xref: /openbmc/linux/crypto/testmgr.c (revision bc000245)
1 /*
2  * Algorithm testing framework and tests.
3  *
4  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6  * Copyright (c) 2007 Nokia Siemens Networks
7  * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8  *
9  * Updated RFC4106 AES-GCM testing.
10  *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
11  *             Adrian Hoban <adrian.hoban@intel.com>
12  *             Gabriele Paoloni <gabriele.paoloni@intel.com>
13  *             Tadeusz Struk (tadeusz.struk@intel.com)
14  *    Copyright (c) 2010, Intel Corporation.
15  *
16  * This program is free software; you can redistribute it and/or modify it
17  * under the terms of the GNU General Public License as published by the Free
18  * Software Foundation; either version 2 of the License, or (at your option)
19  * any later version.
20  *
21  */
22 
23 #include <crypto/hash.h>
24 #include <linux/err.h>
25 #include <linux/module.h>
26 #include <linux/scatterlist.h>
27 #include <linux/slab.h>
28 #include <linux/string.h>
29 #include <crypto/rng.h>
30 
31 #include "internal.h"
32 
33 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
34 
35 /* a perfect nop */
36 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
37 {
38 	return 0;
39 }
40 
41 #else
42 
43 #include "testmgr.h"
44 
45 /*
46  * Need slab memory for testing (size in number of pages).
47  */
48 #define XBUFSIZE	8
49 
50 /*
51  * Indexes into the xbuf to simulate cross-page access.
52  */
53 #define IDX1		32
54 #define IDX2		32400
55 #define IDX3		1
56 #define IDX4		8193
57 #define IDX5		22222
58 #define IDX6		17101
59 #define IDX7		27333
60 #define IDX8		3000
61 
62 /*
63 * Used by test_cipher()
64 */
65 #define ENCRYPT 1
66 #define DECRYPT 0
67 
68 struct tcrypt_result {
69 	struct completion completion;
70 	int err;
71 };
72 
73 struct aead_test_suite {
74 	struct {
75 		struct aead_testvec *vecs;
76 		unsigned int count;
77 	} enc, dec;
78 };
79 
80 struct cipher_test_suite {
81 	struct {
82 		struct cipher_testvec *vecs;
83 		unsigned int count;
84 	} enc, dec;
85 };
86 
87 struct comp_test_suite {
88 	struct {
89 		struct comp_testvec *vecs;
90 		unsigned int count;
91 	} comp, decomp;
92 };
93 
94 struct pcomp_test_suite {
95 	struct {
96 		struct pcomp_testvec *vecs;
97 		unsigned int count;
98 	} comp, decomp;
99 };
100 
101 struct hash_test_suite {
102 	struct hash_testvec *vecs;
103 	unsigned int count;
104 };
105 
106 struct cprng_test_suite {
107 	struct cprng_testvec *vecs;
108 	unsigned int count;
109 };
110 
111 struct alg_test_desc {
112 	const char *alg;
113 	int (*test)(const struct alg_test_desc *desc, const char *driver,
114 		    u32 type, u32 mask);
115 	int fips_allowed;	/* set if alg is allowed in fips mode */
116 
117 	union {
118 		struct aead_test_suite aead;
119 		struct cipher_test_suite cipher;
120 		struct comp_test_suite comp;
121 		struct pcomp_test_suite pcomp;
122 		struct hash_test_suite hash;
123 		struct cprng_test_suite cprng;
124 	} suite;
125 };
126 
127 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
128 
129 static void hexdump(unsigned char *buf, unsigned int len)
130 {
131 	print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
132 			16, 1,
133 			buf, len, false);
134 }
135 
136 static void tcrypt_complete(struct crypto_async_request *req, int err)
137 {
138 	struct tcrypt_result *res = req->data;
139 
140 	if (err == -EINPROGRESS)
141 		return;
142 
143 	res->err = err;
144 	complete(&res->completion);
145 }
146 
147 static int testmgr_alloc_buf(char *buf[XBUFSIZE])
148 {
149 	int i;
150 
151 	for (i = 0; i < XBUFSIZE; i++) {
152 		buf[i] = (void *)__get_free_page(GFP_KERNEL);
153 		if (!buf[i])
154 			goto err_free_buf;
155 	}
156 
157 	return 0;
158 
159 err_free_buf:
160 	while (i-- > 0)
161 		free_page((unsigned long)buf[i]);
162 
163 	return -ENOMEM;
164 }
165 
166 static void testmgr_free_buf(char *buf[XBUFSIZE])
167 {
168 	int i;
169 
170 	for (i = 0; i < XBUFSIZE; i++)
171 		free_page((unsigned long)buf[i]);
172 }
173 
174 static int do_one_async_hash_op(struct ahash_request *req,
175 				struct tcrypt_result *tr,
176 				int ret)
177 {
178 	if (ret == -EINPROGRESS || ret == -EBUSY) {
179 		ret = wait_for_completion_interruptible(&tr->completion);
180 		if (!ret)
181 			ret = tr->err;
182 		reinit_completion(&tr->completion);
183 	}
184 	return ret;
185 }
186 
187 static int __test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
188 		       unsigned int tcount, bool use_digest,
189 		       const int align_offset)
190 {
191 	const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm));
192 	unsigned int i, j, k, temp;
193 	struct scatterlist sg[8];
194 	char result[64];
195 	struct ahash_request *req;
196 	struct tcrypt_result tresult;
197 	void *hash_buff;
198 	char *xbuf[XBUFSIZE];
199 	int ret = -ENOMEM;
200 
201 	if (testmgr_alloc_buf(xbuf))
202 		goto out_nobuf;
203 
204 	init_completion(&tresult.completion);
205 
206 	req = ahash_request_alloc(tfm, GFP_KERNEL);
207 	if (!req) {
208 		printk(KERN_ERR "alg: hash: Failed to allocate request for "
209 		       "%s\n", algo);
210 		goto out_noreq;
211 	}
212 	ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
213 				   tcrypt_complete, &tresult);
214 
215 	j = 0;
216 	for (i = 0; i < tcount; i++) {
217 		if (template[i].np)
218 			continue;
219 
220 		ret = -EINVAL;
221 		if (WARN_ON(align_offset + template[i].psize > PAGE_SIZE))
222 			goto out;
223 
224 		j++;
225 		memset(result, 0, 64);
226 
227 		hash_buff = xbuf[0];
228 		hash_buff += align_offset;
229 
230 		memcpy(hash_buff, template[i].plaintext, template[i].psize);
231 		sg_init_one(&sg[0], hash_buff, template[i].psize);
232 
233 		if (template[i].ksize) {
234 			crypto_ahash_clear_flags(tfm, ~0);
235 			ret = crypto_ahash_setkey(tfm, template[i].key,
236 						  template[i].ksize);
237 			if (ret) {
238 				printk(KERN_ERR "alg: hash: setkey failed on "
239 				       "test %d for %s: ret=%d\n", j, algo,
240 				       -ret);
241 				goto out;
242 			}
243 		}
244 
245 		ahash_request_set_crypt(req, sg, result, template[i].psize);
246 		if (use_digest) {
247 			ret = do_one_async_hash_op(req, &tresult,
248 						   crypto_ahash_digest(req));
249 			if (ret) {
250 				pr_err("alg: hash: digest failed on test %d "
251 				       "for %s: ret=%d\n", j, algo, -ret);
252 				goto out;
253 			}
254 		} else {
255 			ret = do_one_async_hash_op(req, &tresult,
256 						   crypto_ahash_init(req));
257 			if (ret) {
258 				pr_err("alt: hash: init failed on test %d "
259 				       "for %s: ret=%d\n", j, algo, -ret);
260 				goto out;
261 			}
262 			ret = do_one_async_hash_op(req, &tresult,
263 						   crypto_ahash_update(req));
264 			if (ret) {
265 				pr_err("alt: hash: update failed on test %d "
266 				       "for %s: ret=%d\n", j, algo, -ret);
267 				goto out;
268 			}
269 			ret = do_one_async_hash_op(req, &tresult,
270 						   crypto_ahash_final(req));
271 			if (ret) {
272 				pr_err("alt: hash: final failed on test %d "
273 				       "for %s: ret=%d\n", j, algo, -ret);
274 				goto out;
275 			}
276 		}
277 
278 		if (memcmp(result, template[i].digest,
279 			   crypto_ahash_digestsize(tfm))) {
280 			printk(KERN_ERR "alg: hash: Test %d failed for %s\n",
281 			       j, algo);
282 			hexdump(result, crypto_ahash_digestsize(tfm));
283 			ret = -EINVAL;
284 			goto out;
285 		}
286 	}
287 
288 	j = 0;
289 	for (i = 0; i < tcount; i++) {
290 		/* alignment tests are only done with continuous buffers */
291 		if (align_offset != 0)
292 			break;
293 
294 		if (template[i].np) {
295 			j++;
296 			memset(result, 0, 64);
297 
298 			temp = 0;
299 			sg_init_table(sg, template[i].np);
300 			ret = -EINVAL;
301 			for (k = 0; k < template[i].np; k++) {
302 				if (WARN_ON(offset_in_page(IDX[k]) +
303 					    template[i].tap[k] > PAGE_SIZE))
304 					goto out;
305 				sg_set_buf(&sg[k],
306 					   memcpy(xbuf[IDX[k] >> PAGE_SHIFT] +
307 						  offset_in_page(IDX[k]),
308 						  template[i].plaintext + temp,
309 						  template[i].tap[k]),
310 					   template[i].tap[k]);
311 				temp += template[i].tap[k];
312 			}
313 
314 			if (template[i].ksize) {
315 				crypto_ahash_clear_flags(tfm, ~0);
316 				ret = crypto_ahash_setkey(tfm, template[i].key,
317 							  template[i].ksize);
318 
319 				if (ret) {
320 					printk(KERN_ERR "alg: hash: setkey "
321 					       "failed on chunking test %d "
322 					       "for %s: ret=%d\n", j, algo,
323 					       -ret);
324 					goto out;
325 				}
326 			}
327 
328 			ahash_request_set_crypt(req, sg, result,
329 						template[i].psize);
330 			ret = crypto_ahash_digest(req);
331 			switch (ret) {
332 			case 0:
333 				break;
334 			case -EINPROGRESS:
335 			case -EBUSY:
336 				ret = wait_for_completion_interruptible(
337 					&tresult.completion);
338 				if (!ret && !(ret = tresult.err)) {
339 					reinit_completion(&tresult.completion);
340 					break;
341 				}
342 				/* fall through */
343 			default:
344 				printk(KERN_ERR "alg: hash: digest failed "
345 				       "on chunking test %d for %s: "
346 				       "ret=%d\n", j, algo, -ret);
347 				goto out;
348 			}
349 
350 			if (memcmp(result, template[i].digest,
351 				   crypto_ahash_digestsize(tfm))) {
352 				printk(KERN_ERR "alg: hash: Chunking test %d "
353 				       "failed for %s\n", j, algo);
354 				hexdump(result, crypto_ahash_digestsize(tfm));
355 				ret = -EINVAL;
356 				goto out;
357 			}
358 		}
359 	}
360 
361 	ret = 0;
362 
363 out:
364 	ahash_request_free(req);
365 out_noreq:
366 	testmgr_free_buf(xbuf);
367 out_nobuf:
368 	return ret;
369 }
370 
371 static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
372 		     unsigned int tcount, bool use_digest)
373 {
374 	unsigned int alignmask;
375 	int ret;
376 
377 	ret = __test_hash(tfm, template, tcount, use_digest, 0);
378 	if (ret)
379 		return ret;
380 
381 	/* test unaligned buffers, check with one byte offset */
382 	ret = __test_hash(tfm, template, tcount, use_digest, 1);
383 	if (ret)
384 		return ret;
385 
386 	alignmask = crypto_tfm_alg_alignmask(&tfm->base);
387 	if (alignmask) {
388 		/* Check if alignment mask for tfm is correctly set. */
389 		ret = __test_hash(tfm, template, tcount, use_digest,
390 				  alignmask + 1);
391 		if (ret)
392 			return ret;
393 	}
394 
395 	return 0;
396 }
397 
398 static int __test_aead(struct crypto_aead *tfm, int enc,
399 		       struct aead_testvec *template, unsigned int tcount,
400 		       const bool diff_dst, const int align_offset)
401 {
402 	const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm));
403 	unsigned int i, j, k, n, temp;
404 	int ret = -ENOMEM;
405 	char *q;
406 	char *key;
407 	struct aead_request *req;
408 	struct scatterlist *sg;
409 	struct scatterlist *asg;
410 	struct scatterlist *sgout;
411 	const char *e, *d;
412 	struct tcrypt_result result;
413 	unsigned int authsize;
414 	void *input;
415 	void *output;
416 	void *assoc;
417 	char iv[MAX_IVLEN];
418 	char *xbuf[XBUFSIZE];
419 	char *xoutbuf[XBUFSIZE];
420 	char *axbuf[XBUFSIZE];
421 
422 	if (testmgr_alloc_buf(xbuf))
423 		goto out_noxbuf;
424 	if (testmgr_alloc_buf(axbuf))
425 		goto out_noaxbuf;
426 
427 	if (diff_dst && testmgr_alloc_buf(xoutbuf))
428 		goto out_nooutbuf;
429 
430 	/* avoid "the frame size is larger than 1024 bytes" compiler warning */
431 	sg = kmalloc(sizeof(*sg) * 8 * (diff_dst ? 3 : 2), GFP_KERNEL);
432 	if (!sg)
433 		goto out_nosg;
434 	asg = &sg[8];
435 	sgout = &asg[8];
436 
437 	if (diff_dst)
438 		d = "-ddst";
439 	else
440 		d = "";
441 
442 	if (enc == ENCRYPT)
443 		e = "encryption";
444 	else
445 		e = "decryption";
446 
447 	init_completion(&result.completion);
448 
449 	req = aead_request_alloc(tfm, GFP_KERNEL);
450 	if (!req) {
451 		pr_err("alg: aead%s: Failed to allocate request for %s\n",
452 		       d, algo);
453 		goto out;
454 	}
455 
456 	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
457 				  tcrypt_complete, &result);
458 
459 	for (i = 0, j = 0; i < tcount; i++) {
460 		if (!template[i].np) {
461 			j++;
462 
463 			/* some templates have no input data but they will
464 			 * touch input
465 			 */
466 			input = xbuf[0];
467 			input += align_offset;
468 			assoc = axbuf[0];
469 
470 			ret = -EINVAL;
471 			if (WARN_ON(align_offset + template[i].ilen >
472 				    PAGE_SIZE || template[i].alen > PAGE_SIZE))
473 				goto out;
474 
475 			memcpy(input, template[i].input, template[i].ilen);
476 			memcpy(assoc, template[i].assoc, template[i].alen);
477 			if (template[i].iv)
478 				memcpy(iv, template[i].iv, MAX_IVLEN);
479 			else
480 				memset(iv, 0, MAX_IVLEN);
481 
482 			crypto_aead_clear_flags(tfm, ~0);
483 			if (template[i].wk)
484 				crypto_aead_set_flags(
485 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
486 
487 			key = template[i].key;
488 
489 			ret = crypto_aead_setkey(tfm, key,
490 						 template[i].klen);
491 			if (!ret == template[i].fail) {
492 				pr_err("alg: aead%s: setkey failed on test %d for %s: flags=%x\n",
493 				       d, j, algo, crypto_aead_get_flags(tfm));
494 				goto out;
495 			} else if (ret)
496 				continue;
497 
498 			authsize = abs(template[i].rlen - template[i].ilen);
499 			ret = crypto_aead_setauthsize(tfm, authsize);
500 			if (ret) {
501 				pr_err("alg: aead%s: Failed to set authsize to %u on test %d for %s\n",
502 				       d, authsize, j, algo);
503 				goto out;
504 			}
505 
506 			if (diff_dst) {
507 				output = xoutbuf[0];
508 				output += align_offset;
509 				sg_init_one(&sg[0], input, template[i].ilen);
510 				sg_init_one(&sgout[0], output,
511 					    template[i].rlen);
512 			} else {
513 				sg_init_one(&sg[0], input,
514 					    template[i].ilen +
515 						(enc ? authsize : 0));
516 				output = input;
517 			}
518 
519 			sg_init_one(&asg[0], assoc, template[i].alen);
520 
521 			aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
522 					       template[i].ilen, iv);
523 
524 			aead_request_set_assoc(req, asg, template[i].alen);
525 
526 			ret = enc ?
