hash, 244093b5e86aSJussi Kivilinna .suite = { 244193b5e86aSJussi Kivilinna .hash = { 244293b5e86aSJussi Kivilinna .vecs = des3_ede_cmac64_tv_template, 244393b5e86aSJussi Kivilinna .count = CMAC_DES3_EDE_TEST_VECTORS 244493b5e86aSJussi Kivilinna } 244593b5e86aSJussi Kivilinna } 244693b5e86aSJussi Kivilinna }, { 2447e448370dSJussi Kivilinna .alg = "compress_null", 2448e448370dSJussi Kivilinna .test = alg_test_null, 2449e448370dSJussi Kivilinna }, { 2450ebb3472fSArd Biesheuvel .alg = "crc32", 2451ebb3472fSArd Biesheuvel .test = alg_test_hash, 2452ebb3472fSArd Biesheuvel .suite = { 2453ebb3472fSArd Biesheuvel .hash = { 2454ebb3472fSArd Biesheuvel .vecs = crc32_tv_template, 2455ebb3472fSArd Biesheuvel .count = CRC32_TEST_VECTORS 2456ebb3472fSArd Biesheuvel } 2457ebb3472fSArd Biesheuvel } 2458ebb3472fSArd Biesheuvel }, { 2459da7f033dSHerbert Xu .alg = "crc32c", 24608e3ee85eSHerbert Xu .test = alg_test_crc32c, 2461a1915d51SJarod Wilson .fips_allowed = 1, 2462da7f033dSHerbert Xu .suite = { 2463da7f033dSHerbert Xu .hash = { 2464da7f033dSHerbert Xu .vecs = crc32c_tv_template, 2465da7f033dSHerbert Xu .count = CRC32C_TEST_VECTORS 2466da7f033dSHerbert Xu } 2467da7f033dSHerbert Xu } 2468da7f033dSHerbert Xu }, { 246968411521SHerbert Xu .alg = "crct10dif", 247068411521SHerbert Xu .test = alg_test_hash, 247168411521SHerbert Xu .fips_allowed = 1, 247268411521SHerbert Xu .suite = { 247368411521SHerbert Xu .hash = { 247468411521SHerbert Xu .vecs = crct10dif_tv_template, 247568411521SHerbert Xu .count = CRCT10DIF_TEST_VECTORS 247668411521SHerbert Xu } 247768411521SHerbert Xu } 247868411521SHerbert Xu }, { 24796c79294fSMilan Broz .alg = "cryptd(__driver-cbc-aes-aesni)", 24806c79294fSMilan Broz .test = alg_test_null, 24816c79294fSMilan Broz .fips_allowed = 1, 24826c79294fSMilan Broz }, { 2483d9b1d2e7SJussi Kivilinna .alg = "cryptd(__driver-cbc-camellia-aesni)", 2484d9b1d2e7SJussi Kivilinna .test = alg_test_null, 2485d9b1d2e7SJussi Kivilinna }, { 2486f3f935a7SJussi Kivilinna .alg = "cryptd(__driver-cbc-camellia-aesni-avx2)", 2487f3f935a7SJussi Kivilinna .test = alg_test_null, 2488f3f935a7SJussi Kivilinna }, { 248956d76c96SJussi Kivilinna .alg = "cryptd(__driver-cbc-serpent-avx2)", 249056d76c96SJussi Kivilinna .test = alg_test_null, 249156d76c96SJussi Kivilinna }, { 2492863b557aSYouquan, Song .alg = "cryptd(__driver-ecb-aes-aesni)", 2493863b557aSYouquan, Song .test = alg_test_null, 24946c79294fSMilan Broz .fips_allowed = 1, 2495863b557aSYouquan, Song }, { 2496d9b1d2e7SJussi Kivilinna .alg = "cryptd(__driver-ecb-camellia-aesni)", 2497d9b1d2e7SJussi Kivilinna .test = alg_test_null, 2498d9b1d2e7SJussi Kivilinna }, { 2499f3f935a7SJussi Kivilinna .alg = "cryptd(__driver-ecb-camellia-aesni-avx2)", 2500f3f935a7SJussi Kivilinna .test = alg_test_null, 2501f3f935a7SJussi Kivilinna }, { 25024d6d6a2cSJohannes Goetzfried .alg = "cryptd(__driver-ecb-cast5-avx)", 25034d6d6a2cSJohannes Goetzfried .test = alg_test_null, 25044d6d6a2cSJohannes Goetzfried }, { 25054ea1277dSJohannes Goetzfried .alg = "cryptd(__driver-ecb-cast6-avx)", 25064ea1277dSJohannes Goetzfried .test = alg_test_null, 25074ea1277dSJohannes Goetzfried }, { 25087efe4076SJohannes Goetzfried .alg = "cryptd(__driver-ecb-serpent-avx)", 25097efe4076SJohannes Goetzfried .test = alg_test_null, 25107efe4076SJohannes Goetzfried }, { 251156d76c96SJussi Kivilinna .alg = "cryptd(__driver-ecb-serpent-avx2)", 251256d76c96SJussi Kivilinna .test = alg_test_null, 251356d76c96SJussi Kivilinna }, { 2514937c30d7SJussi Kivilinna .alg = "cryptd(__driver-ecb-serpent-sse2)", 2515937c30d7SJussi Kivilinna .test = alg_test_null, 2516937c30d7SJussi Kivilinna }, { 2517107778b5SJohannes Goetzfried .alg = "cryptd(__driver-ecb-twofish-avx)", 2518107778b5SJohannes Goetzfried .test = alg_test_null, 2519107778b5SJohannes Goetzfried }, { 25206c79294fSMilan Broz .alg = "cryptd(__driver-gcm-aes-aesni)", 25216c79294fSMilan Broz .test = alg_test_null, 25226c79294fSMilan Broz .fips_allowed = 1, 25236c79294fSMilan Broz }, { 2524863b557aSYouquan, Song .alg = "cryptd(__ghash-pclmulqdqni)", 2525863b557aSYouquan, Song .test = alg_test_null, 25266c79294fSMilan Broz .fips_allowed = 1, 2527863b557aSYouquan, Song }, { 2528f7cb80f2SJarod Wilson .alg = "ctr(aes)", 2529f7cb80f2SJarod Wilson .test = alg_test_skcipher, 2530a1915d51SJarod Wilson .fips_allowed = 1, 2531f7cb80f2SJarod Wilson .suite = { 2532f7cb80f2SJarod Wilson .cipher = { 2533f7cb80f2SJarod Wilson .enc = { 2534f7cb80f2SJarod Wilson .vecs = aes_ctr_enc_tv_template, 2535f7cb80f2SJarod Wilson .count = AES_CTR_ENC_TEST_VECTORS 2536f7cb80f2SJarod Wilson }, 2537f7cb80f2SJarod Wilson .dec = { 2538f7cb80f2SJarod Wilson .vecs = aes_ctr_dec_tv_template, 2539f7cb80f2SJarod Wilson .count = AES_CTR_DEC_TEST_VECTORS 2540f7cb80f2SJarod Wilson } 2541f7cb80f2SJarod Wilson } 2542f7cb80f2SJarod Wilson } 2543f7cb80f2SJarod Wilson }, { 254485b63e34SJussi Kivilinna .alg = "ctr(blowfish)", 254585b63e34SJussi Kivilinna .test = alg_test_skcipher, 254685b63e34SJussi Kivilinna .suite = { 254785b63e34SJussi Kivilinna .cipher = { 254885b63e34SJussi Kivilinna .enc = { 254985b63e34SJussi Kivilinna .vecs = bf_ctr_enc_tv_template, 255085b63e34SJussi Kivilinna .count = BF_CTR_ENC_TEST_VECTORS 255185b63e34SJussi Kivilinna }, 255285b63e34SJussi Kivilinna .dec = { 255385b63e34SJussi Kivilinna .vecs = bf_ctr_dec_tv_template, 255485b63e34SJussi Kivilinna .count = BF_CTR_DEC_TEST_VECTORS 255585b63e34SJussi Kivilinna } 255685b63e34SJussi Kivilinna } 255785b63e34SJussi Kivilinna } 255885b63e34SJussi Kivilinna }, { 25590840605eSJussi Kivilinna .alg = "ctr(camellia)", 25600840605eSJussi Kivilinna .test = alg_test_skcipher, 25610840605eSJussi Kivilinna .suite = { 25620840605eSJussi Kivilinna .cipher = { 25630840605eSJussi Kivilinna .enc = { 25640840605eSJussi Kivilinna .vecs = camellia_ctr_enc_tv_template, 25650840605eSJussi Kivilinna .count = CAMELLIA_CTR_ENC_TEST_VECTORS 25660840605eSJussi Kivilinna }, 25670840605eSJussi Kivilinna .dec = { 25680840605eSJussi Kivilinna .vecs = camellia_ctr_dec_tv_template, 25690840605eSJussi Kivilinna .count = CAMELLIA_CTR_DEC_TEST_VECTORS 25700840605eSJussi Kivilinna } 25710840605eSJussi Kivilinna } 25720840605eSJussi Kivilinna } 25730840605eSJussi Kivilinna }, { 2574a2c58260SJohannes Goetzfried .alg = "ctr(cast5)", 2575a2c58260SJohannes Goetzfried .test = alg_test_skcipher, 2576a2c58260SJohannes Goetzfried .suite = { 2577a2c58260SJohannes Goetzfried .cipher = { 2578a2c58260SJohannes Goetzfried .enc = { 2579a2c58260SJohannes Goetzfried .vecs = cast5_ctr_enc_tv_template, 2580a2c58260SJohannes Goetzfried .count = CAST5_CTR_ENC_TEST_VECTORS 2581a2c58260SJohannes Goetzfried }, 2582a2c58260SJohannes Goetzfried .dec = { 2583a2c58260SJohannes Goetzfried .vecs = cast5_ctr_dec_tv_template, 2584a2c58260SJohannes Goetzfried .count = CAST5_CTR_DEC_TEST_VECTORS 2585a2c58260SJohannes Goetzfried } 2586a2c58260SJohannes Goetzfried } 2587a2c58260SJohannes Goetzfried } 2588a2c58260SJohannes Goetzfried }, { 25899b8b0405SJohannes Goetzfried .alg = "ctr(cast6)", 25909b8b0405SJohannes Goetzfried .test = alg_test_skcipher, 25919b8b0405SJohannes Goetzfried .suite = { 25929b8b0405SJohannes Goetzfried .cipher = { 25939b8b0405SJohannes Goetzfried .enc = { 25949b8b0405SJohannes Goetzfried .vecs = cast6_ctr_enc_tv_template, 25959b8b0405SJohannes Goetzfried .count = CAST6_CTR_ENC_TEST_VECTORS 25969b8b0405SJohannes Goetzfried }, 25979b8b0405SJohannes Goetzfried .dec = { 25989b8b0405SJohannes Goetzfried .vecs = cast6_ctr_dec_tv_template, 25999b8b0405SJohannes Goetzfried .count = CAST6_CTR_DEC_TEST_VECTORS 26009b8b0405SJohannes Goetzfried } 26019b8b0405SJohannes Goetzfried } 26029b8b0405SJohannes Goetzfried } 26039b8b0405SJohannes Goetzfried }, { 26048163fc30SJussi Kivilinna .alg = "ctr(des)", 26058163fc30SJussi Kivilinna .test = alg_test_skcipher, 26068163fc30SJussi Kivilinna .suite = { 26078163fc30SJussi Kivilinna .cipher = { 26088163fc30SJussi Kivilinna .enc = { 26098163fc30SJussi