527 				crypto_aead_encrypt(req) :
528 				crypto_aead_decrypt(req);
529 
530 			switch (ret) {
531 			case 0:
532 				if (template[i].novrfy) {
533 					/* verification was supposed to fail */
534 					pr_err("alg: aead%s: %s failed on test %d for %s: ret was 0, expected -EBADMSG\n",
535 					       d, e, j, algo);
536 					/* so really, we got a bad message */
537 					ret = -EBADMSG;
538 					goto out;
539 				}
540 				break;
541 			case -EINPROGRESS:
542 			case -EBUSY:
543 				ret = wait_for_completion_interruptible(
544 					&result.completion);
545 				if (!ret && !(ret = result.err)) {
546 					reinit_completion(&result.completion);
547 					break;
548 				}
549 			case -EBADMSG:
550 				if (template[i].novrfy)
551 					/* verification failure was expected */
552 					continue;
553 				/* fall through */
554 			default:
555 				pr_err("alg: aead%s: %s failed on test %d for %s: ret=%d\n",
556 				       d, e, j, algo, -ret);
557 				goto out;
558 			}
559 
560 			q = output;
561 			if (memcmp(q, template[i].result, template[i].rlen)) {
562 				pr_err("alg: aead%s: Test %d failed on %s for %s\n",
563 				       d, j, e, algo);
564 				hexdump(q, template[i].rlen);
565 				ret = -EINVAL;
566 				goto out;
567 			}
568 		}
569 	}
570 
571 	for (i = 0, j = 0; i < tcount; i++) {
572 		/* alignment tests are only done with continuous buffers */
573 		if (align_offset != 0)
574 			break;
575 
576 		if (template[i].np) {
577 			j++;
578 
579 			if (template[i].iv)
580 				memcpy(iv, template[i].iv, MAX_IVLEN);
581 			else
582 				memset(iv, 0, MAX_IVLEN);
583 
584 			crypto_aead_clear_flags(tfm, ~0);
585 			if (template[i].wk)
586 				crypto_aead_set_flags(
587 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
588 			key = template[i].key;
589 
590 			ret = crypto_aead_setkey(tfm, key, template[i].klen);
591 			if (!ret == template[i].fail) {
592 				pr_err("alg: aead%s: setkey failed on chunk test %d for %s: flags=%x\n",
593 				       d, j, algo, crypto_aead_get_flags(tfm));
594 				goto out;
595 			} else if (ret)
596 				continue;
597 
598 			authsize = abs(template[i].rlen - template[i].ilen);
599 
600 			ret = -EINVAL;
601 			sg_init_table(sg, template[i].np);
602 			if (diff_dst)
603 				sg_init_table(sgout, template[i].np);
604 			for (k = 0, temp = 0; k < template[i].np; k++) {
605 				if (WARN_ON(offset_in_page(IDX[k]) +
606 					    template[i].tap[k] > PAGE_SIZE))
607 					goto out;
608 
609 				q = xbuf[IDX[k] >> PAGE_SHIFT] +
610 				    offset_in_page(IDX[k]);
611 
612 				memcpy(q, template[i].input + temp,
613 				       template[i].tap[k]);
614 
615 				sg_set_buf(&sg[k], q, template[i].tap[k]);
616 
617 				if (diff_dst) {
618 					q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
619 					    offset_in_page(IDX[k]);
620 
621 					memset(q, 0, template[i].tap[k]);
622 
623 					sg_set_buf(&sgout[k], q,
624 						   template[i].tap[k]);
625 				}
626 
627 				n = template[i].tap[k];
628 				if (k == template[i].np - 1 && enc)
629 					n += authsize;
630 				if (offset_in_page(q) + n < PAGE_SIZE)
631 					q[n] = 0;
632 
633 				temp += template[i].tap[k];
634 			}
635 
636 			ret = crypto_aead_setauthsize(tfm, authsize);
637 			if (ret) {
638 				pr_err("alg: aead%s: Failed to set authsize to %u on chunk test %d for %s\n",
639 				       d, authsize, j, algo);
640 				goto out;
641 			}
642 
643 			if (enc) {
644 				if (WARN_ON(sg[k - 1].offset +
645 					    sg[k - 1].length + authsize >
646 					    PAGE_SIZE)) {
647 					ret = -EINVAL;
648 					goto out;
649 				}
650 
651 				if (diff_dst)
652 					sgout[k - 1].length += authsize;
653 				else
654 					sg[k - 1].length += authsize;
655 			}
656 
657 			sg_init_table(asg, template[i].anp);
658 			ret = -EINVAL;
659 			for (k = 0, temp = 0; k < template[i].anp; k++) {
660 				if (WARN_ON(offset_in_page(IDX[k]) +
661 					    template[i].atap[k] > PAGE_SIZE))
662 					goto out;
663 				sg_set_buf(&asg[k],
664 					   memcpy(axbuf[IDX[k] >> PAGE_SHIFT] +
665 						  offset_in_page(IDX[k]),
666 						  template[i].assoc + temp,
667 						  template[i].atap[k]),
668 					   template[i].atap[k]);
669 				temp += template[i].atap[k];
670 			}
671 
672 			aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
673 					       template[i].ilen,
674 					       iv);
675 
676 			aead_request_set_assoc(req, asg, template[i].alen);
677 
678 			ret = enc ?
679 				crypto_aead_encrypt(req) :
680 				crypto_aead_decrypt(req);
681 
682 			switch (ret) {
683 			case 0:
684 				if (template[i].novrfy) {
685 					/* verification was supposed to fail */
686 					pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret was 0, expected -EBADMSG\n",
687 					       d, e, j, algo);
688 					/* so really, we got a bad message */
689 					ret = -EBADMSG;
690 					goto out;
691 				}
692 				break;
693 			case -EINPROGRESS:
694 			case -EBUSY:
695 				ret = wait_for_completion_interruptible(
696 					&result.completion);
697 				if (!ret && !(ret = result.err)) {
698 					reinit_completion(&result.completion);
699 					break;
700 				}
701 			case -EBADMSG:
702 				if (template[i].novrfy)
703 					/* verification failure was expected */
704 					continue;
705 				/* fall through */
706 			default:
707 				pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret=%d\n",
708 				       d, e, j, algo, -ret);
709 				goto out;
710 			}
711 
712 			ret = -EINVAL;
713 			for (k = 0, temp = 0; k < template[i].np; k++) {
714 				if (diff_dst)
715 					q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
716 					    offset_in_page(IDX[k]);
717 				else
718 					q = xbuf[IDX[k] >> PAGE_SHIFT] +
719 					    offset_in_page(IDX[k]);
720 
721 				n = template[i].tap[k];
722 				if (k == template[i].np - 1)
723 					n += enc ? authsize : -authsize;
724 
725 				if (memcmp(q, template[i].result + temp, n)) {
726 					pr_err("alg: aead%s: Chunk test %d failed on %s at page %u for %s\n",
727 					       d, j, e, k, algo);
728 					hexdump(q, n);
729 					goto out;
730 				}
731 
732 				q += n;
733 				if (k == template[i].np - 1 && !enc) {
734 					if (!diff_dst &&
735 						memcmp(q, template[i].input +
736 						      temp + n, authsize))
737 						n = authsize;
738 					else
739 						n = 0;
740 				} else {
741 					for (n = 0; offset_in_page(q + n) &&
742 						    q[n]; n++)
743 						;
744 				}
745 				if (n) {
746 					pr_err("alg: aead%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
747 					       d, j, e, k, algo, n);
748 					hexdump(q, n);
749 					goto out;
750 				}
751 
752 				temp += template[i].tap[k];
753 			}
754 		}
755 	}
756 
757 	ret = 0;
758 
759 out:
760 	aead_request_free(req);
761 	kfree(sg);
762 out_nosg:
763 	if (diff_dst)
764 		testmgr_free_buf(xoutbuf);
765 out_nooutbuf:
766 	testmgr_free_buf(axbuf);
767 out_noaxbuf:
768 	testmgr_free_buf(xbuf);
769 out_noxbuf:
770 	return ret;
771 }
772 
773 static int test_aead(struct crypto_aead *tfm, int enc,
774 		     struct aead_testvec *template, unsigned int tcount)
775 {
776 	unsigned int alignmask;
777 	int ret;
778 
779 	/* test 'dst == src' case */
780 	ret = __test_aead(tfm, enc, template, tcount, false, 0);
781 	if (ret)
782 		return ret;
783 
784 	/* test 'dst != src' case */
785 	ret = __test_aead(tfm, enc, template, tcount, true, 0);
786 	if (ret)
787 		return ret;
788 
789 	/* test unaligned buffers, check with one byte offset */
790 	ret = __test_aead(tfm, enc, template, tcount, true, 1);
791 	if (ret)
792 		return ret;
793 
794 	alignmask = crypto_tfm_alg_alignmask(&tfm->base);
795 	if (alignmask) {
796 		/* Check if alignment mask for tfm is correctly set. */
797 		ret = __test_aead(tfm, enc, template, tcount, true,
798 				  alignmask + 1);
799 		if (ret)
800 			return ret;
801 	}
802 
803 	return 0;
804 }
805 
806 static int test_cipher(struct crypto_cipher *tfm, int enc,
807 		       struct cipher_testvec *template, unsigned int tcount)
808 {
809 	const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm));
810 	unsigned int i, j, k;
811 	char *q;
812 	const char *e;
813 	void *data;
814 	char *xbuf[XBUFSIZE];
815 	int ret = -ENOMEM;
816 
817 	if (testmgr_alloc_buf(xbuf))
818 		goto out_nobuf;
819 
820 	if (enc == ENCRYPT)
821 	        e = "encryption";
822 	else
823 		e = "decryption";
824 
825 	j = 0;
826 	for (i = 0; i < tcount; i++) {
827 		if (template[i].np)
828 			continue;
829 
830 		j++;
831 
832 		ret = -EINVAL;
833 		if (WARN_ON(template[i].ilen > PAGE_SIZE))
834 			goto out;
835 
836 		data = xbuf[0];
837 		memcpy(data, template[i].input, template[i].ilen);
838 
839 		crypto_cipher_clear_flags(tfm, ~0);
840 		if (template[i].wk)
841 			crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
842 
843 		ret = crypto_cipher_setkey(tfm, template[i].key,
844 					   template[i].klen);
845 		if (!ret == template[i].fail) {
846 			printk(KERN_ERR "alg: cipher: setkey failed "
847 			       "on test %d for %s: flags=%x\n", j,
848 			       algo, crypto_cipher_get_flags(tfm));
849 			goto out;
850 		} else if (ret)
851 			continue;
852 
853 		for (k = 0; k < template[i].ilen;
854 		     k += crypto_cipher_blocksize(tfm)) {
855 			if (enc)
856 				crypto_cipher_encrypt_one(tfm, data + k,
857 							  data + k);
858 			else
859 				crypto_cipher_decrypt_one(tfm, data + k,
860 							  data + k);
861 		}
862 
863 		q = data;
864 		if (memcmp(q, template[i].result, template[i].rlen)) {
865 			printk(KERN_ERR "alg: cipher: Test %d failed "
866 			       "on %s for %s\n", j, e, algo);
867 			hexdump(q, template[i].rlen);
868 			ret = -EINVAL;
869 			goto out;
870 		}
871 	}
872 
873 	ret = 0;
874 
875 out:
876 	testmgr_free_buf(xbuf);
877 out_nobuf:
878 	return ret;
879 }
880 
881 static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc,
882 			   struct cipher_testvec *template, unsigned int tcount,
883 			   const bool diff_dst, const int align_offset)
884 {
885 	const char *algo =
886 		crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm));
887 	unsigned int i, j, k, n, temp;
888 	char *q;
889 	struct ablkcipher_request *req;
890 	struct scatterlist sg[8];
891 	struct scatterlist sgout[8];
892 	const char *e, *d;
893 	struct tcrypt_result result;
894 	void *data;
895 	char iv[MAX_IVLEN];
896 	char *xbuf[XBUFSIZE];
897 	char *xoutbuf[XBUFSIZE];
898 	int ret = -ENOMEM;
899 
900 	if (testmgr_alloc_buf(xbuf))
901 		goto out_nobuf;
902 
903 	if (diff_dst && testmgr_alloc_buf(xoutbuf))
904 		goto out_nooutbuf;
905 
906 	if (diff_dst)
907 		d = "-ddst";
908 	else
909 		d = "";
910 
911 	if (enc == ENCRYPT)
912 	        e = "encryption";
913 	else
914 		e = "decryption";
915 
916 	init_completion(&result.completion);
917 
918 	req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
919 	if (!req) {
920 		pr_err("alg: skcipher%s: Failed to allocate request for %s\n",
921 		       d, algo);
922 		goto out;
923 	}
924 
925 	ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
926 					tcrypt_complete, &result);
927 
928 	j = 0;
929 	for (i = 0; i < tcount; i++) {
930 		if (template[i].iv)
931 			memcpy(iv, template[i].iv, MAX_IVLEN);
932 		else
933 			memset(iv, 0, MAX_IVLEN);
934 
935 		if (!(template[i].np) || (template[i].also_non_np)) {
936 			j++;
937 
938 			ret = -EINVAL;
939 			if (WARN_ON(align_offset + template[i].ilen >
940 				    PAGE_SIZE))
941 				goto out;
942 
943 			data = xbuf[0];
944 			data += align_offset;
945 			memcpy(data, template[i].input, template[i].ilen);
946 
947 			crypto_ablkcipher_clear_flags(tfm, ~0);
948 			if (template[i].wk)
949 				crypto_ablkcipher_set_flags(
950 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
951 
952 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
953 						       template[i].klen);
954 			if (!ret == template[i].fail) {
955 				pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n",
956 				       d, j, algo,
957 				       crypto_ablkcipher_get_flags(tfm));
958 				goto out;
959 			} else if (ret)
960 				continue;
961 
962 			sg_init_one(&sg[0], data, template[i].ilen);
963 			if (diff_dst) {
964 				data = xoutbuf[0];
965 				data += align_offset;
966 				sg_init_one(&sgout[0], data, template[i].ilen);
967 			}
968 
969 			ablkcipher_request_set_crypt(req, sg,
970 						     (diff_dst) ? sgout : sg,
971 						     template[i].ilen, iv);
972 			ret = enc ?
973 				crypto_ablkcipher_encrypt(req) :
974 				crypto_ablkcipher_decrypt(req);
975 
976 			switch (ret) {
977 			case 0:
978 				break;
979 			case -EINPROGRESS:
980 			case -EBUSY:
981 				ret = wait_for_completion_interruptible(
982 					&result.completion);
983 				if (!ret && !((ret = result.err))) {
984 					reinit_completion(&result.completion);
985 					break;
986 				}
987 				/* fall through */
988 			default:
989 				pr_err("alg: skcipher%s: %s failed on test %d for %s: ret=%d\n",
990 				       d, e, j, algo, -ret);
991 				goto out;
992 			}
993 
994 			q = data;
995 			if (memcmp(q, template[i].result, template[i].rlen)) {
996 				pr_err("alg: skcipher%s: Test %d failed on %s for %s\n",
997 				       d, j, e, algo);
998 				hexdump(q, template[i].rlen);
999 				ret = -EINVAL;
1000 				goto out;
1001 			}
1002 		}
1003 	}
1004 
1005 	j = 0;
1006 	for (i = 0; i < tcount; i++) {
1007 		/* alignment tests are only done with continuous buffers */
1008 		if (align_offset != 0)
1009 			break;
1010 
1011 		if (template[i].iv)
1012 			memcpy(iv, template[i].iv, MAX_IVLEN);
1013 		else
1014 			memset(iv, 0, MAX_IVLEN);
1015 
1016 		if (template[i].np) {
1017 			j++;
1018 
1019 			crypto_ablkcipher_clear_flags(tfm, ~0);
1020 			if (template[i].wk)
1021 				crypto_ablkcipher_set_flags(
1022 					tfm, CRYPTO_TFM_REQ_WEAK_KEY);
1023 
1024 			ret = crypto_ablkcipher_setkey(tfm, template[i].key,
1025 						       template[i].klen);
1026 			if (!ret == template[i].fail) {
1027 				pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n",
1028 				       d, j, algo,
1029 				       crypto_ablkcipher_get_flags(tfm));
1030 				goto out;
1031 			} else if (ret)
1032 				continue;
1033 
1034 			temp = 0;
1035 			ret = -EINVAL;
1036 			sg_init_table(sg, template[i].np);
1037 			if (diff_dst)
1038 				sg_init_table(sgout, template[i].np);
1039 			for (k = 0; k < template[i].np; k++) {
1040 				if (WARN_ON(offset_in_page(IDX[k]) +
1041 					    template[i].tap[k] > PAGE_SIZE))
1042 					goto out;
1043 
1044 				q = xbuf[IDX[k] >> PAGE_SHIFT] +
1045 				    offset_in_page(IDX[k]);
1046 
1047 				memcpy(q, template[i].input + temp,
1048 				       template[i].tap[k]);
1049 
1050 				if (offset_in_page(q) + template[i].tap[k] <
1051 				    PAGE_SIZE)
1052 					q[template[i].tap[k]] = 0;
1053 
1054 				sg_set_buf(&sg[k], q, template[i].tap[k]);
1055 				if (diff_dst) {
1056 					q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
1057 					    offset_in_page(IDX[k]);
1058 
1059 					sg_set_buf(&sgout[k], q,
1060 						   template[i].tap[k]);
1061 
1062 					memset(q, 0, template[i].tap[k]);
1063 					if (offset_in_page(q) +
1064 					    template[i].tap[k] < PAGE_SIZE)
1065 						q[template[i].tap[k]] = 0;
1066 				}
1067 
1068 				temp += template[i].tap[k];
1069 			}
1070 
1071 			ablkcipher_request_set_crypt(req, sg,
1072 					(diff_dst) ? sgout : sg,
1073 					template[i].ilen, iv);
1074 
1075 			ret = enc ?