Kivilinna .vecs = des_ctr_enc_tv_template, 26108163fc30SJussi Kivilinna .count = DES_CTR_ENC_TEST_VECTORS 26118163fc30SJussi Kivilinna }, 26128163fc30SJussi Kivilinna .dec = { 26138163fc30SJussi Kivilinna .vecs = des_ctr_dec_tv_template, 26148163fc30SJussi Kivilinna .count = DES_CTR_DEC_TEST_VECTORS 26158163fc30SJussi Kivilinna } 26168163fc30SJussi Kivilinna } 26178163fc30SJussi Kivilinna } 26188163fc30SJussi Kivilinna }, { 2619e080b17aSJussi Kivilinna .alg = "ctr(des3_ede)", 2620e080b17aSJussi Kivilinna .test = alg_test_skcipher, 2621e080b17aSJussi Kivilinna .suite = { 2622e080b17aSJussi Kivilinna .cipher = { 2623e080b17aSJussi Kivilinna .enc = { 2624e080b17aSJussi Kivilinna .vecs = des3_ede_ctr_enc_tv_template, 2625e080b17aSJussi Kivilinna .count = DES3_EDE_CTR_ENC_TEST_VECTORS 2626e080b17aSJussi Kivilinna }, 2627e080b17aSJussi Kivilinna .dec = { 2628e080b17aSJussi Kivilinna .vecs = des3_ede_ctr_dec_tv_template, 2629e080b17aSJussi Kivilinna .count = DES3_EDE_CTR_DEC_TEST_VECTORS 2630e080b17aSJussi Kivilinna } 2631e080b17aSJussi Kivilinna } 2632e080b17aSJussi Kivilinna } 2633e080b17aSJussi Kivilinna }, { 26349d25917dSJussi Kivilinna .alg = "ctr(serpent)", 26359d25917dSJussi Kivilinna .test = alg_test_skcipher, 26369d25917dSJussi Kivilinna .suite = { 26379d25917dSJussi Kivilinna .cipher = { 26389d25917dSJussi Kivilinna .enc = { 26399d25917dSJussi Kivilinna .vecs = serpent_ctr_enc_tv_template, 26409d25917dSJussi Kivilinna .count = SERPENT_CTR_ENC_TEST_VECTORS 26419d25917dSJussi Kivilinna }, 26429d25917dSJussi Kivilinna .dec = { 26439d25917dSJussi Kivilinna .vecs = serpent_ctr_dec_tv_template, 26449d25917dSJussi Kivilinna .count = SERPENT_CTR_DEC_TEST_VECTORS 26459d25917dSJussi Kivilinna } 26469d25917dSJussi Kivilinna } 26479d25917dSJussi Kivilinna } 26489d25917dSJussi Kivilinna }, { 2649573da620SJussi Kivilinna .alg = "ctr(twofish)", 2650573da620SJussi Kivilinna .test = alg_test_skcipher, 2651573da620SJussi Kivilinna .suite = { 2652573da620SJussi Kivilinna .cipher = { 2653573da620SJussi Kivilinna .enc = { 2654573da620SJussi Kivilinna .vecs = tf_ctr_enc_tv_template, 2655573da620SJussi Kivilinna .count = TF_CTR_ENC_TEST_VECTORS 2656573da620SJussi Kivilinna }, 2657573da620SJussi Kivilinna .dec = { 2658573da620SJussi Kivilinna .vecs = tf_ctr_dec_tv_template, 2659573da620SJussi Kivilinna .count = TF_CTR_DEC_TEST_VECTORS 2660573da620SJussi Kivilinna } 2661573da620SJussi Kivilinna } 2662573da620SJussi Kivilinna } 2663573da620SJussi Kivilinna }, { 2664da7f033dSHerbert Xu .alg = "cts(cbc(aes))", 26651aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2666da7f033dSHerbert Xu .suite = { 2667da7f033dSHerbert Xu .cipher = { 2668da7f033dSHerbert Xu .enc = { 2669da7f033dSHerbert Xu .vecs = cts_mode_enc_tv_template, 2670da7f033dSHerbert Xu .count = CTS_MODE_ENC_TEST_VECTORS 2671da7f033dSHerbert Xu }, 2672da7f033dSHerbert Xu .dec = { 2673da7f033dSHerbert Xu .vecs = cts_mode_dec_tv_template, 2674da7f033dSHerbert Xu .count = CTS_MODE_DEC_TEST_VECTORS 2675da7f033dSHerbert Xu } 2676da7f033dSHerbert Xu } 2677da7f033dSHerbert Xu } 2678da7f033dSHerbert Xu }, { 2679da7f033dSHerbert Xu .alg = "deflate", 2680da7f033dSHerbert Xu .test = alg_test_comp, 26810818904dSMilan Broz .fips_allowed = 1, 2682da7f033dSHerbert Xu .suite = { 2683da7f033dSHerbert Xu .comp = { 2684da7f033dSHerbert Xu .comp = { 2685da7f033dSHerbert Xu .vecs = deflate_comp_tv_template, 2686da7f033dSHerbert Xu .count = DEFLATE_COMP_TEST_VECTORS 2687da7f033dSHerbert Xu }, 2688da7f033dSHerbert Xu .decomp = { 2689da7f033dSHerbert Xu .vecs = deflate_decomp_tv_template, 2690da7f033dSHerbert Xu .count = DEFLATE_DECOMP_TEST_VECTORS 2691da7f033dSHerbert Xu } 2692da7f033dSHerbert Xu } 2693da7f033dSHerbert Xu } 2694da7f033dSHerbert Xu }, { 2695e448370dSJussi Kivilinna .alg = "digest_null", 2696e448370dSJussi Kivilinna .test = alg_test_null, 2697e448370dSJussi Kivilinna }, { 269864d1cdfbSStephan Mueller .alg = "drbg_nopr_ctr_aes128", 269964d1cdfbSStephan Mueller .test = alg_test_drbg, 270064d1cdfbSStephan Mueller .fips_allowed = 1, 270164d1cdfbSStephan Mueller .suite = { 270264d1cdfbSStephan Mueller .drbg = { 270364d1cdfbSStephan Mueller .vecs = drbg_nopr_ctr_aes128_tv_template, 270464d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_nopr_ctr_aes128_tv_template) 270564d1cdfbSStephan Mueller } 270664d1cdfbSStephan Mueller } 270764d1cdfbSStephan Mueller }, { 270864d1cdfbSStephan Mueller .alg = "drbg_nopr_ctr_aes192", 270964d1cdfbSStephan Mueller .test = alg_test_drbg, 271064d1cdfbSStephan Mueller .fips_allowed = 1, 271164d1cdfbSStephan Mueller .suite = { 271264d1cdfbSStephan Mueller .drbg = { 271364d1cdfbSStephan Mueller .vecs = drbg_nopr_ctr_aes192_tv_template, 271464d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_nopr_ctr_aes192_tv_template) 271564d1cdfbSStephan Mueller } 271664d1cdfbSStephan Mueller } 271764d1cdfbSStephan Mueller }, { 271864d1cdfbSStephan Mueller .alg = "drbg_nopr_ctr_aes256", 271964d1cdfbSStephan Mueller .test = alg_test_drbg, 272064d1cdfbSStephan Mueller .fips_allowed = 1, 272164d1cdfbSStephan Mueller .suite = { 272264d1cdfbSStephan Mueller .drbg = { 272364d1cdfbSStephan Mueller .vecs = drbg_nopr_ctr_aes256_tv_template, 272464d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_nopr_ctr_aes256_tv_template) 272564d1cdfbSStephan Mueller } 272664d1cdfbSStephan Mueller } 272764d1cdfbSStephan Mueller }, { 272864d1cdfbSStephan Mueller /* 272964d1cdfbSStephan Mueller * There is no need to specifically test the DRBG with every 273064d1cdfbSStephan Mueller * backend cipher -- covered by drbg_nopr_hmac_sha256 test 273164d1cdfbSStephan Mueller */ 273264d1cdfbSStephan Mueller .alg = "drbg_nopr_hmac_sha1", 273364d1cdfbSStephan Mueller .fips_allowed = 1, 273464d1cdfbSStephan Mueller .test = alg_test_null, 273564d1cdfbSStephan Mueller }, { 273664d1cdfbSStephan Mueller .alg = "drbg_nopr_hmac_sha256", 273764d1cdfbSStephan Mueller .test = alg_test_drbg, 273864d1cdfbSStephan Mueller .fips_allowed = 1, 273964d1cdfbSStephan Mueller .suite = { 274064d1cdfbSStephan Mueller .drbg = { 274164d1cdfbSStephan Mueller .vecs = drbg_nopr_hmac_sha256_tv_template, 274264d1cdfbSStephan Mueller .count = 274364d1cdfbSStephan Mueller ARRAY_SIZE(drbg_nopr_hmac_sha256_tv_template) 274464d1cdfbSStephan Mueller } 274564d1cdfbSStephan Mueller } 274664d1cdfbSStephan Mueller }, { 274764d1cdfbSStephan Mueller /* covered by drbg_nopr_hmac_sha256 test */ 274864d1cdfbSStephan Mueller .alg = "drbg_nopr_hmac_sha384", 274964d1cdfbSStephan Mueller .fips_allowed = 1, 275064d1cdfbSStephan Mueller .test = alg_test_null, 275164d1cdfbSStephan Mueller }, { 275264d1cdfbSStephan Mueller .alg = "drbg_nopr_hmac_sha512", 275364d1cdfbSStephan Mueller .test = alg_test_null, 275464d1cdfbSStephan Mueller .fips_allowed = 1, 275564d1cdfbSStephan Mueller }, { 275664d1cdfbSStephan Mueller .alg = "drbg_nopr_sha1", 275764d1cdfbSStephan Mueller .fips_allowed = 1, 275864d1cdfbSStephan Mueller .test = alg_test_null, 275964d1cdfbSStephan Mueller }, { 276064d1cdfbSStephan Mueller .alg = "drbg_nopr_sha256", 276164d1cdfbSStephan Mueller .test = alg_test_drbg, 276264d1cdfbSStephan Mueller .fips_allowed = 1, 276364d1cdfbSStephan Mueller .suite = { 276464d1cdfbSStephan Mueller .drbg = { 276564d1cdfbSStephan Mueller .vecs = drbg_nopr_sha256_tv_template, 276664d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_nopr_sha256_tv_template) 276764d1cdfbSStephan Mueller } 276864d1cdfbSStephan Mueller } 276964d1cdfbSStephan Mueller }, { 277064d1cdfbSStephan Mueller /* covered by drbg_nopr_sha256 test */ 277164d1cdfbSStephan Mueller .alg = "drbg_nopr_sha384", 277264d1cdfbSStephan Mueller .fips_allowed = 1, 277364d1cdfbSStephan Mueller .test = alg_test_null, 277464d1cdfbSStephan Mueller }, { 277564d1cdfbSStephan Mueller .alg = "drbg_nopr_sha512", 277664d1cdfbSStephan Mueller .fips_allowed = 1, 277764d1cdfbSStephan Mueller .test = alg_test_null, 277864d1cdfbSStephan Mueller }, { 277964d1cdfbSStephan