1076 				crypto_ablkcipher_encrypt(req) :
1077 				crypto_ablkcipher_decrypt(req);
1078 
1079 			switch (ret) {
1080 			case 0:
1081 				break;
1082 			case -EINPROGRESS:
1083 			case -EBUSY:
1084 				ret = wait_for_completion_interruptible(
1085 					&result.completion);
1086 				if (!ret && !((ret = result.err))) {
1087 					reinit_completion(&result.completion);
1088 					break;
1089 				}
1090 				/* fall through */
1091 			default:
1092 				pr_err("alg: skcipher%s: %s failed on chunk test %d for %s: ret=%d\n",
1093 				       d, e, j, algo, -ret);
1094 				goto out;
1095 			}
1096 
1097 			temp = 0;
1098 			ret = -EINVAL;
1099 			for (k = 0; k < template[i].np; k++) {
1100 				if (diff_dst)
1101 					q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
1102 					    offset_in_page(IDX[k]);
1103 				else
1104 					q = xbuf[IDX[k] >> PAGE_SHIFT] +
1105 					    offset_in_page(IDX[k]);
1106 
1107 				if (memcmp(q, template[i].result + temp,
1108 					   template[i].tap[k])) {
1109 					pr_err("alg: skcipher%s: Chunk test %d failed on %s at page %u for %s\n",
1110 					       d, j, e, k, algo);
1111 					hexdump(q, template[i].tap[k]);
1112 					goto out;
1113 				}
1114 
1115 				q += template[i].tap[k];
1116 				for (n = 0; offset_in_page(q + n) && q[n]; n++)
1117 					;
1118 				if (n) {
1119 					pr_err("alg: skcipher%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
1120 					       d, j, e, k, algo, n);
1121 					hexdump(q, n);
1122 					goto out;
1123 				}
1124 				temp += template[i].tap[k];
1125 			}
1126 		}
1127 	}
1128 
1129 	ret = 0;
1130 
1131 out:
1132 	ablkcipher_request_free(req);
1133 	if (diff_dst)
1134 		testmgr_free_buf(xoutbuf);
1135 out_nooutbuf:
1136 	testmgr_free_buf(xbuf);
1137 out_nobuf:
1138 	return ret;
1139 }
1140 
1141 static int test_skcipher(struct crypto_ablkcipher *tfm, int enc,
1142 			 struct cipher_testvec *template, unsigned int tcount)
1143 {
1144 	unsigned int alignmask;
1145 	int ret;
1146 
1147 	/* test 'dst == src' case */
1148 	ret = __test_skcipher(tfm, enc, template, tcount, false, 0);
1149 	if (ret)
1150 		return ret;
1151 
1152 	/* test 'dst != src' case */
1153 	ret = __test_skcipher(tfm, enc, template, tcount, true, 0);
1154 	if (ret)
1155 		return ret;
1156 
1157 	/* test unaligned buffers, check with one byte offset */
1158 	ret = __test_skcipher(tfm, enc, template, tcount, true, 1);
1159 	if (ret)
1160 		return ret;
1161 
1162 	alignmask = crypto_tfm_alg_alignmask(&tfm->base);
1163 	if (alignmask) {
1164 		/* Check if alignment mask for tfm is correctly set. */
1165 		ret = __test_skcipher(tfm, enc, template, tcount, true,
1166 				      alignmask + 1);
1167 		if (ret)
1168 			return ret;
1169 	}
1170 
1171 	return 0;
1172 }
1173 
1174 static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate,
1175 		     struct comp_testvec *dtemplate, int ctcount, int dtcount)
1176 {
1177 	const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm));
1178 	unsigned int i;
1179 	char result[COMP_BUF_SIZE];
1180 	int ret;
1181 
1182 	for (i = 0; i < ctcount; i++) {
1183 		int ilen;
1184 		unsigned int dlen = COMP_BUF_SIZE;
1185 
1186 		memset(result, 0, sizeof (result));
1187 
1188 		ilen = ctemplate[i].inlen;
1189 		ret = crypto_comp_compress(tfm, ctemplate[i].input,
1190 		                           ilen, result, &dlen);
1191 		if (ret) {
1192 			printk(KERN_ERR "alg: comp: compression failed "
1193 			       "on test %d for %s: ret=%d\n", i + 1, algo,
1194 			       -ret);
1195 			goto out;
1196 		}
1197 
1198 		if (dlen != ctemplate[i].outlen) {
1199 			printk(KERN_ERR "alg: comp: Compression test %d "
1200 			       "failed for %s: output len = %d\n", i + 1, algo,
1201 			       dlen);
1202 			ret = -EINVAL;
1203 			goto out;
1204 		}
1205 
1206 		if (memcmp(result, ctemplate[i].output, dlen)) {
1207 			printk(KERN_ERR "alg: comp: Compression test %d "
1208 			       "failed for %s\n", i + 1, algo);
1209 			hexdump(result, dlen);
1210 			ret = -EINVAL;
1211 			goto out;
1212 		}
1213 	}
1214 
1215 	for (i = 0; i < dtcount; i++) {
1216 		int ilen;
1217 		unsigned int dlen = COMP_BUF_SIZE;
1218 
1219 		memset(result, 0, sizeof (result));
1220 
1221 		ilen = dtemplate[i].inlen;
1222 		ret = crypto_comp_decompress(tfm, dtemplate[i].input,
1223 		                             ilen, result, &dlen);
1224 		if (ret) {
1225 			printk(KERN_ERR "alg: comp: decompression failed "
1226 			       "on test %d for %s: ret=%d\n", i + 1, algo,
1227 			       -ret);
1228 			goto out;
1229 		}
1230 
1231 		if (dlen != dtemplate[i].outlen) {
1232 			printk(KERN_ERR "alg: comp: Decompression test %d "
1233 			       "failed for %s: output len = %d\n", i + 1, algo,
1234 			       dlen);
1235 			ret = -EINVAL;
1236 			goto out;
1237 		}
1238 
1239 		if (memcmp(result, dtemplate[i].output, dlen)) {
1240 			printk(KERN_ERR "alg: comp: Decompression test %d "
1241 			       "failed for %s\n", i + 1, algo);
1242 			hexdump(result, dlen);
1243 			ret = -EINVAL;
1244 			goto out;
1245 		}
1246 	}
1247 
1248 	ret = 0;
1249 
1250 out:
1251 	return ret;
1252 }
1253 
1254 static int test_pcomp(struct crypto_pcomp *tfm,
1255 		      struct pcomp_testvec *ctemplate,
1256 		      struct pcomp_testvec *dtemplate, int ctcount,
1257 		      int dtcount)
1258 {
1259 	const char *algo = crypto_tfm_alg_driver_name(crypto_pcomp_tfm(tfm));
1260 	unsigned int i;
1261 	char result[COMP_BUF_SIZE];
1262 	int res;
1263 
1264 	for (i = 0; i < ctcount; i++) {
1265 		struct comp_request req;
1266 		unsigned int produced = 0;
1267 
1268 		res = crypto_compress_setup(tfm, ctemplate[i].params,
1269 					    ctemplate[i].paramsize);
1270 		if (res) {
1271 			pr_err("alg: pcomp: compression setup failed on test "
1272 			       "%d for %s: error=%d\n", i + 1, algo, res);
1273 			return res;
1274 		}
1275 
1276 		res = crypto_compress_init(tfm);
1277 		if (res) {
1278 			pr_err("alg: pcomp: compression init failed on test "
1279 			       "%d for %s: error=%d\n", i + 1, algo, res);
1280 			return res;
1281 		}
1282 
1283 		memset(result, 0, sizeof(result));
1284 
1285 		req.next_in = ctemplate[i].input;
1286 		req.avail_in = ctemplate[i].inlen / 2;
1287 		req.next_out = result;
1288 		req.avail_out = ctemplate[i].outlen / 2;
1289 
1290 		res = crypto_compress_update(tfm, &req);
1291 		if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1292 			pr_err("alg: pcomp: compression update failed on test "
1293 			       "%d for %s: error=%d\n", i + 1, algo, res);
1294 			return res;
1295 		}
1296 		if (res > 0)
1297 			produced += res;
1298 
1299 		/* Add remaining input data */
1300 		req.avail_in += (ctemplate[i].inlen + 1) / 2;
1301 
1302 		res = crypto_compress_update(tfm, &req);
1303 		if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1304 			pr_err("alg: pcomp: compression update failed on test "
1305 			       "%d for %s: error=%d\n", i + 1, algo, res);
1306 			return res;
1307 		}
1308 		if (res > 0)
1309 			produced += res;
1310 
1311 		/* Provide remaining output space */
1312 		req.avail_out += COMP_BUF_SIZE - ctemplate[i].outlen / 2;
1313 
1314 		res = crypto_compress_final(tfm, &req);
1315 		if (res < 0) {
1316 			pr_err("alg: pcomp: compression final failed on test "
1317 			       "%d for %s: error=%d\n", i + 1, algo, res);
1318 			return res;
1319 		}
1320 		produced += res;
1321 
1322 		if (COMP_BUF_SIZE - req.avail_out != ctemplate[i].outlen) {
1323 			pr_err("alg: comp: Compression test %d failed for %s: "
1324 			       "output len = %d (expected %d)\n", i + 1, algo,
1325 			       COMP_BUF_SIZE - req.avail_out,
1326 			       ctemplate[i].outlen);
1327 			return -EINVAL;
1328 		}
1329 
1330 		if (produced != ctemplate[i].outlen) {
1331 			pr_err("alg: comp: Compression test %d failed for %s: "
1332 			       "returned len = %u (expected %d)\n", i + 1,
1333 			       algo, produced, ctemplate[i].outlen);
1334 			return -EINVAL;
1335 		}
1336 
1337 		if (memcmp(result, ctemplate[i].output, ctemplate[i].outlen)) {
1338 			pr_err("alg: pcomp: Compression test %d failed for "
1339 			       "%s\n", i + 1, algo);
1340 			hexdump(result, ctemplate[i].outlen);
1341 			return -EINVAL;
1342 		}
1343 	}
1344 
1345 	for (i = 0; i < dtcount; i++) {
1346 		struct comp_request req;
1347 		unsigned int produced = 0;
1348 
1349 		res = crypto_decompress_setup(tfm, dtemplate[i].params,
1350 					      dtemplate[i].paramsize);
1351 		if (res) {
1352 			pr_err("alg: pcomp: decompression setup failed on "
1353 			       "test %d for %s: error=%d\n", i + 1, algo, res);
1354 			return res;
1355 		}
1356 
1357 		res = crypto_decompress_init(tfm);
1358 		if (res) {
1359 			pr_err("alg: pcomp: decompression init failed on test "
1360 			       "%d for %s: error=%d\n", i + 1, algo, res);
1361 			return res;
1362 		}
1363 
1364 		memset(result, 0, sizeof(result));
1365 
1366 		req.next_in = dtemplate[i].input;
1367 		req.avail_in = dtemplate[i].inlen / 2;
1368 		req.next_out = result;
1369 		req.avail_out = dtemplate[i].outlen / 2;
1370 
1371 		res = crypto_decompress_update(tfm, &req);
1372 		if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1373 			pr_err("alg: pcomp: decompression update failed on "
1374 			       "test %d for %s: error=%d\n", i + 1, algo, res);
1375 			return res;
1376 		}
1377 		if (res > 0)
1378 			produced += res;
1379 
1380 		/* Add remaining input data */
1381 		req.avail_in += (dtemplate[i].inlen + 1) / 2;
1382 
1383 		res = crypto_decompress_update(tfm, &req);
1384 		if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1385 			pr_err("alg: pcomp: decompression update failed on "
1386 			       "test %d for %s: error=%d\n", i + 1, algo, res);
1387 			return res;
1388 		}
1389 		if (res > 0)
1390 			produced += res;
1391 
1392 		/* Provide remaining output space */
1393 		req.avail_out += COMP_BUF_SIZE - dtemplate[i].outlen / 2;