Mueller .alg = "drbg_pr_ctr_aes128", 278064d1cdfbSStephan Mueller .test = alg_test_drbg, 278164d1cdfbSStephan Mueller .fips_allowed = 1, 278264d1cdfbSStephan Mueller .suite = { 278364d1cdfbSStephan Mueller .drbg = { 278464d1cdfbSStephan Mueller .vecs = drbg_pr_ctr_aes128_tv_template, 278564d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_pr_ctr_aes128_tv_template) 278664d1cdfbSStephan Mueller } 278764d1cdfbSStephan Mueller } 278864d1cdfbSStephan Mueller }, { 278964d1cdfbSStephan Mueller /* covered by drbg_pr_ctr_aes128 test */ 279064d1cdfbSStephan Mueller .alg = "drbg_pr_ctr_aes192", 279164d1cdfbSStephan Mueller .fips_allowed = 1, 279264d1cdfbSStephan Mueller .test = alg_test_null, 279364d1cdfbSStephan Mueller }, { 279464d1cdfbSStephan Mueller .alg = "drbg_pr_ctr_aes256", 279564d1cdfbSStephan Mueller .fips_allowed = 1, 279664d1cdfbSStephan Mueller .test = alg_test_null, 279764d1cdfbSStephan Mueller }, { 279864d1cdfbSStephan Mueller .alg = "drbg_pr_hmac_sha1", 279964d1cdfbSStephan Mueller .fips_allowed = 1, 280064d1cdfbSStephan Mueller .test = alg_test_null, 280164d1cdfbSStephan Mueller }, { 280264d1cdfbSStephan Mueller .alg = "drbg_pr_hmac_sha256", 280364d1cdfbSStephan Mueller .test = alg_test_drbg, 280464d1cdfbSStephan Mueller .fips_allowed = 1, 280564d1cdfbSStephan Mueller .suite = { 280664d1cdfbSStephan Mueller .drbg = { 280764d1cdfbSStephan Mueller .vecs = drbg_pr_hmac_sha256_tv_template, 280864d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_pr_hmac_sha256_tv_template) 280964d1cdfbSStephan Mueller } 281064d1cdfbSStephan Mueller } 281164d1cdfbSStephan Mueller }, { 281264d1cdfbSStephan Mueller /* covered by drbg_pr_hmac_sha256 test */ 281364d1cdfbSStephan Mueller .alg = "drbg_pr_hmac_sha384", 281464d1cdfbSStephan Mueller .fips_allowed = 1, 281564d1cdfbSStephan Mueller .test = alg_test_null, 281664d1cdfbSStephan Mueller }, { 281764d1cdfbSStephan Mueller .alg = "drbg_pr_hmac_sha512", 281864d1cdfbSStephan Mueller .test = alg_test_null, 281964d1cdfbSStephan Mueller .fips_allowed = 1, 282064d1cdfbSStephan Mueller }, { 282164d1cdfbSStephan Mueller .alg = "drbg_pr_sha1", 282264d1cdfbSStephan Mueller .fips_allowed = 1, 282364d1cdfbSStephan Mueller .test = alg_test_null, 282464d1cdfbSStephan Mueller }, { 282564d1cdfbSStephan Mueller .alg = "drbg_pr_sha256", 282664d1cdfbSStephan Mueller .test = alg_test_drbg, 282764d1cdfbSStephan Mueller .fips_allowed = 1, 282864d1cdfbSStephan Mueller .suite = { 282964d1cdfbSStephan Mueller .drbg = { 283064d1cdfbSStephan Mueller .vecs = drbg_pr_sha256_tv_template, 283164d1cdfbSStephan Mueller .count = ARRAY_SIZE(drbg_pr_sha256_tv_template) 283264d1cdfbSStephan Mueller } 283364d1cdfbSStephan Mueller } 283464d1cdfbSStephan Mueller }, { 283564d1cdfbSStephan Mueller /* covered by drbg_pr_sha256 test */ 283664d1cdfbSStephan Mueller .alg = "drbg_pr_sha384", 283764d1cdfbSStephan Mueller .fips_allowed = 1, 283864d1cdfbSStephan Mueller .test = alg_test_null, 283964d1cdfbSStephan Mueller }, { 284064d1cdfbSStephan Mueller .alg = "drbg_pr_sha512", 284164d1cdfbSStephan Mueller .fips_allowed = 1, 284264d1cdfbSStephan Mueller .test = alg_test_null, 284364d1cdfbSStephan Mueller }, { 2844863b557aSYouquan, Song .alg = "ecb(__aes-aesni)", 2845863b557aSYouquan, Song .test = alg_test_null, 28466c79294fSMilan Broz .fips_allowed = 1, 2847863b557aSYouquan, Song }, { 2848da7f033dSHerbert Xu .alg = "ecb(aes)", 28491aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2850a1915d51SJarod Wilson .fips_allowed = 1, 2851da7f033dSHerbert Xu .suite = { 2852da7f033dSHerbert Xu .cipher = { 2853da7f033dSHerbert Xu .enc = { 2854da7f033dSHerbert Xu .vecs = aes_enc_tv_template, 2855da7f033dSHerbert Xu .count = AES_ENC_TEST_VECTORS 2856da7f033dSHerbert Xu }, 2857da7f033dSHerbert Xu .dec = { 2858da7f033dSHerbert Xu .vecs = aes_dec_tv_template, 2859da7f033dSHerbert Xu .count = AES_DEC_TEST_VECTORS 2860da7f033dSHerbert Xu } 2861da7f033dSHerbert Xu } 2862da7f033dSHerbert Xu } 2863da7f033dSHerbert Xu }, { 2864da7f033dSHerbert Xu .alg = "ecb(anubis)", 28651aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2866da7f033dSHerbert Xu .suite = { 2867da7f033dSHerbert Xu .cipher = { 2868da7f033dSHerbert Xu .enc = { 2869da7f033dSHerbert Xu .vecs = anubis_enc_tv_template, 2870da7f033dSHerbert Xu .count = ANUBIS_ENC_TEST_VECTORS 2871da7f033dSHerbert Xu }, 2872da7f033dSHerbert Xu .dec = { 2873da7f033dSHerbert Xu .vecs = anubis_dec_tv_template, 2874da7f033dSHerbert Xu .count = ANUBIS_DEC_TEST_VECTORS 2875da7f033dSHerbert Xu } 2876da7f033dSHerbert Xu } 2877da7f033dSHerbert Xu } 2878da7f033dSHerbert Xu }, { 2879da7f033dSHerbert Xu .alg = "ecb(arc4)", 28801aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2881da7f033dSHerbert Xu .suite = { 2882da7f033dSHerbert Xu .cipher = { 2883da7f033dSHerbert Xu .enc = { 2884da7f033dSHerbert Xu .vecs = arc4_enc_tv_template, 2885da7f033dSHerbert Xu .count = ARC4_ENC_TEST_VECTORS 2886da7f033dSHerbert Xu }, 2887da7f033dSHerbert Xu .dec = { 2888da7f033dSHerbert Xu .vecs = arc4_dec_tv_template, 2889da7f033dSHerbert Xu .count = ARC4_DEC_TEST_VECTORS 2890da7f033dSHerbert Xu } 2891da7f033dSHerbert Xu } 2892da7f033dSHerbert Xu } 2893da7f033dSHerbert Xu }, { 2894da7f033dSHerbert Xu .alg = "ecb(blowfish)", 28951aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2896da7f033dSHerbert Xu .suite = { 2897da7f033dSHerbert Xu .cipher = { 2898da7f033dSHerbert Xu .enc = { 2899da7f033dSHerbert Xu .vecs = bf_enc_tv_template, 2900da7f033dSHerbert Xu .count = BF_ENC_TEST_VECTORS 2901da7f033dSHerbert Xu }, 2902da7f033dSHerbert Xu .dec = { 2903da7f033dSHerbert Xu .vecs = bf_dec_tv_template, 2904da7f033dSHerbert Xu .count = BF_DEC_TEST_VECTORS 2905da7f033dSHerbert Xu } 2906da7f033dSHerbert Xu } 2907da7f033dSHerbert Xu } 2908da7f033dSHerbert Xu }, { 2909da7f033dSHerbert Xu .alg = "ecb(camellia)", 29101aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2911da7f033dSHerbert Xu .suite = { 2912da7f033dSHerbert Xu .cipher = { 2913da7f033dSHerbert Xu .enc = { 2914da7f033dSHerbert Xu .vecs = camellia_enc_tv_template, 2915da7f033dSHerbert Xu .count = CAMELLIA_ENC_TEST_VECTORS 2916da7f033dSHerbert Xu }, 2917da7f033dSHerbert Xu .dec = { 2918da7f033dSHerbert Xu .vecs = camellia_dec_tv_template, 2919da7f033dSHerbert Xu .count = CAMELLIA_DEC_TEST_VECTORS 2920da7f033dSHerbert Xu } 2921da7f033dSHerbert Xu } 2922da7f033dSHerbert Xu } 2923da7f033dSHerbert Xu }, { 2924da7f033dSHerbert Xu .alg = "ecb(cast5)", 29251aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2926da7f033dSHerbert Xu .suite = { 2927da7f033dSHerbert Xu .cipher = { 2928da7f033dSHerbert Xu .enc = { 2929da7f033dSHerbert Xu .vecs = cast5_enc_tv_template, 2930da7f033dSHerbert Xu .count = CAST5_ENC_TEST_VECTORS 2931da7f033dSHerbert Xu }, 2932da7f033dSHerbert Xu .dec = { 2933da7f033dSHerbert Xu .vecs = cast5_dec_tv_template, 2934da7f033dSHerbert Xu .count = CAST5_DEC_TEST_VECTORS 2935da7f033dSHerbert Xu } 2936da7f033dSHerbert Xu } 2937da7f033dSHerbert Xu } 2938da7f033dSHerbert Xu }, { 2939da7f033dSHerbert Xu .alg = "ecb(cast6)", 29401aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2941da7f033dSHerbert Xu .suite = { 2942da7f033dSHerbert Xu .cipher = { 2943da7f033dSHerbert Xu .enc = { 2944da7f033dSHerbert Xu .vecs = cast6_enc_tv_template, 2945da7f033dSHerbert Xu .count = CAST6_ENC_TEST_VECTORS 2946da7f033dSHerbert Xu }, 2947da7f033dSHerbert Xu .dec = { 2948da7f033dSHerbert Xu .vecs = cast6_dec_tv_template, 2949da7f033dSHerbert Xu .count = CAST6_DEC_TEST_VECTORS 2950da7f033dSHerbert Xu } 2951da7f033dSHerbert Xu } 2952da7f033dSHerbert Xu } 2953da7f033dSHerbert Xu }, { 2954e448370dSJussi Kivilinna .alg = "ecb(cipher_null)", 2955e448370dSJussi Kivilinna .test = alg_test_null, 2956e448370dSJussi Kivilinna }, { 2957da7f033dSHerbert Xu .alg = "ecb(des)", 29581aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2959da7f033dSHerbert Xu .suite = { 2960da7f033dSHerbert Xu .cipher = { 2961da7f033dSHerbert Xu .enc = { 2962da7f033dSHerbert