1394 
1395 		res = crypto_decompress_final(tfm, &req);
1396 		if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1397 			pr_err("alg: pcomp: decompression final failed on "
1398 			       "test %d for %s: error=%d\n", i + 1, algo, res);
1399 			return res;
1400 		}
1401 		if (res > 0)
1402 			produced += res;
1403 
1404 		if (COMP_BUF_SIZE - req.avail_out != dtemplate[i].outlen) {
1405 			pr_err("alg: comp: Decompression test %d failed for "
1406 			       "%s: output len = %d (expected %d)\n", i + 1,
1407 			       algo, COMP_BUF_SIZE - req.avail_out,
1408 			       dtemplate[i].outlen);
1409 			return -EINVAL;
1410 		}
1411 
1412 		if (produced != dtemplate[i].outlen) {
1413 			pr_err("alg: comp: Decompression test %d failed for "
1414 			       "%s: returned len = %u (expected %d)\n", i + 1,
1415 			       algo, produced, dtemplate[i].outlen);
1416 			return -EINVAL;
1417 		}
1418 
1419 		if (memcmp(result, dtemplate[i].output, dtemplate[i].outlen)) {
1420 			pr_err("alg: pcomp: Decompression test %d failed for "
1421 			       "%s\n", i + 1, algo);
1422 			hexdump(result, dtemplate[i].outlen);
1423 			return -EINVAL;
1424 		}
1425 	}
1426 
1427 	return 0;
1428 }
1429 
1430 
1431 static int test_cprng(struct crypto_rng *tfm, struct cprng_testvec *template,
1432 		      unsigned int tcount)
1433 {
1434 	const char *algo = crypto_tfm_alg_driver_name(crypto_rng_tfm(tfm));
1435 	int err = 0, i, j, seedsize;
1436 	u8 *seed;
1437 	char result[32];
1438 
1439 	seedsize = crypto_rng_seedsize(tfm);
1440 
1441 	seed = kmalloc(seedsize, GFP_KERNEL);
1442 	if (!seed) {
1443 		printk(KERN_ERR "alg: cprng: Failed to allocate seed space "
1444 		       "for %s\n", algo);
1445 		return -ENOMEM;
1446 	}
1447 
1448 	for (i = 0; i < tcount; i++) {
1449 		memset(result, 0, 32);
1450 
1451 		memcpy(seed, template[i].v, template[i].vlen);
1452 		memcpy(seed + template[i].vlen, template[i].key,
1453 		       template[i].klen);
1454 		memcpy(seed + template[i].vlen + template[i].klen,
1455 		       template[i].dt, template[i].dtlen);
1456 
1457 		err = crypto_rng_reset(tfm, seed, seedsize);
1458 		if (err) {
1459 			printk(KERN_ERR "alg: cprng: Failed to reset rng "
1460 			       "for %s\n", algo);
1461 			goto out;
1462 		}
1463 
1464 		for (j = 0; j < template[i].loops; j++) {
1465 			err = crypto_rng_get_bytes(tfm, result,
1466 						   template[i].rlen);
1467 			if (err != template[i].rlen) {
1468 				printk(KERN_ERR "alg: cprng: Failed to obtain "
1469 				       "the correct amount of random data for "
1470 				       "%s (requested %d, got %d)\n", algo,
1471 				       template[i].rlen, err);
1472 				goto out;
1473 			}
1474 		}
1475 
1476 		err = memcmp(result, template[i].result,
1477 			     template[i].rlen);
1478 		if (err) {
1479 			printk(KERN_ERR "alg: cprng: Test %d failed for %s\n",
1480 			       i, algo);
1481 			hexdump(result, template[i].rlen);
1482 			err = -EINVAL;
1483 			goto out;
1484 		}
1485 	}
1486 
1487 out:
1488 	kfree(seed);
1489 	return err;
1490 }
1491 
1492 static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
1493 			 u32 type, u32 mask)
1494 {
1495 	struct crypto_aead *tfm;
1496 	int err = 0;
1497 
1498 	tfm = crypto_alloc_aead(driver, type, mask);
1499 	if (IS_ERR(tfm)) {
1500 		printk(KERN_ERR "alg: aead: Failed to load transform for %s: "
1501 		       "%ld\n", driver, PTR_ERR(tfm));
1502 		return PTR_ERR(tfm);
1503 	}
1504 
1505 	if (desc->suite.aead.enc.vecs) {
1506 		err = test_aead(tfm, ENCRYPT, desc->suite.aead.enc.vecs,
1507 				desc->suite.aead.enc.count);
1508 		if (err)
1509 			goto out;
1510 	}
1511 
1512 	if (!err && desc->suite.aead.dec.vecs)
1513 		err = test_aead(tfm, DECRYPT, desc->suite.aead.dec.vecs,
1514 				desc->suite.aead.dec.count);
1515 
1516 out:
1517 	crypto_free_aead(tfm);
1518 	return err;
1519 }
1520 
1521 static int alg_test_cipher(const struct alg_test_desc *desc,
1522 			   const char *driver, u32 type, u32 mask)
1523 {
1524 	struct crypto_cipher *tfm;
1525 	int err = 0;
1526 
1527 	tfm = crypto_alloc_cipher(driver, type, mask);
1528 	if (IS_ERR(tfm)) {
1529 		printk(KERN_ERR "alg: cipher: Failed to load transform for "
1530 		       "%s: %ld\n", driver, PTR_ERR(tfm));
1531 		return PTR_ERR(tfm);
1532 	}
1533 
1534 	if (desc->suite.cipher.enc.vecs) {
1535 		err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1536 				  desc->suite.cipher.enc.count);
1537 		if (err)
1538 			goto out;
1539 	}
1540 
1541 	if (desc->suite.cipher.dec.vecs)
1542 		err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1543 				  desc->suite.cipher.dec.count);
1544 
1545 out:
1546 	crypto_free_cipher(tfm);
1547 	return err;
1548 }
1549 
1550 static int alg_test_skcipher(const struct alg_test_desc *desc,
1551 			     const char *driver, u32 type, u32 mask)
1552 {
1553 	struct crypto_ablkcipher *tfm;
1554 	int err = 0;
1555 
1556 	tfm = crypto_alloc_ablkcipher(driver, type, mask);
1557 	if (IS_ERR(tfm)) {
1558 		printk(KERN_ERR "alg: skcipher: Failed to load transform for "
1559 		       "%s: %ld\n", driver, PTR_ERR(tfm));
1560 		return PTR_ERR(tfm);
1561 	}
1562 
1563 	if (desc->suite.cipher.enc.vecs) {
1564 		err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1565 				    desc->suite.cipher.enc.count);
1566 		if (err)
1567 			goto out;
1568 	}
1569 
1570 	if (desc->suite.cipher.dec.vecs)
1571 		err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1572 				    desc->suite.cipher.dec.count);
1573 
1574 out:
1575 	crypto_free_ablkcipher(tfm);
1576 	return err;
1577 }
1578 
1579 static int alg_test_comp(const struct alg_test_desc *desc, const char *driver,
1580 			 u32 type, u32 mask)
1581 {
1582 	struct crypto_comp *tfm;
1583 	int err;
1584 
1585 	tfm = crypto_alloc_comp(driver, type, mask);
1586 	if (IS_ERR(tfm)) {
1587 		printk(KERN_ERR "alg: comp: Failed to load transform for %s: "
1588 		       "%ld\n", driver, PTR_ERR(tfm));
1589 		return PTR_ERR(tfm);
1590 	}
1591 
1592 	err = test_comp(tfm, desc->suite.comp.comp.vecs,
1593 			desc->suite.comp.decomp.vecs,
1594 			desc->suite.comp.comp.count,
1595 			desc->suite.comp.decomp.count);
1596 
1597 	crypto_free_comp(tfm);
1598 	return err;
1599 }
1600 
1601 static int alg_test_pcomp(const struct alg_test_desc *desc, const char *driver,
1602 			  u32 type, u32 mask)
1603 {
1604 	struct crypto_pcomp *tfm;
1605 	int err;
1606 
1607 	tfm = crypto_alloc_pcomp(driver, type, mask);
1608 	if (IS_ERR(tfm)) {
1609 		pr_err("alg: pcomp: Failed to load transform for %s: %ld\n",
1610 		       driver, PTR_ERR(tfm));
1611 		return PTR_ERR(tfm);
1612 	}
1613 
1614 	err = test_pcomp(tfm, desc->suite.pcomp.comp.vecs,
1615 			 desc->suite.pcomp.decomp.vecs,
1616 			 desc->suite.pcomp.comp.count,
1617 			 desc->suite.pcomp.decomp.count);
1618 
1619 	crypto_free_pcomp(tfm);
1620 	return err;
1621 }
1622 
1623 static int alg_test_hash(const struct alg_test_desc *desc, const char *driver,
1624 			 u32 type, u32 mask)
1625 {
1626 	struct crypto_ahash *tfm;
1627 	int err;
1628 
1629 	tfm = crypto_alloc_ahash(driver, type, mask);
1630 	if (IS_ERR(tfm)) {
1631 		printk(KERN_ERR "alg: hash: Failed to load transform for %s: "
1632 		       "%ld\n", driver, PTR_ERR(tfm));
1633 		return PTR_ERR(tfm);
1634 	}
1635 
1636 	err = test_hash(tfm, desc->suite.hash.vecs,
1637 			desc->suite.hash.count, true);
1638 	if (!err)
1639 		err = test_hash(tfm, desc->suite.hash.vecs,
1640 				desc->suite.hash.count, false);
1641 
1642 	crypto_free_ahash(tfm);
1643 	return err;
1644 }
1645 
1646 static int alg_test_crc32c(const struct alg_test_desc *desc,
1647 			   const char *driver, u32 type, u32 mask)
1648 {
1649 	struct crypto_shash *tfm;
1650 	u32 val;
1651 	int err;
1652 
1653 	err = alg_test_hash(desc, driver, type, mask);
1654 	if (err)
1655 		goto out;
1656 
1657 	tfm = crypto_alloc_shash(driver, type, mask);
1658 	if (IS_ERR(tfm)) {
1659 		printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: "
1660 		       "%ld\n", driver, PTR_ERR(tfm));
1661 		err = PTR_ERR(tfm);
1662 		goto out;
1663 	}
1664 
1665 	do {
1666 		struct {
1667 			struct shash_desc shash;
1668 			char ctx[crypto_shash_descsize(tfm)];
1669 		} sdesc;
1670 
1671 		sdesc.shash.tfm = tfm;
1672 		sdesc.shash.flags = 0;
1673 
1674 		*(u32 *)sdesc.ctx = le32_to_cpu(420553207);
1675 		err = crypto_shash_final(&sdesc.shash, (u8 *)&val);
1676 		if (err) {
1677 			printk(KERN_ERR "alg: crc32c: Operation failed for "
1678 			       "%s: %d\n", driver, err);
1679 			break;
1680 		}
1681 
1682 		if (val != ~420553207) {
1683 			printk(KERN_ERR "alg: crc32c: Test failed for %s: "
1684 			       "%d\n", driver, val);
1685 			err = -EINVAL;
1686 		}
1687 	} while (0);
1688 
1689 	crypto_free_shash(tfm);
1690 
1691 out:
1692 	return err;
1693 }
1694 
1695 static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver,
1696 			  u32 type, u32 mask)
1697 {
1698 	struct crypto_rng *rng;
1699 	int err;
1700 
1701 	rng = crypto_alloc_rng(driver, type, mask);
1702 	if (IS_ERR(rng)) {
1703 		printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
1704 		       "%ld\n", driver, PTR_ERR(rng));
1705 		return PTR_ERR(rng);
1706 	}
1707 
1708 	err = test_cprng(rng, desc->suite.cprng.vecs, desc->suite.cprng.count);
1709 
1710 	crypto_free_rng(rng);
1711 
1712 	return err;
1713 }
1714 
1715 static int alg_test_null(const struct alg_test_desc *desc,
1716 			     const char *driver, u32 type, u32 mask)
1717 {
1718 	return 0;
1719 }
1720 
1721 /* Please keep this list sorted by algorithm name. */
1722 static const struct alg_test_desc alg_test_descs[] = {
1723 	{
1724 		.alg = "__cbc-cast5-avx",
1725 		.test = alg_test_null,
1726 	}, {
1727 		.alg = "__cbc-cast6-avx",
1728 		.test = alg_test_null,
1729 	}, {
1730 		.alg = "__cbc-serpent-avx",
1731 		.test = alg_test_null,
1732 	}, {
1733 		.alg = "__cbc-serpent-avx2",
1734 		.test = alg_test_null,
1735 	}, {
1736 		.alg = "__cbc-serpent-sse2",
1737 		.test = alg_test_null,
1738 	}, {
1739 		.alg = "__cbc-twofish-avx",
1740 		.test = alg_test_null,
1741 	}, {
1742 		.alg = "__driver-cbc-aes-aesni",
1743 		.test = alg_test_null,
1744 		.fips_allowed = 1,
1745 	}, {
1746 		.alg = "__driver-cbc-camellia-aesni",
1747 		.test = alg_test_null,
1748 	}, {
1749 		.alg = "__driver-cbc-camellia-aesni-avx2",
1750 		.test = alg_test_null,
1751 	}, {
1752 		.alg = "__driver-cbc-cast5-avx",
1753 		.test = alg_test_null,
1754 	}, {
1755 		.alg = "__driver-cbc-cast6-avx",
1756 		.test = alg_test_null,
1757 	}, {
1758 		.alg = "__driver-cbc-serpent-avx",
1759 		.test = alg_test_null,
1760 	}, {
1761 		.alg = "__driver-cbc-serpent-avx2",
1762 		.test = alg_test_null,
1763 	}, {
1764 		.alg = "__driver-cbc-serpent-sse2",
1765 		.test = alg_test_null,
1766 	}, {
1767 		.alg = "__driver-cbc-twofish-avx",
1768 		.test = alg_test_null,
1769 	}, {
1770 		.alg = "__driver-ecb-aes-aesni",
1771 		.test = alg_test_null,
1772 		.fips_allowed = 1,
1773 	}, {
1774 		.alg = "__driver-ecb-camellia-aesni",
1775 		.test = alg_test_null,
1776 	}, {
1777 		.alg = "__driver-ecb-camellia-aesni-avx2",
1778 		.test = alg_test_null,
1779 	}, {
1780 		.alg = "__driver-ecb-cast5-avx",
1781 		.test = alg_test_null,
1782 	}, {
1783 		.alg = "__driver-ecb-cast6-avx",
1784 		.test = alg_test_null,
1785 	}, {
1786 		.alg = "__driver-ecb-serpent-avx",
1787 		.test = alg_test_null,
1788 	}, {
1789 		.alg = "__driver-ecb-serpent-avx2",
1790 		.test = alg_test_null,
1791 	}, {
1792 		.alg = "__driver-ecb-serpent-sse2",
1793 		.test = alg_test_null,
1794 	}, {
1795 		.alg = "__driver-ecb-twofish-avx",
1796 		.test = alg_test_null,
1797 	}, {
1798 		.alg = "__ghash-pclmulqdqni",
1799 		.test = alg_test_null,
1800 		.fips_allowed = 1,
1801 	}, {
1802 		.alg = "ansi_cprng",
1803 		.test = alg_test_cprng,
1804 		.fips_allowed = 1,
1805 		.suite = {
1806 			.cprng = {
1807 				.vecs = ansi_cprng_aes_tv_template,
1808 				.count = ANSI_CPRNG_AES_TEST_VECTORS
1809 			}
1810 		}
1811 	}, {
1812 		.alg = "authenc(hmac(sha1),cbc(aes))",
1813 		.test = alg_test_aead,
1814 		.fips_allowed = 1,
1815 		.suite = {
1816 			.aead = {
1817 				.enc = {
1818 					.vecs = hmac_sha1_aes_cbc_enc_tv_template,
1819 					.count = HMAC_SHA1_AES_CBC_ENC_TEST_VECTORS
1820 				}
1821 			}
1822 		}
1823 	}, {
1824 		.alg = "authenc(hmac(sha256),cbc(aes))",
1825 		.test = alg_test_aead,
1826 		.fips_allowed = 1,
1827 		.suite = {
1828 			.aead = {
1829 				.enc = {
1830 					.vecs = hmac_sha256_aes_cbc_enc_tv_template,
1831 					.count = HMAC_SHA256_AES_CBC_ENC_TEST_VECTORS
1832 				}
1833 			}
1834 		}
1835 	}, {
1836 		.alg = "authenc(hmac(sha512),cbc(aes))",
1837 		.test = alg_test_aead,
1838 		.fips_allowed = 1,
1839 		.suite = {
1840 			.aead = {
1841 				.enc = {
1842 					.vecs = hmac_sha512_aes_cbc_enc_tv_template,
1843 					.count = HMAC_SHA512_AES_CBC_ENC_TEST_VECTORS
1844 				}
1845 			}
1846 		}
1847 	}, {
1848 		.alg = "cbc(aes)",
1849 		.test = alg_test_skcipher,
1850 		.fips_allowed = 1,
1851 		.suite = {
1852 			.cipher = {
1853 				.enc = {
1854 					.vecs = aes_cbc_enc_tv_template,
1855 					.count = AES_CBC_ENC_TEST_VECTORS
1856 				},
1857 				.dec = {
1858 					.vecs = aes_cbc_dec_tv_template,
1859 					.count = AES_CBC_DEC_TEST_VECTORS
1860 				}
1861 			}
1862 		}
1863 	}, {
1864 		.alg = "cbc(anubis)",
1865 		.test = alg_test_skcipher,
1866 		.suite = {
1867 			.cipher = {
1868 				.enc = {
1869 					.vecs = anubis_cbc_enc_tv_template,
1870 					.count = ANUBIS_CBC_ENC_TEST_VECTORS
1871 				},
1872 				.dec = {
1873 					.vecs = anubis_cbc_dec_tv_template,
1874 					.count = ANUBIS_CBC_DEC_TEST_VECTORS
1875 				}
1876 			}
1877 		}
1878 	}, {
1879 		.alg = "cbc(blowfish)",
1880 		.test = alg_test_skcipher,
1881 		.suite = {
1882 			.cipher = {
1883 				.enc = {
1884 					.vecs = bf_cbc_enc_tv_template,
1885 					.count = BF_CBC_ENC_TEST_VECTORS
1886 				},
1887 				.dec = {
1888 					.vecs = bf_cbc_dec_tv_template,
1889 					.count = BF_CBC_DEC_TEST_VECTORS
1890 				}
1891 			}
1892 		}
1893 	}, {
1894 		.alg = "cbc(camellia)",
1895 		.test = alg_test_skcipher,
1896 		.suite = {
1897 			.cipher = {
1898 				.enc = {
1899 					.vecs = camellia_cbc_enc_tv_template,
1900 					.count = CAMELLIA_CBC_ENC_TEST_VECTORS
1901 				},
1902 				.dec = {
1903 					.vecs = camellia_cbc_dec_tv_template,
1904 					.count = CAMELLIA_CBC_DEC_TEST_VECTORS
1905 				}
1906 			}
1907 		}
1908 	}, {
1909 		.alg = "cbc(cast5)",
1910 		.test = alg_test_skcipher,
1911 		.suite = {
1912 			.cipher = {
1913 				.enc = {
1914 					.vecs = cast5_cbc_enc_tv_template,
1915 					.count = CAST5_CBC_ENC_TEST_VECTORS
1916 				},
1917 				.dec = {
1918 					.vecs = cast5_cbc_dec_tv_template,
1919 					.count = CAST5_CBC_DEC_TEST_VECTORS
1920 				}
1921 			}
1922 		}
1923 	}, {
1924 		.alg = "cbc(cast6)",
1925 		.test = alg_test_skcipher,
1926 		.suite = {
1927 			.cipher = {
1928 				.enc = {
1929 					.vecs = cast6_cbc_enc_tv_template,
1930 					.count = CAST6_CBC_ENC_TEST_VECTORS
1931 				},
1932 				.dec = {
1933 					.vecs = cast6_cbc_dec_tv_template,
1934 					.count = CAST6_CBC_DEC_TEST_VECTORS
1935 				}
1936 			}
1937 		}
1938 	}, {
1939 		.alg = "cbc(des)",
1940 		.test = alg_test_skcipher,
1941 		.suite = {
1942 			.cipher = {
1943 				.enc = {
1944 					.vecs = des_cbc_enc_tv_template,
1945 					.count = DES_CBC_ENC_TEST_VECTORS
1946 				},
1947 				.dec = {
1948 					.vecs = des_cbc_dec_tv_template,
1949 					.count = DES_CBC_DEC_TEST_VECTORS
1950 				}
1951 			}
1952 		}
1953 	}, {
1954 		.alg = "cbc(des3_ede)",
1955 		.test = alg_test_skcipher,
1956 		.fips_allowed = 1,
1957 		.suite = {
1958 			.cipher = {
1959 				.enc = {
1960 					.vecs = des3_ede_cbc_enc_tv_template,
1961 					.count = DES3_EDE_CBC_ENC_TEST_VECTORS
1962 				},
1963 				.dec = {
1964 					.vecs = des3_ede_cbc_dec_tv_template,
1965 					.count = DES3_EDE_CBC_DEC_TEST_VECTORS
1966 				}
1967 			}
1968 		}
1969 	}, {
1970 		.alg = "cbc(serpent)",
1971 		.test = alg_test_skcipher,
1972 		.suite = {
1973 			.cipher = {
1974 				.enc = {
1975 					.vecs = serpent_cbc_enc_tv_template,
1976 					.count = SERPENT_CBC_ENC_TEST_VECTORS
1977 				},
1978 				.dec = {
1979 					.vecs = serpent_cbc_dec_tv_template,
1980 					.count = SERPENT_CBC_DEC_TEST_VECTORS
1981 				}
1982 			}
1983 		}
1984 	}, {
1985 		.alg = "cbc(twofish)",
1986 		.test = alg_test_skcipher,
1987 		.suite = {
1988 			.cipher = {
1989 				.enc = {
1990 					.vecs = tf_cbc_enc_tv_template,
1991 					.count = TF_CBC_ENC_TEST_VECTORS
1992 				},
1993 				.dec = {
1994 					.vecs = tf_cbc_dec_tv_template,
1995 					.count = TF_CBC_DEC_TEST_VECTORS
1996 				}
1997 			}
1998 		}
1999 	}, {
2000 		.alg = "ccm(aes)",
2001 		.test = alg_test_aead,
2002 		.fips_allowed = 1,
2003 		.suite = {
2004 			.aead = {
2005 				.enc = {
2006 					.vecs = aes_ccm_enc_tv_template,
2007 					.count = AES_CCM_ENC_TEST_VECTORS
2008 				},
2009 				.dec = {
2010 					.vecs = aes_ccm_dec_tv_template,
2011 					.count = AES_CCM_DEC_TEST_VECTORS
2012 				}
2013 			}
2014 		}
2015 	}, {
2016 		.alg = "cmac(aes)",
2017 		.test = alg_test_hash,
2018 		.suite = {
2019 			.hash = {
2020 				.vecs = aes_cmac128_tv_template,
2021 				.count = CMAC_AES_TEST_VECTORS
2022 			}
2023 		}
2024 	}, {
2025 		.alg = "cmac(des3_ede)",
2026 		.test = alg_test_hash,
2027 		.suite = {
2028 			.hash = {
2029 				.vecs = des3_ede_cmac64_tv_template,
2030 				.count = CMAC_DES3_EDE_TEST_VECTORS
2031 			}
2032 		}
2033 	}, {
2034 		.alg = "compress_null",
2035 		.test = alg_test_null,
2036 	}, {
2037 		.alg = "crc32c",
2038 		.test = alg_test_crc32c,
2039 		.fips_allowed = 1,
2040 		.suite = {
2041 			.hash = {
2042 				.vecs = crc32c_tv_template,
2043 				.count = CRC32C_TEST_VECTORS
2044 			}
2045 		}
2046 	}, {
2047 		.alg = "crct10dif",
2048 		.test = alg_test_hash,
2049 		.fips_allowed = 1,
2050 		.suite = {
2051 			.hash = {
2052 				.vecs = crct10dif_tv_template,
2053 				.count = CRCT10DIF_TEST_VECTORS
2054 			}
2055 		}
2056 	}, {
2057 		.alg = "cryptd(__driver-cbc-aes-aesni)",
2058 		.test = alg_test_null,
2059 		.fips_allowed = 1,
2060 	}, {
2061 		.alg = "cryptd(__driver-cbc-camellia-aesni)",
2062 		.test = alg_test_null,
2063 	}, {
2064 		.alg = "cryptd(__driver-cbc-camellia-aesni-avx2)",
2065 		.test = alg_test_null,
2066 	}, {
2067 		.alg = "cryptd(__driver-cbc-serpent-avx2)",
2068 		.test = alg_test_null,
2069 	}, {
2070 		.alg = "cryptd(__driver-ecb-aes-aesni)",
2071 		.test = alg_test_null,
2072 		.fips_allowed = 1,
2073 	}, {
2074 		.alg = "cryptd(__driver-ecb-camellia-aesni)",
2075 		.test = alg_test_null,
2076 	}, {
2077 		.alg = "cryptd(__driver-ecb-camellia-aesni-avx2)",
2078 		.test = alg_test_null,
2079 	}, {
2080 		.alg = "cryptd(__driver-ecb-cast5-avx)",
2081 		.test = alg_test_null,
2082 	}, {
2083 		.alg = "cryptd(__driver-ecb-cast6-avx)",
2084 		.test = alg_test_null,
2085 	}, {
2086 		.alg = "cryptd(__driver-ecb-serpent-avx)",
2087 		.test = alg_test_null,
2088 	}, {
2089 		.alg = "cryptd(__driver-ecb-serpent-avx2)",
2090 		.test = alg_test_null,
2091 	}, {
2092 		.alg = "cryptd(__driver-ecb-serpent-sse2)",
2093 		.test = alg_test_null,
2094 	}, {
2095 		.alg = "cryptd(__driver-ecb-twofish-avx)",
2096 		.test = alg_test_null,
2097 	}, {
2098 		.alg = "cryptd(__driver-gcm-aes-aesni)",
2099 		.test = alg_test_null,
2100 		.fips_allowed = 1,
2101 	}, {
2102 		.alg = "cryptd(__ghash-pclmulqdqni)",
2103 		.test = alg_test_null,
2104 		.fips_allowed = 1,
2105 	}, {
2106 		.alg = "ctr(aes)",
2107 		.test = alg_test_skcipher,
2108 		.fips_allowed = 1,
2109 		.suite = {
2110 			.cipher = {
2111 				.enc = {
2112 					.vecs = aes_ctr_enc_tv_template,
2113 					.count = AES_CTR_ENC_TEST_VECTORS