Xu .vecs = des_enc_tv_template, 2963da7f033dSHerbert Xu .count = DES_ENC_TEST_VECTORS 2964da7f033dSHerbert Xu }, 2965da7f033dSHerbert Xu .dec = { 2966da7f033dSHerbert Xu .vecs = des_dec_tv_template, 2967da7f033dSHerbert Xu .count = DES_DEC_TEST_VECTORS 2968da7f033dSHerbert Xu } 2969da7f033dSHerbert Xu } 2970da7f033dSHerbert Xu } 2971da7f033dSHerbert Xu }, { 2972da7f033dSHerbert Xu .alg = "ecb(des3_ede)", 29731aa4ecd9SHerbert Xu .test = alg_test_skcipher, 2974a1915d51SJarod Wilson .fips_allowed = 1, 2975da7f033dSHerbert Xu .suite = { 2976da7f033dSHerbert Xu .cipher = { 2977da7f033dSHerbert Xu .enc = { 2978da7f033dSHerbert Xu .vecs = des3_ede_enc_tv_template, 2979da7f033dSHerbert Xu .count = DES3_EDE_ENC_TEST_VECTORS 2980da7f033dSHerbert Xu }, 2981da7f033dSHerbert Xu .dec = { 2982da7f033dSHerbert Xu .vecs = des3_ede_dec_tv_template, 2983da7f033dSHerbert Xu .count = DES3_EDE_DEC_TEST_VECTORS 2984da7f033dSHerbert Xu } 2985da7f033dSHerbert Xu } 2986da7f033dSHerbert Xu } 2987da7f033dSHerbert Xu }, { 298866e5bd00SJussi Kivilinna .alg = "ecb(fcrypt)", 298966e5bd00SJussi Kivilinna .test = alg_test_skcipher, 299066e5bd00SJussi Kivilinna .suite = { 299166e5bd00SJussi Kivilinna .cipher = { 299266e5bd00SJussi Kivilinna .enc = { 299366e5bd00SJussi Kivilinna .vecs = fcrypt_pcbc_enc_tv_template, 299466e5bd00SJussi Kivilinna .count = 1 299566e5bd00SJussi Kivilinna }, 299666e5bd00SJussi Kivilinna .dec = { 299766e5bd00SJussi Kivilinna .vecs = fcrypt_pcbc_dec_tv_template, 299866e5bd00SJussi Kivilinna .count = 1 299966e5bd00SJussi Kivilinna } 300066e5bd00SJussi Kivilinna } 300166e5bd00SJussi Kivilinna } 300266e5bd00SJussi Kivilinna }, { 3003da7f033dSHerbert Xu .alg = "ecb(khazad)", 30041aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3005da7f033dSHerbert Xu .suite = { 3006da7f033dSHerbert Xu .cipher = { 3007da7f033dSHerbert Xu .enc = { 3008da7f033dSHerbert Xu .vecs = khazad_enc_tv_template, 3009da7f033dSHerbert Xu .count = KHAZAD_ENC_TEST_VECTORS 3010da7f033dSHerbert Xu }, 3011da7f033dSHerbert Xu .dec = { 3012da7f033dSHerbert Xu .vecs = khazad_dec_tv_template, 3013da7f033dSHerbert Xu .count = KHAZAD_DEC_TEST_VECTORS 3014da7f033dSHerbert Xu } 3015da7f033dSHerbert Xu } 3016da7f033dSHerbert Xu } 3017da7f033dSHerbert Xu }, { 3018da7f033dSHerbert Xu .alg = "ecb(seed)", 30191aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3020da7f033dSHerbert Xu .suite = { 3021da7f033dSHerbert Xu .cipher = { 3022da7f033dSHerbert Xu .enc = { 3023da7f033dSHerbert Xu .vecs = seed_enc_tv_template, 3024da7f033dSHerbert Xu .count = SEED_ENC_TEST_VECTORS 3025da7f033dSHerbert Xu }, 3026da7f033dSHerbert Xu .dec = { 3027da7f033dSHerbert Xu .vecs = seed_dec_tv_template, 3028da7f033dSHerbert Xu .count = SEED_DEC_TEST_VECTORS 3029da7f033dSHerbert Xu } 3030da7f033dSHerbert Xu } 3031da7f033dSHerbert Xu } 3032da7f033dSHerbert Xu }, { 3033da7f033dSHerbert Xu .alg = "ecb(serpent)", 30341aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3035da7f033dSHerbert Xu .suite = { 3036da7f033dSHerbert Xu .cipher = { 3037da7f033dSHerbert Xu .enc = { 3038da7f033dSHerbert Xu .vecs = serpent_enc_tv_template, 3039da7f033dSHerbert Xu .count = SERPENT_ENC_TEST_VECTORS 3040da7f033dSHerbert Xu }, 3041da7f033dSHerbert Xu .dec = { 3042da7f033dSHerbert Xu .vecs = serpent_dec_tv_template, 3043da7f033dSHerbert Xu .count = SERPENT_DEC_TEST_VECTORS 3044da7f033dSHerbert Xu } 3045da7f033dSHerbert Xu } 3046da7f033dSHerbert Xu } 3047da7f033dSHerbert Xu }, { 3048da7f033dSHerbert Xu .alg = "ecb(tea)", 30491aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3050da7f033dSHerbert Xu .suite = { 3051da7f033dSHerbert Xu .cipher = { 3052da7f033dSHerbert Xu .enc = { 3053da7f033dSHerbert Xu .vecs = tea_enc_tv_template, 3054da7f033dSHerbert Xu .count = TEA_ENC_TEST_VECTORS 3055da7f033dSHerbert Xu }, 3056da7f033dSHerbert Xu .dec = { 3057da7f033dSHerbert Xu .vecs = tea_dec_tv_template, 3058da7f033dSHerbert Xu .count = TEA_DEC_TEST_VECTORS 3059da7f033dSHerbert Xu } 3060da7f033dSHerbert Xu } 3061da7f033dSHerbert Xu } 3062da7f033dSHerbert Xu }, { 3063da7f033dSHerbert Xu .alg = "ecb(tnepres)", 30641aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3065da7f033dSHerbert Xu .suite = { 3066da7f033dSHerbert Xu .cipher = { 3067da7f033dSHerbert Xu .enc = { 3068da7f033dSHerbert Xu .vecs = tnepres_enc_tv_template, 3069da7f033dSHerbert Xu .count = TNEPRES_ENC_TEST_VECTORS 3070da7f033dSHerbert Xu }, 3071da7f033dSHerbert Xu .dec = { 3072da7f033dSHerbert Xu .vecs = tnepres_dec_tv_template, 3073da7f033dSHerbert Xu .count = TNEPRES_DEC_TEST_VECTORS 3074da7f033dSHerbert Xu } 3075da7f033dSHerbert Xu } 3076da7f033dSHerbert Xu } 3077da7f033dSHerbert Xu }, { 3078da7f033dSHerbert Xu .alg = "ecb(twofish)", 30791aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3080da7f033dSHerbert Xu .suite = { 3081da7f033dSHerbert Xu .cipher = { 3082da7f033dSHerbert Xu .enc = { 3083da7f033dSHerbert Xu .vecs = tf_enc_tv_template, 3084da7f033dSHerbert Xu .count = TF_ENC_TEST_VECTORS 3085da7f033dSHerbert Xu }, 3086da7f033dSHerbert Xu .dec = { 3087da7f033dSHerbert Xu .vecs = tf_dec_tv_template, 3088da7f033dSHerbert Xu .count = TF_DEC_TEST_VECTORS 3089da7f033dSHerbert Xu } 3090da7f033dSHerbert Xu } 3091da7f033dSHerbert Xu } 3092da7f033dSHerbert Xu }, { 3093da7f033dSHerbert Xu .alg = "ecb(xeta)", 30941aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3095da7f033dSHerbert Xu .suite = { 3096da7f033dSHerbert Xu .cipher = { 3097da7f033dSHerbert Xu .enc = { 3098da7f033dSHerbert Xu .vecs = xeta_enc_tv_template, 3099da7f033dSHerbert Xu .count = XETA_ENC_TEST_VECTORS 3100da7f033dSHerbert Xu }, 3101da7f033dSHerbert Xu .dec = { 3102da7f033dSHerbert Xu .vecs = xeta_dec_tv_template, 3103da7f033dSHerbert Xu .count = XETA_DEC_TEST_VECTORS 3104da7f033dSHerbert Xu } 3105da7f033dSHerbert Xu } 3106da7f033dSHerbert Xu } 3107da7f033dSHerbert Xu }, { 3108da7f033dSHerbert Xu .alg = "ecb(xtea)", 31091aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3110da7f033dSHerbert Xu .suite = { 3111da7f033dSHerbert Xu .cipher = { 3112da7f033dSHerbert Xu .enc = { 3113da7f033dSHerbert Xu .vecs = xtea_enc_tv_template, 3114da7f033dSHerbert Xu .count = XTEA_ENC_TEST_VECTORS 3115da7f033dSHerbert Xu }, 3116da7f033dSHerbert Xu .dec = { 3117da7f033dSHerbert Xu .vecs = xtea_dec_tv_template, 3118da7f033dSHerbert Xu .count = XTEA_DEC_TEST_VECTORS 3119da7f033dSHerbert Xu } 3120da7f033dSHerbert Xu } 3121da7f033dSHerbert Xu } 3122da7f033dSHerbert Xu }, { 3123da7f033dSHerbert Xu .alg = "gcm(aes)", 3124da7f033dSHerbert Xu .test = alg_test_aead, 3125a1915d51SJarod Wilson .fips_allowed = 1, 3126da7f033dSHerbert Xu .suite = { 3127da7f033dSHerbert Xu .aead = { 3128da7f033dSHerbert Xu .enc = { 3129da7f033dSHerbert Xu .vecs = aes_gcm_enc_tv_template, 3130da7f033dSHerbert Xu .count = AES_GCM_ENC_TEST_VECTORS 3131da7f033dSHerbert Xu }, 3132da7f033dSHerbert Xu .dec = { 3133da7f033dSHerbert Xu .vecs = aes_gcm_dec_tv_template, 3134da7f033dSHerbert Xu .count = AES_GCM_DEC_TEST_VECTORS 3135da7f033dSHerbert Xu } 3136da7f033dSHerbert Xu } 3137da7f033dSHerbert Xu } 3138da7f033dSHerbert Xu }, { 3139507069c9SYouquan, Song .alg = "ghash", 3140507069c9SYouquan, Song .test = alg_test_hash, 314118c0ebd2SJarod Wilson .fips_allowed = 1, 3142507069c9SYouquan, Song .suite = { 3143507069c9SYouquan, Song .hash = { 3144507069c9SYouquan, Song .vecs = ghash_tv_template, 3145507069c9SYouquan, Song .count = GHASH_TEST_VECTORS 3146507069c9SYouquan, Song } 3147507069c9SYouquan, Song } 3148507069c9SYouquan, Song }, { 3149a482b081SSonic Zhang .alg = "hmac(crc32)", 3150a482b081SSonic Zhang .test = alg_test_hash, 3151a482b081SSonic Zhang .suite = { 3152a482b081SSonic Zhang .hash = { 3153a482b081SSonic Zhang .vecs = bfin_crc_tv_template, 3154a482b081SSonic Zhang .count = BFIN_CRC_TEST_VECTORS 3155a482b081SSonic Zhang } 3156a482b081SSonic Zhang } 3157a482b081SSonic Zhang }, { 3158da7f033dSHerbert Xu .alg = "hmac(md5)", 3159da7f033dSHerbert Xu .test = alg_test_hash, 3160da7f033dSHerbert