2114 				},
2115 				.dec = {
2116 					.vecs = aes_ctr_dec_tv_template,
2117 					.count = AES_CTR_DEC_TEST_VECTORS
2118 				}
2119 			}
2120 		}
2121 	}, {
2122 		.alg = "ctr(blowfish)",
2123 		.test = alg_test_skcipher,
2124 		.suite = {
2125 			.cipher = {
2126 				.enc = {
2127 					.vecs = bf_ctr_enc_tv_template,
2128 					.count = BF_CTR_ENC_TEST_VECTORS
2129 				},
2130 				.dec = {
2131 					.vecs = bf_ctr_dec_tv_template,
2132 					.count = BF_CTR_DEC_TEST_VECTORS
2133 				}
2134 			}
2135 		}
2136 	}, {
2137 		.alg = "ctr(camellia)",
2138 		.test = alg_test_skcipher,
2139 		.suite = {
2140 			.cipher = {
2141 				.enc = {
2142 					.vecs = camellia_ctr_enc_tv_template,
2143 					.count = CAMELLIA_CTR_ENC_TEST_VECTORS
2144 				},
2145 				.dec = {
2146 					.vecs = camellia_ctr_dec_tv_template,
2147 					.count = CAMELLIA_CTR_DEC_TEST_VECTORS
2148 				}
2149 			}
2150 		}
2151 	}, {
2152 		.alg = "ctr(cast5)",
2153 		.test = alg_test_skcipher,
2154 		.suite = {
2155 			.cipher = {
2156 				.enc = {
2157 					.vecs = cast5_ctr_enc_tv_template,
2158 					.count = CAST5_CTR_ENC_TEST_VECTORS
2159 				},
2160 				.dec = {
2161 					.vecs = cast5_ctr_dec_tv_template,
2162 					.count = CAST5_CTR_DEC_TEST_VECTORS
2163 				}
2164 			}
2165 		}
2166 	}, {
2167 		.alg = "ctr(cast6)",
2168 		.test = alg_test_skcipher,
2169 		.suite = {
2170 			.cipher = {
2171 				.enc = {
2172 					.vecs = cast6_ctr_enc_tv_template,
2173 					.count = CAST6_CTR_ENC_TEST_VECTORS
2174 				},
2175 				.dec = {
2176 					.vecs = cast6_ctr_dec_tv_template,
2177 					.count = CAST6_CTR_DEC_TEST_VECTORS
2178 				}
2179 			}
2180 		}
2181 	}, {
2182 		.alg = "ctr(des)",
2183 		.test = alg_test_skcipher,
2184 		.suite = {
2185 			.cipher = {
2186 				.enc = {
2187 					.vecs = des_ctr_enc_tv_template,
2188 					.count = DES_CTR_ENC_TEST_VECTORS
2189 				},
2190 				.dec = {
2191 					.vecs = des_ctr_dec_tv_template,
2192 					.count = DES_CTR_DEC_TEST_VECTORS
2193 				}
2194 			}
2195 		}
2196 	}, {
2197 		.alg = "ctr(des3_ede)",
2198 		.test = alg_test_skcipher,
2199 		.suite = {
2200 			.cipher = {
2201 				.enc = {
2202 					.vecs = des3_ede_ctr_enc_tv_template,
2203 					.count = DES3_EDE_CTR_ENC_TEST_VECTORS
2204 				},
2205 				.dec = {
2206 					.vecs = des3_ede_ctr_dec_tv_template,
2207 					.count = DES3_EDE_CTR_DEC_TEST_VECTORS
2208 				}
2209 			}
2210 		}
2211 	}, {
2212 		.alg = "ctr(serpent)",
2213 		.test = alg_test_skcipher,
2214 		.suite = {
2215 			.cipher = {
2216 				.enc = {
2217 					.vecs = serpent_ctr_enc_tv_template,
2218 					.count = SERPENT_CTR_ENC_TEST_VECTORS
2219 				},
2220 				.dec = {
2221 					.vecs = serpent_ctr_dec_tv_template,
2222 					.count = SERPENT_CTR_DEC_TEST_VECTORS
2223 				}
2224 			}
2225 		}
2226 	}, {
2227 		.alg = "ctr(twofish)",
2228 		.test = alg_test_skcipher,
2229 		.suite = {
2230 			.cipher = {
2231 				.enc = {
2232 					.vecs = tf_ctr_enc_tv_template,
2233 					.count = TF_CTR_ENC_TEST_VECTORS
2234 				},
2235 				.dec = {
2236 					.vecs = tf_ctr_dec_tv_template,
2237 					.count = TF_CTR_DEC_TEST_VECTORS
2238 				}
2239 			}
2240 		}
2241 	}, {
2242 		.alg = "cts(cbc(aes))",
2243 		.test = alg_test_skcipher,
2244 		.suite = {
2245 			.cipher = {
2246 				.enc = {
2247 					.vecs = cts_mode_enc_tv_template,
2248 					.count = CTS_MODE_ENC_TEST_VECTORS
2249 				},
2250 				.dec = {
2251 					.vecs = cts_mode_dec_tv_template,
2252 					.count = CTS_MODE_DEC_TEST_VECTORS
2253 				}
2254 			}
2255 		}
2256 	}, {
2257 		.alg = "deflate",
2258 		.test = alg_test_comp,
2259 		.fips_allowed = 1,
2260 		.suite = {
2261 			.comp = {
2262 				.comp = {
2263 					.vecs = deflate_comp_tv_template,
2264 					.count = DEFLATE_COMP_TEST_VECTORS
2265 				},
2266 				.decomp = {
2267 					.vecs = deflate_decomp_tv_template,
2268 					.count = DEFLATE_DECOMP_TEST_VECTORS
2269 				}
2270 			}
2271 		}
2272 	}, {
2273 		.alg = "digest_null",
2274 		.test = alg_test_null,
2275 	}, {
2276 		.alg = "ecb(__aes-aesni)",
2277 		.test = alg_test_null,
2278 		.fips_allowed = 1,
2279 	}, {
2280 		.alg = "ecb(aes)",
2281 		.test = alg_test_skcipher,
2282 		.fips_allowed = 1,
2283 		.suite = {
2284 			.cipher = {
2285 				.enc = {
2286 					.vecs = aes_enc_tv_template,
2287 					.count = AES_ENC_TEST_VECTORS
2288 				},
2289 				.dec = {
2290 					.vecs = aes_dec_tv_template,
2291 					.count = AES_DEC_TEST_VECTORS
2292 				}
2293 			}
2294 		}
2295 	}, {
2296 		.alg = "ecb(anubis)",
2297 		.test = alg_test_skcipher,
2298 		.suite = {
2299 			.cipher = {
2300 				.enc = {
2301 					.vecs = anubis_enc_tv_template,
2302 					.count = ANUBIS_ENC_TEST_VECTORS
2303 				},
2304 				.dec = {
2305 					.vecs = anubis_dec_tv_template,
2306 					.count = ANUBIS_DEC_TEST_VECTORS
2307 				}
2308 			}
2309 		}
2310 	}, {
2311 		.alg = "ecb(arc4)",
2312 		.test = alg_test_skcipher,
2313 		.suite = {
2314 			.cipher = {
2315 				.enc = {
2316 					.vecs = arc4_enc_tv_template,
2317 					.count = ARC4_ENC_TEST_VECTORS
2318 				},
2319 				.dec = {
2320 					.vecs = arc4_dec_tv_template,
2321 					.count = ARC4_DEC_TEST_VECTORS
2322 				}
2323 			}
2324 		}
2325 	}, {
2326 		.alg = "ecb(blowfish)",
2327 		.test = alg_test_skcipher,
2328 		.suite = {
2329 			.cipher = {
2330 				.enc = {
2331 					.vecs = bf_enc_tv_template,
2332 					.count = BF_ENC_TEST_VECTORS
2333 				},
2334 				.dec = {
2335 					.vecs = bf_dec_tv_template,
2336 					.count = BF_DEC_TEST_VECTORS
2337 				}
2338 			}
2339 		}
2340 	}, {
2341 		.alg = "ecb(camellia)",
2342 		.test = alg_test_skcipher,
2343 		.suite = {
2344 			.cipher = {
2345 				.enc = {
2346 					.vecs = camellia_enc_tv_template,
2347 					.count = CAMELLIA_ENC_TEST_VECTORS
2348 				},
2349 				.dec = {
2350 					.vecs = camellia_dec_tv_template,
2351 					.count = CAMELLIA_DEC_TEST_VECTORS
2352 				}
2353 			}
2354 		}
2355 	}, {
2356 		.alg = "ecb(cast5)",
2357 		.test = alg_test_skcipher,
2358 		.suite = {
2359 			.cipher = {
2360 				.enc = {
2361 					.vecs = cast5_enc_tv_template,
2362 					.count = CAST5_ENC_TEST_VECTORS
2363 				},
2364 				.dec = {
2365 					.vecs = cast5_dec_tv_template,
2366 					.count = CAST5_DEC_TEST_VECTORS
2367 				}
2368 			}
2369 		}
2370 	}, {
2371 		.alg = "ecb(cast6)",
2372 		.test = alg_test_skcipher,
2373 		.suite = {
2374 			.cipher = {
2375 				.enc = {
2376 					.vecs = cast6_enc_tv_template,
2377 					.count = CAST6_ENC_TEST_VECTORS
2378 				},
2379 				.dec = {
2380 					.vecs = cast6_dec_tv_template,
2381 					.count = CAST6_DEC_TEST_VECTORS
2382 				}
2383 			}
2384 		}
2385 	}, {
2386 		.alg = "ecb(cipher_null)",
2387 		.test = alg_test_null,
2388 	}, {
2389 		.alg = "ecb(des)",
2390 		.test = alg_test_skcipher,
2391 		.fips_allowed = 1,
2392 		.suite = {
2393 			.cipher = {
2394 				.enc = {
2395 					.vecs = des_enc_tv_template,
2396 					.count = DES_ENC_TEST_VECTORS
2397 				},
2398 				.dec = {
2399 					.vecs = des_dec_tv_template,
2400 					.count = DES_DEC_TEST_VECTORS
2401 				}
2402 			}
2403 		}
2404 	}, {
2405 		.alg = "ecb(des3_ede)",
2406 		.test = alg_test_skcipher,
2407 		.fips_allowed = 1,
2408 		.suite = {
2409 			.cipher = {
2410 				.enc = {
2411 					.vecs = des3_ede_enc_tv_template,
2412 					.count = DES3_EDE_ENC_TEST_VECTORS
2413 				},
2414 				.dec = {
2415 					.vecs = des3_ede_dec_tv_template,
2416 					.count = DES3_EDE_DEC_TEST_VECTORS
2417 				}
2418 			}
2419 		}
2420 	}, {
2421 		.alg = "ecb(fcrypt)",
2422 		.test = alg_test_skcipher,
2423 		.suite = {
2424 			.cipher = {
2425 				.enc = {
2426 					.vecs = fcrypt_pcbc_enc_tv_template,
2427 					.count = 1
2428 				},
2429 				.dec = {
2430 					.vecs = fcrypt_pcbc_dec_tv_template,
2431 					.count = 1
2432 				}
2433 			}
2434 		}
2435 	}, {
2436 		.alg = "ecb(khazad)",
2437 		.test = alg_test_skcipher,
2438 		.suite = {
2439 			.cipher = {
2440 				.enc = {
2441 					.vecs = khazad_enc_tv_template,
2442 					.count = KHAZAD_ENC_TEST_VECTORS
2443 				},
2444 				.dec = {
2445 					.vecs = khazad_dec_tv_template,
2446 					.count = KHAZAD_DEC_TEST_VECTORS
2447 				}
2448 			}
2449 		}
2450 	}, {
2451 		.alg = "ecb(seed)",
2452 		.test = alg_test_skcipher,
2453 		.suite = {
2454 			.cipher = {
2455 				.enc = {
2456 					.vecs = seed_enc_tv_template,
2457 					.count = SEED_ENC_TEST_VECTORS
2458 				},
2459 				.dec = {
2460 					.vecs = seed_dec_tv_template,
2461 					.count = SEED_DEC_TEST_VECTORS
2462 				}
2463 			}
2464 		}
2465 	}, {
2466 		.alg = "ecb(serpent)",
2467 		.test = alg_test_skcipher,
2468 		.suite = {
2469 			.cipher = {
2470 				.enc = {
2471 					.vecs = serpent_enc_tv_template,
2472 					.count = SERPENT_ENC_TEST_VECTORS
2473 				},
2474 				.dec = {
2475 					.vecs = serpent_dec_tv_template,
2476 					.count = SERPENT_DEC_TEST_VECTORS
2477 				}
2478 			}
2479 		}
2480 	}, {
2481 		.alg = "ecb(tea)",
2482 		.test = alg_test_skcipher,
2483 		.suite = {
2484 			.cipher = {
2485 				.enc = {
2486 					.vecs = tea_enc_tv_template,
2487 					.count = TEA_ENC_TEST_VECTORS
2488 				},
2489 				.dec = {
2490 					.vecs = tea_dec_tv_template,
2491 					.count = TEA_DEC_TEST_VECTORS
2492 				}
2493 			}
2494 		}
2495 	}, {
2496 		.alg = "ecb(tnepres)",
2497 		.test = alg_test_skcipher,
2498 		.suite = {
2499 			.cipher = {
2500 				.enc = {
2501 					.vecs = tnepres_enc_tv_template,
2502 					.count = TNEPRES_ENC_TEST_VECTORS
2503 				},
2504 				.dec = {
2505 					.vecs = tnepres_dec_tv_template,
2506 					.count = TNEPRES_DEC_TEST_VECTORS
2507 				}
2508 			}
2509 		}
2510 	}, {
2511 		.alg = "ecb(twofish)",
2512 		.test = alg_test_skcipher,
2513 		.suite = {
2514 			.cipher = {
2515 				.enc = {
2516 					.vecs = tf_enc_tv_template,
2517 					.count = TF_ENC_TEST_VECTORS
2518 				},
2519 				.dec = {
2520 					.vecs = tf_dec_tv_template,
2521 					.count = TF_DEC_TEST_VECTORS