Xu .suite = { 3161da7f033dSHerbert Xu .hash = { 3162da7f033dSHerbert Xu .vecs = hmac_md5_tv_template, 3163da7f033dSHerbert Xu .count = HMAC_MD5_TEST_VECTORS 3164da7f033dSHerbert Xu } 3165da7f033dSHerbert Xu } 3166da7f033dSHerbert Xu }, { 3167da7f033dSHerbert Xu .alg = "hmac(rmd128)", 3168da7f033dSHerbert Xu .test = alg_test_hash, 3169da7f033dSHerbert Xu .suite = { 3170da7f033dSHerbert Xu .hash = { 3171da7f033dSHerbert Xu .vecs = hmac_rmd128_tv_template, 3172da7f033dSHerbert Xu .count = HMAC_RMD128_TEST_VECTORS 3173da7f033dSHerbert Xu } 3174da7f033dSHerbert Xu } 3175da7f033dSHerbert Xu }, { 3176da7f033dSHerbert Xu .alg = "hmac(rmd160)", 3177da7f033dSHerbert Xu .test = alg_test_hash, 3178da7f033dSHerbert Xu .suite = { 3179da7f033dSHerbert Xu .hash = { 3180da7f033dSHerbert Xu .vecs = hmac_rmd160_tv_template, 3181da7f033dSHerbert Xu .count = HMAC_RMD160_TEST_VECTORS 3182da7f033dSHerbert Xu } 3183da7f033dSHerbert Xu } 3184da7f033dSHerbert Xu }, { 3185da7f033dSHerbert Xu .alg = "hmac(sha1)", 3186da7f033dSHerbert Xu .test = alg_test_hash, 3187a1915d51SJarod Wilson .fips_allowed = 1, 3188da7f033dSHerbert Xu .suite = { 3189da7f033dSHerbert Xu .hash = { 3190da7f033dSHerbert Xu .vecs = hmac_sha1_tv_template, 3191da7f033dSHerbert Xu .count = HMAC_SHA1_TEST_VECTORS 3192da7f033dSHerbert Xu } 3193da7f033dSHerbert Xu } 3194da7f033dSHerbert Xu }, { 3195da7f033dSHerbert Xu .alg = "hmac(sha224)", 3196da7f033dSHerbert Xu .test = alg_test_hash, 3197a1915d51SJarod Wilson .fips_allowed = 1, 3198da7f033dSHerbert Xu .suite = { 3199da7f033dSHerbert Xu .hash = { 3200da7f033dSHerbert Xu .vecs = hmac_sha224_tv_template, 3201da7f033dSHerbert Xu .count = HMAC_SHA224_TEST_VECTORS 3202da7f033dSHerbert Xu } 3203da7f033dSHerbert Xu } 3204da7f033dSHerbert Xu }, { 3205da7f033dSHerbert Xu .alg = "hmac(sha256)", 3206da7f033dSHerbert Xu .test = alg_test_hash, 3207a1915d51SJarod Wilson .fips_allowed = 1, 3208da7f033dSHerbert Xu .suite = { 3209da7f033dSHerbert Xu .hash = { 3210da7f033dSHerbert Xu .vecs = hmac_sha256_tv_template, 3211da7f033dSHerbert Xu .count = HMAC_SHA256_TEST_VECTORS 3212da7f033dSHerbert Xu } 3213da7f033dSHerbert Xu } 3214da7f033dSHerbert Xu }, { 3215da7f033dSHerbert Xu .alg = "hmac(sha384)", 3216da7f033dSHerbert Xu .test = alg_test_hash, 3217a1915d51SJarod Wilson .fips_allowed = 1, 3218da7f033dSHerbert Xu .suite = { 3219da7f033dSHerbert Xu .hash = { 3220da7f033dSHerbert Xu .vecs = hmac_sha384_tv_template, 3221da7f033dSHerbert Xu .count = HMAC_SHA384_TEST_VECTORS 3222da7f033dSHerbert Xu } 3223da7f033dSHerbert Xu } 3224da7f033dSHerbert Xu }, { 3225da7f033dSHerbert Xu .alg = "hmac(sha512)", 3226da7f033dSHerbert Xu .test = alg_test_hash, 3227a1915d51SJarod Wilson .fips_allowed = 1, 3228da7f033dSHerbert Xu .suite = { 3229da7f033dSHerbert Xu .hash = { 3230da7f033dSHerbert Xu .vecs = hmac_sha512_tv_template, 3231da7f033dSHerbert Xu .count = HMAC_SHA512_TEST_VECTORS 3232da7f033dSHerbert Xu } 3233da7f033dSHerbert Xu } 3234da7f033dSHerbert Xu }, { 3235bb5530e4SStephan Mueller .alg = "jitterentropy_rng", 3236bb5530e4SStephan Mueller .fips_allowed = 1, 3237bb5530e4SStephan Mueller .test = alg_test_null, 3238bb5530e4SStephan Mueller }, { 323935351988SStephan Mueller .alg = "kw(aes)", 324035351988SStephan Mueller .test = alg_test_skcipher, 324135351988SStephan Mueller .fips_allowed = 1, 324235351988SStephan Mueller .suite = { 324335351988SStephan Mueller .cipher = { 324435351988SStephan Mueller .enc = { 324535351988SStephan Mueller .vecs = aes_kw_enc_tv_template, 324635351988SStephan Mueller .count = ARRAY_SIZE(aes_kw_enc_tv_template) 324735351988SStephan Mueller }, 324835351988SStephan Mueller .dec = { 324935351988SStephan Mueller .vecs = aes_kw_dec_tv_template, 325035351988SStephan Mueller .count = ARRAY_SIZE(aes_kw_dec_tv_template) 325135351988SStephan Mueller } 325235351988SStephan Mueller } 325335351988SStephan Mueller } 325435351988SStephan Mueller }, { 3255da7f033dSHerbert Xu .alg = "lrw(aes)", 32561aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3257da7f033dSHerbert Xu .suite = { 3258da7f033dSHerbert Xu .cipher = { 3259da7f033dSHerbert Xu .enc = { 3260da7f033dSHerbert Xu .vecs = aes_lrw_enc_tv_template, 3261da7f033dSHerbert Xu .count = AES_LRW_ENC_TEST_VECTORS 3262da7f033dSHerbert Xu }, 3263da7f033dSHerbert Xu .dec = { 3264da7f033dSHerbert Xu .vecs = aes_lrw_dec_tv_template, 3265da7f033dSHerbert Xu .count = AES_LRW_DEC_TEST_VECTORS 3266da7f033dSHerbert Xu } 3267da7f033dSHerbert Xu } 3268da7f033dSHerbert Xu } 3269da7f033dSHerbert Xu }, { 32700840605eSJussi Kivilinna .alg = "lrw(camellia)", 32710840605eSJussi Kivilinna .test = alg_test_skcipher, 32720840605eSJussi Kivilinna .suite = { 32730840605eSJussi Kivilinna .cipher = { 32740840605eSJussi Kivilinna .enc = { 32750840605eSJussi Kivilinna .vecs = camellia_lrw_enc_tv_template, 32760840605eSJussi Kivilinna .count = CAMELLIA_LRW_ENC_TEST_VECTORS 32770840605eSJussi Kivilinna }, 32780840605eSJussi Kivilinna .dec = { 32790840605eSJussi Kivilinna .vecs = camellia_lrw_dec_tv_template, 32800840605eSJussi Kivilinna .count = CAMELLIA_LRW_DEC_TEST_VECTORS 32810840605eSJussi Kivilinna } 32820840605eSJussi Kivilinna } 32830840605eSJussi Kivilinna } 32840840605eSJussi Kivilinna }, { 32859b8b0405SJohannes Goetzfried .alg = "lrw(cast6)", 32869b8b0405SJohannes Goetzfried .test = alg_test_skcipher, 32879b8b0405SJohannes Goetzfried .suite = { 32889b8b0405SJohannes Goetzfried .cipher = { 32899b8b0405SJohannes Goetzfried .enc = { 32909b8b0405SJohannes Goetzfried .vecs = cast6_lrw_enc_tv_template, 32919b8b0405SJohannes Goetzfried .count = CAST6_LRW_ENC_TEST_VECTORS 32929b8b0405SJohannes Goetzfried }, 32939b8b0405SJohannes Goetzfried .dec = { 32949b8b0405SJohannes Goetzfried .vecs = cast6_lrw_dec_tv_template, 32959b8b0405SJohannes Goetzfried .count = CAST6_LRW_DEC_TEST_VECTORS 32969b8b0405SJohannes Goetzfried } 32979b8b0405SJohannes Goetzfried } 32989b8b0405SJohannes Goetzfried } 32999b8b0405SJohannes Goetzfried }, { 3300d7bfc0faSJussi Kivilinna .alg = "lrw(serpent)", 3301d7bfc0faSJussi Kivilinna .test = alg_test_skcipher, 3302d7bfc0faSJussi Kivilinna .suite = { 3303d7bfc0faSJussi Kivilinna .cipher = { 3304d7bfc0faSJussi Kivilinna .enc = { 3305d7bfc0faSJussi Kivilinna .vecs = serpent_lrw_enc_tv_template, 3306d7bfc0faSJussi Kivilinna .count = SERPENT_LRW_ENC_TEST_VECTORS 3307d7bfc0faSJussi Kivilinna }, 3308d7bfc0faSJussi Kivilinna .dec = { 3309d7bfc0faSJussi Kivilinna .vecs = serpent_lrw_dec_tv_template, 3310d7bfc0faSJussi Kivilinna .count = SERPENT_LRW_DEC_TEST_VECTORS 3311d7bfc0faSJussi Kivilinna } 3312d7bfc0faSJussi Kivilinna } 3313d7bfc0faSJussi Kivilinna } 3314d7bfc0faSJussi Kivilinna }, { 33150b2a1551SJussi Kivilinna .alg = "lrw(twofish)", 33160b2a1551SJussi Kivilinna .test = alg_test_skcipher, 33170b2a1551SJussi Kivilinna .suite = { 33180b2a1551SJussi Kivilinna .cipher = { 33190b2a1551SJussi Kivilinna .enc = { 33200b2a1551SJussi Kivilinna .vecs = tf_lrw_enc_tv_template, 33210b2a1551SJussi Kivilinna .count = TF_LRW_ENC_TEST_VECTORS 33220b2a1551SJussi Kivilinna }, 33230b2a1551SJussi Kivilinna .dec = { 33240b2a1551SJussi Kivilinna .vecs = tf_lrw_dec_tv_template, 33250b2a1551SJussi Kivilinna .count = TF_LRW_DEC_TEST_VECTORS 33260b2a1551SJussi Kivilinna } 33270b2a1551SJussi Kivilinna } 33280b2a1551SJussi Kivilinna } 33290b2a1551SJussi Kivilinna }, { 33301443cc9bSKOVACS Krisztian .alg = "lz4", 33311443cc9bSKOVACS Krisztian .test = alg_test_comp, 33321443cc9bSKOVACS Krisztian .fips_allowed = 1, 33331443cc9bSKOVACS Krisztian .suite = { 33341443cc9bSKOVACS Krisztian .comp = { 33351443cc9bSKOVACS Krisztian .comp = { 33361443cc9bSKOVACS Krisztian .vecs = lz4_comp_tv_template, 33371443cc9bSKOVACS Krisztian .count = LZ4_COMP_TEST_VECTORS 33381443cc9bSKOVACS Krisztian }, 33391443cc9bSKOVACS Krisztian .decomp = { 33401443cc9bSKOVACS Krisztian .vecs = lz4_decomp_tv_template, 33411443cc9bSKOVACS Krisztian .count = LZ4_DECOMP_TEST_VECTORS 33421443cc9bSKOVACS Krisztian } 33431443cc9bSKOVACS Krisztian } 33441443cc9bSKOVACS Krisztian } 33451443cc9bSKOVACS Krisztian }, { 33461443cc9bSKOVACS Krisztian .alg = "lz4hc", 33471443cc9bSKOVACS Krisztian .test = alg_test_comp, 33481443cc9bSKOVACS Krisztian .fips_allowed = 1, 33491443cc9bSKOVACS Krisztian .suite = { 33501443cc9bSKOVACS Krisztian .comp = { 33511443cc9bSKOVACS Krisztian .comp = { 33521443cc9bSKOVACS Krisztian .vecs = lz4hc_comp_tv_template, 33531443cc9bSKOVACS Krisztian .count = LZ4HC_COMP_TEST_VECTORS 33541443cc9bSKOVACS Krisztian }, 33551443cc9bSKOVACS Krisztian .decomp = { 33561443cc9bSKOVACS Krisztian .vecs = lz4hc_decomp_tv_template, 33571443cc9bSKOVACS Krisztian .count = LZ4HC_DECOMP_TEST_VECTORS 33581443cc9bSKOVACS Krisztian } 33591443cc9bSKOVACS Krisztian } 33601443cc9bSKOVACS Krisztian } 33611443cc9bSKOVACS Krisztian }, { 3362da7f033dSHerbert Xu .alg = "lzo", 3363da7f033dSHerbert Xu .test = alg_test_comp, 33640818904dSMilan Broz .fips_allowed = 1, 3365da7f033dSHerbert Xu .suite = { 3366da7f033dSHerbert Xu .comp = { 3367da7f033dSHerbert Xu .comp = { 3368da7f033dSHerbert Xu .vecs = lzo_comp_tv_template, 3369da7f033dSHerbert Xu .count = LZO_COMP_TEST_VECTORS 3370da7f033dSHerbert Xu }, 3371da7f033dSHerbert Xu .decomp = { 3372da7f033dSHerbert Xu .vecs = lzo_decomp_tv_template, 3373da7f033dSHerbert Xu .count = LZO_DECOMP_TEST_VECTORS 3374da7f033dSHerbert Xu } 3375da7f033dSHerbert Xu } 3376da7f033dSHerbert Xu } 3377da7f033dSHerbert Xu }, { 3378da7f033dSHerbert Xu .alg = "md4", 3379da7f033dSHerbert Xu .test = alg_test_hash, 3380da7f033dSHerbert Xu .suite = { 3381da7f033dSHerbert Xu .hash = { 3382da7f033dSHerbert Xu .vecs = md4_tv_template, 3383da7f033dSHerbert Xu .count = MD4_TEST_VECTORS 3384da7f033dSHerbert Xu } 3385da7f033dSHerbert Xu } 3386da7f033dSHerbert Xu }, { 3387da7f033dSHerbert Xu .alg = "md5", 3388da7f033dSHerbert Xu .test = alg_test_hash, 3389da7f033dSHerbert Xu .suite = { 3390da7f033dSHerbert Xu .hash = { 3391da7f033dSHerbert Xu .vecs = md5_tv_template, 3392da7f033dSHerbert Xu .count = MD5_TEST_VECTORS 3393da7f033dSHerbert Xu } 3394da7f033dSHerbert Xu } 3395da7f033dSHerbert Xu }, { 3396da7f033dSHerbert Xu .alg = "michael_mic", 3397da7f033dSHerbert Xu .test = alg_test_hash, 3398da7f033dSHerbert Xu .suite = { 3399da7f033dSHerbert Xu .hash = { 3400da7f033dSHerbert Xu .vecs = michael_mic_tv_template, 3401da7f033dSHerbert Xu .count = MICHAEL_MIC_TEST_VECTORS 3402da7f033dSHerbert Xu } 3403da7f033dSHerbert Xu } 3404da7f033dSHerbert Xu }, { 3405ba0e14acSPuneet Saxena .alg = "ofb(aes)", 3406ba0e14acSPuneet Saxena .test = alg_test_skcipher, 3407ba0e14acSPuneet Saxena .fips_allowed = 1, 3408ba0e14acSPuneet Saxena .suite = { 3409ba0e14acSPuneet Saxena .cipher = { 3410ba0e14acSPuneet Saxena .enc = { 3411ba0e14acSPuneet Saxena .vecs = aes_ofb_enc_tv_template, 3412ba0e14acSPuneet Saxena .count = AES_OFB_ENC_TEST_VECTORS 3413ba0e14acSPuneet Saxena }, 3414ba0e14acSPuneet Saxena .dec = { 3415ba0e14acSPuneet Saxena .vecs = aes_ofb_dec_tv_template, 3416ba0e14acSPuneet Saxena .count = AES_OFB_DEC_TEST_VECTORS 3417ba0e14acSPuneet Saxena } 3418ba0e14acSPuneet Saxena } 3419ba0e14acSPuneet Saxena } 3420ba0e14acSPuneet Saxena }, { 3421da7f033dSHerbert Xu .alg = "pcbc(fcrypt)", 34221aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3423da7f033dSHerbert Xu .suite = { 3424da7f033dSHerbert Xu .cipher = { 3425da7f033dSHerbert Xu .enc = { 3426da7f033dSHerbert Xu .vecs = fcrypt_pcbc_enc_tv_template, 3427da7f033dSHerbert Xu .count = FCRYPT_ENC_TEST_VECTORS 3428da7f033dSHerbert Xu }, 3429da7f033dSHerbert Xu .dec = { 3430da7f033dSHerbert Xu .vecs = fcrypt_pcbc_dec_tv_template, 3431da7f033dSHerbert Xu .count = FCRYPT_DEC_TEST_VECTORS 3432da7f033dSHerbert Xu } 3433da7f033dSHerbert Xu } 3434da7f033dSHerbert Xu } 3435da7f033dSHerbert Xu }, { 3436eee9dc61SMartin Willi .alg = "poly1305", 3437eee9dc61SMartin Willi .test = alg_test_hash, 3438eee9dc61SMartin Willi .suite = { 3439eee9dc61SMartin Willi .hash = { 3440eee9dc61SMartin Willi .vecs = poly1305_tv_template, 3441eee9dc61SMartin Willi .count = POLY1305_TEST_VECTORS 3442eee9dc61SMartin Willi } 3443eee9dc61SMartin Willi } 3444eee9dc61SMartin Willi }, { 3445da7f033dSHerbert Xu .alg = "rfc3686(ctr(aes))", 34461aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3447a1915d51SJarod Wilson .fips_allowed = 1, 3448da7f033dSHerbert Xu .suite = { 3449da7f033dSHerbert Xu .cipher = { 3450da7f033dSHerbert Xu .enc = { 3451f7cb80f2SJarod Wilson .vecs = aes_ctr_rfc3686_enc_tv_template, 3452f7cb80f2SJarod Wilson .count = AES_CTR_3686_ENC_TEST_VECTORS 3453da7f033dSHerbert Xu }, 3454da7f033dSHerbert Xu .dec = { 3455f7cb80f2SJarod Wilson .vecs = aes_ctr_rfc3686_dec_tv_template, 3456f7cb80f2SJarod Wilson .count = AES_CTR_3686_DEC_TEST_VECTORS 3457da7f033dSHerbert Xu } 3458da7f033dSHerbert Xu } 3459da7f033dSHerbert Xu } 3460da7f033dSHerbert Xu }, { 34613f31a740SHerbert Xu .alg = "rfc4106(gcm(aes))", 346269435b94SAdrian Hoban .test = alg_test_aead, 3463db71f29aSJarod Wilson .fips_allowed = 1, 346469435b94SAdrian Hoban .suite = { 346569435b94SAdrian Hoban .aead = { 346669435b94SAdrian Hoban .enc = { 346769435b94SAdrian Hoban .vecs = aes_gcm_rfc4106_enc_tv_template, 346869435b94SAdrian Hoban .count = AES_GCM_4106_ENC_TEST_VECTORS 346969435b94SAdrian Hoban }, 347069435b94SAdrian Hoban .dec = { 347169435b94SAdrian Hoban .vecs = aes_gcm_rfc4106_dec_tv_template, 347269435b94SAdrian Hoban .count = AES_GCM_4106_DEC_TEST_VECTORS 347369435b94SAdrian Hoban } 347469435b94SAdrian Hoban } 347569435b94SAdrian Hoban } 347669435b94SAdrian Hoban }, { 3477544c436aSHerbert Xu .alg = "rfc4309(ccm(aes))", 34785d667322SJarod Wilson .test = alg_test_aead, 3479a1915d51SJarod Wilson .fips_allowed = 1, 34805d667322SJarod Wilson .suite = { 34815d667322SJarod Wilson .aead = { 34825d667322SJarod Wilson .enc = { 34835d667322SJarod Wilson .vecs = aes_ccm_rfc4309_enc_tv_template, 34845d667322SJarod Wilson .count = AES_CCM_4309_ENC_TEST_VECTORS 34855d667322SJarod Wilson }, 34865d667322SJarod Wilson .dec = { 34875d667322SJarod Wilson .vecs = aes_ccm_rfc4309_dec_tv_template, 34885d667322SJarod Wilson .count = AES_CCM_4309_DEC_TEST_VECTORS 34895d667322SJarod Wilson } 34905d667322SJarod Wilson } 34915d667322SJarod Wilson } 34925d667322SJarod Wilson }, { 3493bb68745eSHerbert Xu .alg = "rfc4543(gcm(aes))", 3494e9b7441aSJussi Kivilinna .test = alg_test_aead, 3495e9b7441aSJussi Kivilinna .suite = { 3496e9b7441aSJussi Kivilinna .aead = { 3497e9b7441aSJussi Kivilinna .enc = { 3498e9b7441aSJussi Kivilinna .vecs = aes_gcm_rfc4543_enc_tv_template, 3499e9b7441aSJussi Kivilinna .count = AES_GCM_4543_ENC_TEST_VECTORS 3500e9b7441aSJussi Kivilinna }, 3501e9b7441aSJussi Kivilinna .dec = { 3502e9b7441aSJussi Kivilinna .vecs = aes_gcm_rfc4543_dec_tv_template, 3503e9b7441aSJussi Kivilinna .count = AES_GCM_4543_DEC_TEST_VECTORS 3504e9b7441aSJussi Kivilinna }, 3505e9b7441aSJussi Kivilinna } 3506e9b7441aSJussi Kivilinna } 3507e9b7441aSJussi Kivilinna }, { 3508af2b76b5SMartin Willi .alg = "rfc7539(chacha20,poly1305)", 3509af2b76b5SMartin Willi .test = alg_test_aead, 3510af2b76b5SMartin Willi .suite = { 3511af2b76b5SMartin Willi .aead = { 3512af2b76b5SMartin Willi .enc = { 3513af2b76b5SMartin Willi .vecs = rfc7539_enc_tv_template, 3514af2b76b5SMartin Willi .count = RFC7539_ENC_TEST_VECTORS 3515af2b76b5SMartin Willi }, 3516af2b76b5SMartin Willi .dec = { 3517af2b76b5SMartin Willi .vecs = rfc7539_dec_tv_template, 3518af2b76b5SMartin Willi .count = RFC7539_DEC_TEST_VECTORS 3519af2b76b5SMartin Willi }, 3520af2b76b5SMartin Willi } 3521af2b76b5SMartin Willi } 3522af2b76b5SMartin Willi }, { 35235900758dSMartin Willi .alg = "rfc7539esp(chacha20,poly1305)", 35245900758dSMartin Willi .test = alg_test_aead, 35255900758dSMartin Willi .suite = { 35265900758dSMartin Willi .aead = { 35275900758dSMartin Willi .enc = { 35285900758dSMartin Willi .vecs = rfc7539esp_enc_tv_template, 35295900758dSMartin Willi .count = RFC7539ESP_ENC_TEST_VECTORS 35305900758dSMartin Willi }, 35315900758dSMartin Willi .dec = { 35325900758dSMartin Willi .vecs = rfc7539esp_dec_tv_template, 35335900758dSMartin Willi .count = RFC7539ESP_DEC_TEST_VECTORS 35345900758dSMartin Willi }, 35355900758dSMartin Willi } 35365900758dSMartin Willi } 35375900758dSMartin Willi }, { 3538da7f033dSHerbert Xu .alg = "rmd128", 3539da7f033dSHerbert Xu .test = alg_test_hash, 3540da7f033dSHerbert Xu .suite = { 3541da7f033dSHerbert Xu .hash = { 3542da7f033dSHerbert Xu .vecs = rmd128_tv_template, 3543da7f033dSHerbert Xu .count = RMD128_TEST_VECTORS 3544da7f033dSHerbert Xu } 3545da7f033dSHerbert Xu } 3546da7f033dSHerbert Xu }, { 3547da7f033dSHerbert Xu .alg = "rmd160", 3548da7f033dSHerbert Xu .test = alg_test_hash, 3549da7f033dSHerbert Xu .suite = { 3550da7f033dSHerbert Xu .hash = { 3551da7f033dSHerbert Xu .vecs = rmd160_tv_template, 3552da7f033dSHerbert Xu .count = RMD160_TEST_VECTORS 3553da7f033dSHerbert Xu } 3554da7f033dSHerbert Xu } 3555da7f033dSHerbert Xu }, { 3556da7f033dSHerbert Xu .alg = "rmd256", 3557da7f033dSHerbert Xu .test = alg_test_hash, 3558da7f033dSHerbert Xu .suite = { 3559da7f033dSHerbert Xu .hash = { 3560da7f033dSHerbert Xu .vecs = rmd256_tv_template, 3561da7f033dSHerbert Xu .count = RMD256_TEST_VECTORS 3562da7f033dSHerbert Xu } 3563da7f033dSHerbert Xu } 3564da7f033dSHerbert Xu }, { 3565da7f033dSHerbert Xu .alg = "rmd320", 3566da7f033dSHerbert Xu .test = alg_test_hash, 3567da7f033dSHerbert Xu .suite = { 3568da7f033dSHerbert Xu .hash = { 3569da7f033dSHerbert Xu .vecs = rmd320_tv_template, 3570da7f033dSHerbert Xu .count = RMD320_TEST_VECTORS 3571da7f033dSHerbert Xu } 3572da7f033dSHerbert Xu } 3573da7f033dSHerbert Xu }, { 3574946cc463STadeusz Struk .alg = "rsa", 3575946cc463STadeusz Struk .test = alg_test_akcipher, 3576946cc463STadeusz Struk .fips_allowed = 1, 3577946cc463STadeusz Struk .suite = { 3578946cc463STadeusz Struk .akcipher = { 3579946cc463STadeusz Struk .vecs = rsa_tv_template, 3580946cc463STadeusz Struk .count = RSA_TEST_VECTORS 3581946cc463STadeusz Struk } 3582946cc463STadeusz Struk } 3583946cc463STadeusz Struk }, { 3584da7f033dSHerbert Xu .alg = "salsa20", 35851aa4ecd9SHerbert Xu .test = alg_test_skcipher, 3586da7f033dSHerbert Xu .suite = { 3587da7f033dSHerbert Xu .cipher = { 3588da7f033dSHerbert Xu .enc = { 3589da7f033dSHerbert Xu .vecs = salsa20_stream_enc_tv_template, 3590da7f033dSHerbert Xu .count = SALSA20_STREAM_ENC_TEST_VECTORS 3591da7f033dSHerbert Xu } 3592da7f033dSHerbert Xu } 3593da7f033dSHerbert Xu } 3594da7f033dSHerbert Xu }, { 3595da7f033dSHerbert Xu .alg = "sha1", 3596da7f033dSHerbert Xu .test = alg_test_hash, 3597a1915d51SJarod Wilson .fips_allowed = 1, 3598da7f033dSHerbert Xu .suite = { 3599da7f033dSHerbert Xu .hash = { 3600da7f033dSHerbert Xu .vecs = sha1_tv_template, 3601da7f033dSHerbert Xu .count = SHA1_TEST_VECTORS 3602da7f033dSHerbert Xu } 3603da7f033dSHerbert Xu } 3604da7f033dSHerbert Xu }, { 3605da7f033dSHerbert Xu .alg = "sha224", 3606da7f033dSHerbert Xu .test = alg_test_hash, 3607a1915d51SJarod Wilson .fips_allowed = 1, 3608da7f033dSHerbert Xu .suite = { 3609da7f033dSHerbert Xu .hash = { 3610da7f033dSHerbert Xu .vecs = sha224_tv_template, 3611da7f033dSHerbert Xu .count = SHA224_TEST_VECTORS 3612da7f033dSHerbert Xu } 3613da7f033dSHerbert Xu } 3614da7f033dSHerbert Xu }, { 3615da7f033dSHerbert Xu .alg = "sha256", 3616da7f033dSHerbert Xu .test = alg_test_hash, 3617a1915d51SJarod Wilson .fips_allowed = 1, 3618da7f033dSHerbert Xu .suite = { 3619da7f033dSHerbert Xu .hash = { 3620da7f033dSHerbert Xu .vecs = sha256_tv_template, 3621da7f033dSHerbert Xu .count = SHA256_TEST_VECTORS 3622da7f033dSHerbert Xu } 3623da7f033dSHerbert Xu } 3624da7f033dSHerbert Xu }, { 3625da7f033dSHerbert Xu .alg = "sha384", 3626da7f033dSHerbert Xu .test = alg_test_hash, 3627a1915d51SJarod Wilson .fips_allowed = 1, 3628da7f033dSHerbert Xu .suite = { 3629da7f033dSHerbert Xu .hash = { 3630da7f033dSHerbert Xu .vecs = sha384_tv_template, 3631da7f033dSHerbert Xu .count = SHA384_TEST_VECTORS 3632da7f033dSHerbert Xu } 3633da7f033dSHerbert Xu } 3634da7f033dSHerbert Xu }, { 3635da7f033dSHerbert Xu .alg = "sha512", 3636da7f033dSHerbert Xu .test = alg_test_hash, 3637a1915d51SJarod Wilson .fips_allowed = 1, 3638da7f033dSHerbert Xu .suite = { 3639da7f033dSHerbert Xu .hash = { 3640da7f033dSHerbert Xu .vecs = sha512_tv_template, 3641da7f033dSHerbert Xu .count = SHA512_TEST_VECTORS 3642da7f033dSHerbert Xu } 3643da7f033dSHerbert Xu } 3644da7f033dSHerbert Xu }, { 3645da7f033dSHerbert Xu .alg = "tgr128", 3646da7f033dSHerbert Xu .test = alg_test_hash, 3647da7f033dSHerbert Xu .suite = { 3648da7f033dSHerbert Xu .hash = { 3649da7f033dSHerbert Xu .vecs = tgr128_tv_template, 3650da7f033dSHerbert Xu .count = TGR128_TEST_VECTORS 3651da7f033dSHerbert Xu } 3652da7f033dSHerbert Xu } 3653da7f033dSHerbert Xu }, { 3654da7f033dSHerbert Xu .alg = "tgr160", 3655da7f033dSHerbert Xu .test = alg_test_hash, 3656da7f033dSHerbert Xu .suite = { 3657da7f033dSHerbert Xu .hash = { 3658da7f033dSHerbert Xu .vecs = tgr160_tv_template, 3659da7f033dSHerbert Xu .count = TGR160_TEST_VECTORS 3660da7f033dSHerbert Xu } 3661da7f033dSHerbert Xu } 3662da7f033dSHerbert Xu }, { 3663da7f033dSHerbert Xu .alg = "tgr192", 3664da7f033dSHerbert Xu .test = alg_test_hash, 3665da7f033dSHerbert Xu .suite = { 3666da7f033dSHerbert Xu .hash = { 3667da7f033dSHerbert Xu .vecs = tgr192_tv_template, 3668da7f033dSHerbert Xu .count = TGR192_TEST_VECTORS 3669da7f033dSHerbert Xu } 3670da7f033dSHerbert Xu } 3671da7f033dSHerbert Xu }, { 3672f1939f7cSShane Wang .alg = "vmac(aes)", 3673f1939f7cSShane Wang .test = alg_test_hash, 3674f1939f7cSShane Wang .suite = { 3675f1939f7cSShane Wang .hash = { 3676f1939f7cSShane Wang .vecs = aes_vmac128_tv_template, 3677f1939f7cSShane Wang .count = VMAC_AES_TEST_VECTORS 3678f1939f7cSShane Wang } 3679f1939f7cSShane Wang } 3680f1939f7cSShane Wang }, { 3681da7f033dSHerbert Xu .alg = "wp256", 3682da7f033dSHerbert Xu .test = alg_test_hash, 3683da7f033dSHerbert Xu .suite = { 3684da7f033dSHerbert Xu .hash = { 3685da7f033dSHerbert Xu .vecs = wp256_tv_template, 3686da7f033dSHerbert Xu .count = WP256_TEST_VECTORS 3687da7f033dSHerbert Xu } 3688da7f033dSHerbert Xu } 3689da7f033dSHerbert Xu }, { 3690da7f033dSHerbert Xu .alg = "wp384", 3691da7f033dSHerbert Xu .test = alg_test_hash, 3692da7f033dSHerbert Xu .suite = { 3693da7f033dSHerbert Xu .hash = { 3694da7f033dSHerbert Xu .vecs = wp384_tv_template, 3695da7f033dSHerbert Xu .count = WP384_TEST_VECTORS 3696da7f033dSHerbert Xu } 3697da7f033dSHerbert Xu } 3698da7f033dSHerbert Xu }, { 3699da7f033dSHerbert Xu .alg = "wp512", 3700da7f033dSHerbert Xu .test = alg_test_hash, 3701da7f033dSHerbert Xu .suite = { 3702da7f033dSHerbert Xu .hash = { 3703da7f033dSHerbert Xu .vecs = wp512_tv_template, 3704da7f033dSHerbert Xu .count = WP512_TEST_VECTORS 3705da7f033dSHerbert Xu } 3706da7f033dSHerbert Xu } 3707da7f033dSHerbert Xu }, { 3708da7f033dSHerbert Xu .alg = "xcbc(aes)", 3709da7f033dSHerbert Xu .test = alg_test_hash, 3710da7f033dSHerbert Xu .suite = { 3711da7f033dSHerbert Xu .hash = { 3712da7f033dSHerbert Xu .vecs = aes_xcbc128_tv_template, 3713da7f033dSHerbert Xu .count = XCBC_AES_TEST_VECTORS 3714da7f033dSHerbert Xu } 3715da7f033dSHerbert Xu } 3716da7f033dSHerbert Xu }, { 3717da7f033dSHerbert Xu .alg = "xts(aes)", 37181aa4ecd9SHerbert Xu .test = alg_test_skcipher, 37192918aa8dSJarod Wilson .fips_allowed = 1, 3720da7f033dSHerbert Xu .suite = { 3721da7f033dSHerbert Xu .cipher = { 3722da7f033dSHerbert Xu .enc = { 3723da7f033dSHerbert Xu .vecs = aes_xts_enc_tv_template, 3724da7f033dSHerbert Xu .count = AES_XTS_ENC_TEST_VECTORS 3725da7f033dSHerbert Xu }, 3726da7f033dSHerbert Xu .dec = { 3727da7f033dSHerbert Xu .vecs = aes_xts_dec_tv_template, 3728da7f033dSHerbert Xu .count = AES_XTS_DEC_TEST_VECTORS 3729da7f033dSHerbert Xu } 3730da7f033dSHerbert Xu } 3731da7f033dSHerbert Xu } 37320c01aed5SGeert Uytterhoeven }, { 37330840605eSJussi Kivilinna .alg = "xts(camellia)", 37340840605eSJussi Kivilinna .test = alg_test_skcipher, 37350840605eSJussi Kivilinna .suite = { 37360840605eSJussi Kivilinna .cipher = { 37370840605eSJussi Kivilinna .enc = { 37380840605eSJussi Kivilinna .vecs = camellia_xts_enc_tv_template, 37390840605eSJussi Kivilinna .count = CAMELLIA_XTS_ENC_TEST_VECTORS 37400840605eSJussi Kivilinna }, 37410840605eSJussi Kivilinna .dec = { 37420840605eSJussi Kivilinna .vecs = camellia_xts_dec_tv_template, 37430840605eSJussi Kivilinna .count = CAMELLIA_XTS_DEC_TEST_VECTORS 37440840605eSJussi Kivilinna } 37450840605eSJussi Kivilinna } 37460840605eSJussi Kivilinna } 37470840605eSJussi Kivilinna }, { 37489b8b0405SJohannes Goetzfried .alg = "xts(cast6)", 37499b8b0405SJohannes Goetzfried .test = alg_test_skcipher, 37509b8b0405SJohannes Goetzfried .suite = { 37519b8b0405SJohannes Goetzfried .cipher = { 37529b8b0405SJohannes Goetzfried .enc = { 37539b8b0405SJohannes Goetzfried .vecs = cast6_xts_enc_tv_template, 37549b8b0405SJohannes Goetzfried .count = CAST6_XTS_ENC_TEST_VECTORS 37559b8b0405SJohannes Goetzfried }, 37569b8b0405SJohannes Goetzfried .dec = { 37579b8b0405SJohannes Goetzfried .vecs = cast6_xts_dec_tv_template, 37589b8b0405SJohannes Goetzfried .count = CAST6_XTS_DEC_TEST_VECTORS 37599b8b0405SJohannes Goetzfried } 37609b8b0405SJohannes Goetzfried } 37619b8b0405SJohannes Goetzfried } 37629b8b0405SJohannes Goetzfried }, { 376318be20b9SJussi Kivilinna .alg = "xts(serpent)", 376418be20b9SJussi Kivilinna .test = alg_test_skcipher, 376518be20b9SJussi Kivilinna .suite = { 376618be20b9SJussi Kivilinna .cipher = { 376718be20b9SJussi Kivilinna .enc = { 376818be20b9SJussi Kivilinna .vecs = serpent_xts_enc_tv_template, 376918be20b9SJussi Kivilinna .count = SERPENT_XTS_ENC_TEST_VECTORS 377018be20b9SJussi Kivilinna }, 377118be20b9SJussi Kivilinna .dec = { 377218be20b9SJussi Kivilinna .vecs = serpent_xts_dec_tv_template, 377318be20b9SJussi Kivilinna .count = SERPENT_XTS_DEC_TEST_VECTORS 377418be20b9SJussi Kivilinna } 377518be20b9SJussi Kivilinna } 377618be20b9SJussi Kivilinna } 377718be20b9SJussi Kivilinna }, { 3778aed265b9SJussi Kivilinna .alg = "xts(twofish)", 3779aed265b9SJussi Kivilinna .test = alg_test_skcipher, 3780aed265b9SJussi Kivilinna .suite = { 3781aed265b9SJussi Kivilinna .cipher = { 3782aed265b9SJussi Kivilinna .enc = { 3783aed265b9SJussi Kivilinna .vecs = tf_xts_enc_tv_template, 3784aed265b9SJussi Kivilinna .count = TF_XTS_ENC_TEST_VECTORS 3785aed265b9SJussi Kivilinna }, 3786aed265b9SJussi Kivilinna .dec = { 3787aed265b9SJussi Kivilinna .vecs = tf_xts_dec_tv_template, 3788aed265b9SJussi Kivilinna .count = TF_XTS_DEC_TEST_VECTORS 3789aed265b9SJussi Kivilinna } 3790aed265b9SJussi Kivilinna } 3791aed265b9SJussi Kivilinna } 3792da7f033dSHerbert Xu } 3793da7f033dSHerbert Xu }; 3794da7f033dSHerbert Xu 37955714758bSJussi Kivilinna static bool alg_test_descs_checked; 37965714758bSJussi Kivilinna 37975714758bSJussi Kivilinna static void alg_test_descs_check_order(void) 37985714758bSJussi Kivilinna { 37995714758bSJussi Kivilinna int i; 38005714758bSJussi Kivilinna 38015714758bSJussi Kivilinna /* only check once */ 38025714758bSJussi Kivilinna if (alg_test_descs_checked) 38035714758bSJussi Kivilinna return; 38045714758bSJussi Kivilinna 38055714758bSJussi Kivilinna alg_test_descs_checked = true; 38065714758bSJussi Kivilinna 38075714758bSJussi Kivilinna for (i = 1; i < ARRAY_SIZE(alg_test_descs); i++) { 38085714758bSJussi Kivilinna int diff = strcmp(alg_test_descs[i - 1].alg, 38095714758bSJussi Kivilinna alg_test_descs[i].alg); 38105714758bSJussi Kivilinna 38115714758bSJussi Kivilinna if (WARN_ON(diff > 0)) { 38125714758bSJussi Kivilinna pr_warn("testmgr: alg_test_descs entries in wrong order: '%s' before '%s'\n", 38135714758bSJussi Kivilinna alg_test_descs[i - 1].alg, 38145714758bSJussi Kivilinna alg_test_descs[i].alg); 38155714758bSJussi Kivilinna } 38165714758bSJussi Kivilinna 38175714758bSJussi Kivilinna if (WARN_ON(diff == 0)) { 38185714758bSJussi Kivilinna pr_warn("testmgr: duplicate alg_test_descs entry: '%s'\n", 38195714758bSJussi Kivilinna alg_test_descs[i].alg); 38205714758bSJussi Kivilinna } 38215714758bSJussi Kivilinna } 38225714758bSJussi Kivilinna } 38235714758bSJussi Kivilinna 38241aa4ecd9SHerbert Xu static int alg_find_test(const char *alg) 3825da7f033dSHerbert Xu { 3826da7f033dSHerbert Xu int start = 0; 3827da7f033dSHerbert Xu int end = ARRAY_SIZE(alg_test_descs); 3828da7f033dSHerbert Xu 3829da7f033dSHerbert Xu while (start < end) { 3830da7f033dSHerbert Xu int i = (start + end) / 2; 3831da7f033dSHerbert Xu int diff = strcmp(alg_test_descs[i].alg, alg); 3832da7f033dSHerbert Xu 3833da7f033dSHerbert Xu if (diff > 0) { 3834da7f033dSHerbert Xu end = i; 3835da7f033dSHerbert Xu continue; 3836da7f033dSHerbert Xu } 3837da7f033dSHerbert Xu 3838da7f033dSHerbert Xu if (diff < 0) { 3839da7f033dSHerbert Xu start = i + 1; 3840da7f033dSHerbert Xu continue; 3841da7f033dSHerbert Xu } 3842da7f033dSHerbert Xu 38431aa4ecd9SHerbert Xu return i; 3844da7f033dSHerbert Xu } 3845da7f033dSHerbert Xu 38461aa4ecd9SHerbert Xu return -1; 38471aa4ecd9SHerbert Xu } 38481aa4ecd9SHerbert Xu 38491aa4ecd9SHerbert Xu int alg_test(const char *driver, const char *alg, u32 type, u32 mask) 38501aa4ecd9SHerbert Xu { 38511aa4ecd9SHerbert Xu int i; 3852a68f6610SHerbert Xu int j; 3853d12d6b6dSNeil Horman int rc; 38541aa4ecd9SHerbert Xu 38555714758bSJussi Kivilinna alg_test_descs_check_order(); 38565714758bSJussi Kivilinna 38571aa4ecd9SHerbert Xu if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) { 38581aa4ecd9SHerbert Xu char nalg[CRYPTO_MAX_ALG_NAME]; 38591aa4ecd9SHerbert Xu 38601aa4ecd9SHerbert Xu if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >= 38611aa4ecd9SHerbert Xu sizeof(nalg)) 38621aa4ecd9SHerbert Xu return -ENAMETOOLONG; 38631aa4ecd9SHerbert Xu 38641aa4ecd9SHerbert Xu i = alg_find_test(nalg); 38651aa4ecd9SHerbert Xu if (i < 0) 38661aa4ecd9SHerbert Xu goto notest; 38671aa4ecd9SHerbert Xu 3868a3bef3a3SJarod Wilson if (fips_enabled && !alg_test_descs[i].fips_allowed) 3869a3bef3a3SJarod Wilson goto non_fips_alg; 3870a3bef3a3SJarod Wilson 3871941fb328SJarod Wilson rc = alg_test_cipher(alg_test_descs + i, driver, type, mask); 3872941fb328SJarod Wilson goto test_done; 38731aa4ecd9SHerbert Xu } 38741aa4ecd9SHerbert Xu 38751aa4ecd9SHerbert Xu i = alg_find_test(alg); 3876a68f6610SHerbert Xu j = alg_find_test(driver); 3877a68f6610SHerbert Xu if (i < 0 && j < 0) 38781aa4ecd9SHerbert Xu goto notest; 38791aa4ecd9SHerbert Xu 3880a68f6610SHerbert Xu if (fips_enabled && ((i >= 0 && !alg_test_descs[i].fips_allowed) || 3881a68f6610SHerbert Xu (j >= 0 && !alg_test_descs[j].fips_allowed))) 3882a3bef3a3SJarod Wilson goto non_fips_alg; 3883a3bef3a3SJarod Wilson 3884a68f6610SHerbert Xu rc = 0; 3885a68f6610SHerbert Xu if (i >= 0) 3886a68f6610SHerbert Xu rc |= alg_test_descs[i].test(alg_test_descs + i, driver, 38871aa4ecd9SHerbert Xu type, mask); 3888032c8cacSCristian Stoica if (j >= 0 && j != i) 3889a68f6610SHerbert Xu rc |= alg_test_descs[j].test(alg_test_descs + j, driver, 3890a68f6610SHerbert Xu type, mask); 3891a68f6610SHerbert Xu 3892941fb328SJarod Wilson test_done: 3893d12d6b6dSNeil Horman if (fips_enabled && rc) 3894d12d6b6dSNeil Horman panic("%s: %s alg self test failed in fips mode!\n", driver, alg); 3895d12d6b6dSNeil Horman 389629ecd4abSJarod Wilson if (fips_enabled && !rc) 38973e8cffd4SMasanari Iida pr_info("alg: self-tests for %s (%s) passed\n", driver, alg); 389829ecd4abSJarod Wilson 3899d12d6b6dSNeil Horman return rc; 39001aa4ecd9SHerbert Xu 39011aa4ecd9SHerbert Xu notest: 3902da7f033dSHerbert Xu printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver); 3903da7f033dSHerbert Xu return 0; 3904a3bef3a3SJarod Wilson non_fips_alg: 3905a3bef3a3SJarod Wilson return -EINVAL; 3906da7f033dSHerbert Xu } 39070b767f96SAlexander Shishkin 3908326a6346SHerbert Xu #endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */ 39090b767f96SAlexander Shishkin 3910da7f033dSHerbert Xu EXPORT_SYMBOL_GPL(alg_test); 3911