2522 				}
2523 			}
2524 		}
2525 	}, {
2526 		.alg = "ecb(xeta)",
2527 		.test = alg_test_skcipher,
2528 		.suite = {
2529 			.cipher = {
2530 				.enc = {
2531 					.vecs = xeta_enc_tv_template,
2532 					.count = XETA_ENC_TEST_VECTORS
2533 				},
2534 				.dec = {
2535 					.vecs = xeta_dec_tv_template,
2536 					.count = XETA_DEC_TEST_VECTORS
2537 				}
2538 			}
2539 		}
2540 	}, {
2541 		.alg = "ecb(xtea)",
2542 		.test = alg_test_skcipher,
2543 		.suite = {
2544 			.cipher = {
2545 				.enc = {
2546 					.vecs = xtea_enc_tv_template,
2547 					.count = XTEA_ENC_TEST_VECTORS
2548 				},
2549 				.dec = {
2550 					.vecs = xtea_dec_tv_template,
2551 					.count = XTEA_DEC_TEST_VECTORS
2552 				}
2553 			}
2554 		}
2555 	}, {
2556 		.alg = "gcm(aes)",
2557 		.test = alg_test_aead,
2558 		.fips_allowed = 1,
2559 		.suite = {
2560 			.aead = {
2561 				.enc = {
2562 					.vecs = aes_gcm_enc_tv_template,
2563 					.count = AES_GCM_ENC_TEST_VECTORS
2564 				},
2565 				.dec = {
2566 					.vecs = aes_gcm_dec_tv_template,
2567 					.count = AES_GCM_DEC_TEST_VECTORS
2568 				}
2569 			}
2570 		}
2571 	}, {
2572 		.alg = "ghash",
2573 		.test = alg_test_hash,
2574 		.fips_allowed = 1,
2575 		.suite = {
2576 			.hash = {
2577 				.vecs = ghash_tv_template,
2578 				.count = GHASH_TEST_VECTORS
2579 			}
2580 		}
2581 	}, {
2582 		.alg = "hmac(crc32)",
2583 		.test = alg_test_hash,
2584 		.suite = {
2585 			.hash = {
2586 				.vecs = bfin_crc_tv_template,
2587 				.count = BFIN_CRC_TEST_VECTORS
2588 			}
2589 		}
2590 	}, {
2591 		.alg = "hmac(md5)",
2592 		.test = alg_test_hash,
2593 		.suite = {
2594 			.hash = {
2595 				.vecs = hmac_md5_tv_template,
2596 				.count = HMAC_MD5_TEST_VECTORS
2597 			}
2598 		}
2599 	}, {
2600 		.alg = "hmac(rmd128)",
2601 		.test = alg_test_hash,
2602 		.suite = {
2603 			.hash = {
2604 				.vecs = hmac_rmd128_tv_template,
2605 				.count = HMAC_RMD128_TEST_VECTORS
2606 			}
2607 		}
2608 	}, {
2609 		.alg = "hmac(rmd160)",
2610 		.test = alg_test_hash,
2611 		.suite = {
2612 			.hash = {
2613 				.vecs = hmac_rmd160_tv_template,
2614 				.count = HMAC_RMD160_TEST_VECTORS
2615 			}
2616 		}
2617 	}, {
2618 		.alg = "hmac(sha1)",
2619 		.test = alg_test_hash,
2620 		.fips_allowed = 1,
2621 		.suite = {
2622 			.hash = {
2623 				.vecs = hmac_sha1_tv_template,
2624 				.count = HMAC_SHA1_TEST_VECTORS
2625 			}
2626 		}
2627 	}, {
2628 		.alg = "hmac(sha224)",
2629 		.test = alg_test_hash,
2630 		.fips_allowed = 1,
2631 		.suite = {
2632 			.hash = {
2633 				.vecs = hmac_sha224_tv_template,
2634 				.count = HMAC_SHA224_TEST_VECTORS
2635 			}
2636 		}
2637 	}, {
2638 		.alg = "hmac(sha256)",
2639 		.test = alg_test_hash,
2640 		.fips_allowed = 1,
2641 		.suite = {
2642 			.hash = {
2643 				.vecs = hmac_sha256_tv_template,
2644 				.count = HMAC_SHA256_TEST_VECTORS
2645 			}
2646 		}
2647 	}, {
2648 		.alg = "hmac(sha384)",
2649 		.test = alg_test_hash,
2650 		.fips_allowed = 1,
2651 		.suite = {
2652 			.hash = {
2653 				.vecs = hmac_sha384_tv_template,
2654 				.count = HMAC_SHA384_TEST_VECTORS
2655 			}
2656 		}
2657 	}, {
2658 		.alg = "hmac(sha512)",
2659 		.test = alg_test_hash,
2660 		.fips_allowed = 1,
2661 		.suite = {
2662 			.hash = {
2663 				.vecs = hmac_sha512_tv_template,
2664 				.count = HMAC_SHA512_TEST_VECTORS
2665 			}
2666 		}
2667 	}, {
2668 		.alg = "lrw(aes)",
2669 		.test = alg_test_skcipher,
2670 		.suite = {
2671 			.cipher = {
2672 				.enc = {
2673 					.vecs = aes_lrw_enc_tv_template,
2674 					.count = AES_LRW_ENC_TEST_VECTORS
2675 				},
2676 				.dec = {
2677 					.vecs = aes_lrw_dec_tv_template,
2678 					.count = AES_LRW_DEC_TEST_VECTORS
2679 				}
2680 			}
2681 		}
2682 	}, {
2683 		.alg = "lrw(camellia)",
2684 		.test = alg_test_skcipher,
2685 		.suite = {
2686 			.cipher = {
2687 				.enc = {
2688 					.vecs = camellia_lrw_enc_tv_template,
2689 					.count = CAMELLIA_LRW_ENC_TEST_VECTORS
2690 				},
2691 				.dec = {
2692 					.vecs = camellia_lrw_dec_tv_template,
2693 					.count = CAMELLIA_LRW_DEC_TEST_VECTORS
2694 				}
2695 			}
2696 		}
2697 	}, {
2698 		.alg = "lrw(cast6)",
2699 		.test = alg_test_skcipher,
2700 		.suite = {
2701 			.cipher = {
2702 				.enc = {
2703 					.vecs = cast6_lrw_enc_tv_template,
2704 					.count = CAST6_LRW_ENC_TEST_VECTORS
2705 				},
2706 				.dec = {
2707 					.vecs = cast6_lrw_dec_tv_template,
2708 					.count = CAST6_LRW_DEC_TEST_VECTORS
2709 				}
2710 			}
2711 		}
2712 	}, {
2713 		.alg = "lrw(serpent)",
2714 		.test = alg_test_skcipher,
2715 		.suite = {
2716 			.cipher = {
2717 				.enc = {
2718 					.vecs = serpent_lrw_enc_tv_template,
2719 					.count = SERPENT_LRW_ENC_TEST_VECTORS
2720 				},
2721 				.dec = {
2722 					.vecs = serpent_lrw_dec_tv_template,
2723 					.count = SERPENT_LRW_DEC_TEST_VECTORS
2724 				}
2725 			}
2726 		}
2727 	}, {
2728 		.alg = "lrw(twofish)",
2729 		.test = alg_test_skcipher,
2730 		.suite = {
2731 			.cipher = {
2732 				.enc = {
2733 					.vecs = tf_lrw_enc_tv_template,
2734 					.count = TF_LRW_ENC_TEST_VECTORS
2735 				},
2736 				.dec = {
2737 					.vecs = tf_lrw_dec_tv_template,
2738 					.count = TF_LRW_DEC_TEST_VECTORS
2739 				}
2740 			}
2741 		}
2742 	}, {
2743 		.alg = "lzo",
2744 		.test = alg_test_comp,
2745 		.fips_allowed = 1,
2746 		.suite = {
2747 			.comp = {
2748 				.comp = {
2749 					.vecs = lzo_comp_tv_template,
2750 					.count = LZO_COMP_TEST_VECTORS
2751 				},
2752 				.decomp = {
2753 					.vecs = lzo_decomp_tv_template,
2754 					.count = LZO_DECOMP_TEST_VECTORS
2755 				}
2756 			}
2757 		}
2758 	}, {
2759 		.alg = "md4",
2760 		.test = alg_test_hash,
2761 		.suite = {
2762 			.hash = {
2763 				.vecs = md4_tv_template,
2764 				.count = MD4_TEST_VECTORS
2765 			}
2766 		}
2767 	}, {
2768 		.alg = "md5",
2769 		.test = alg_test_hash,
2770 		.suite = {
2771 			.hash = {
2772 				.vecs = md5_tv_template,
2773 				.count = MD5_TEST_VECTORS
2774 			}
2775 		}
2776 	}, {
2777 		.alg = "michael_mic",
2778 		.test = alg_test_hash,
2779 		.suite = {
2780 			.hash = {
2781 				.vecs = michael_mic_tv_template,
2782 				.count = MICHAEL_MIC_TEST_VECTORS
2783 			}
2784 		}
2785 	}, {
2786 		.alg = "ofb(aes)",
2787 		.test = alg_test_skcipher,
2788 		.fips_allowed = 1,
2789 		.suite = {
2790 			.cipher = {
2791 				.enc = {
2792 					.vecs = aes_ofb_enc_tv_template,
2793 					.count = AES_OFB_ENC_TEST_VECTORS
2794 				},
2795 				.dec = {
2796 					.vecs = aes_ofb_dec_tv_template,
2797 					.count = AES_OFB_DEC_TEST_VECTORS
2798 				}
2799 			}
2800 		}
2801 	}, {
2802 		.alg = "pcbc(fcrypt)",
2803 		.test = alg_test_skcipher,
2804 		.suite = {
2805 			.cipher = {
2806 				.enc = {
2807 					.vecs = fcrypt_pcbc_enc_tv_template,
2808 					.count = FCRYPT_ENC_TEST_VECTORS
2809 				},
2810 				.dec = {
2811 					.vecs = fcrypt_pcbc_dec_tv_template,
2812 					.count = FCRYPT_DEC_TEST_VECTORS
2813 				}
2814 			}
2815 		}
2816 	}, {
2817 		.alg = "rfc3686(ctr(aes))",
2818 		.test = alg_test_skcipher,
2819 		.fips_allowed = 1,
2820 		.suite = {
2821 			.cipher = {
2822 				.enc = {
2823 					.vecs = aes_ctr_rfc3686_enc_tv_template,
2824 					.count = AES_CTR_3686_ENC_TEST_VECTORS
2825 				},
2826 				.dec = {
2827 					.vecs = aes_ctr_rfc3686_dec_tv_template,
2828 					.count = AES_CTR_3686_DEC_TEST_VECTORS
2829 				}
2830 			}
2831 		}
2832 	}, {
2833 		.alg = "rfc4106(gcm(aes))",
2834 		.test = alg_test_aead,
2835 		.suite = {
2836 			.aead = {
2837 				.enc = {
2838 					.vecs = aes_gcm_rfc4106_enc_tv_template,
2839 					.count = AES_GCM_4106_ENC_TEST_VECTORS
2840 				},
2841 				.dec = {
2842 					.vecs = aes_gcm_rfc4106_dec_tv_template,
2843 					.count = AES_GCM_4106_DEC_TEST_VECTORS
2844 				}
2845 			}
2846 		}
2847 	}, {
2848 		.alg = "rfc4309(ccm(aes))",
2849 		.test = alg_test_aead,
2850 		.fips_allowed = 1,
2851 		.suite = {
2852 			.aead = {
2853 				.enc = {
2854 					.vecs = aes_ccm_rfc4309_enc_tv_template,
2855 					.count = AES_CCM_4309_ENC_TEST_VECTORS
2856 				},
2857 				.dec = {
2858 					.vecs = aes_ccm_rfc4309_dec_tv_template,
2859 					.count = AES_CCM_4309_DEC_TEST_VECTORS
2860 				}
2861 			}
2862 		}
2863 	}, {
2864 		.alg = "rfc4543(gcm(aes))",
2865 		.test = alg_test_aead,
2866 		.suite = {
2867 			.aead = {
2868 				.enc = {
2869 					.vecs = aes_gcm_rfc4543_enc_tv_template,
2870 					.count = AES_GCM_4543_ENC_TEST_VECTORS
2871 				},
2872 				.dec = {
2873 					.vecs = aes_gcm_rfc4543_dec_tv_template,
2874 					.count = AES_GCM_4543_DEC_TEST_VECTORS
2875 				},
2876 			}
2877 		}
2878 	}, {
2879 		.alg = "rmd128",
2880 		.test = alg_test_hash,
2881 		.suite = {
2882 			.hash = {
2883 				.vecs = rmd128_tv_template,
2884 				.count = RMD128_TEST_VECTORS
2885 			}
2886 		}
2887 	}, {
2888 		.alg = "rmd160",
2889 		.test = alg_test_hash,
2890 		.suite = {
2891 			.hash = {
2892 				.vecs = rmd160_tv_template,
2893 				.count = RMD160_TEST_VECTORS
2894 			}
2895 		}
2896 	}, {
2897 		.alg = "rmd256",
2898 		.test = alg_test_hash,
2899 		.suite = {
2900 			.hash = {
2901 				.vecs = rmd256_tv_template,
2902 				.count = RMD256_TEST_VECTORS
2903 			}
2904 		}
2905 	}, {
2906 		.alg = "rmd320",
2907 		.test = alg_test_hash,
2908 		.suite = {
2909 			.hash = {
2910 				.vecs = rmd320_tv_template,
2911 				.count = RMD320_TEST_VECTORS
2912 			}
2913 		}
2914 	}, {
2915 		.alg = "salsa20",
2916 		.test = alg_test_skcipher,
2917 		.suite = {
2918 			.cipher = {
2919 				.enc = {
2920 					.vecs = salsa20_stream_enc_tv_template,
2921 					.count = SALSA20_STREAM_ENC_TEST_VECTORS
2922 				}
2923 			}
2924 		}
2925 	}, {
2926 		.alg = "sha1",
2927 		.test = alg_test_hash,
2928 		.fips_allowed = 1,
2929 		.suite = {
2930 			.hash = {
2931 				.vecs = sha1_tv_template,
2932 				.count = SHA1_TEST_VECTORS
2933 			}
2934 		}
2935 	}, {
2936 		.alg = "sha224",
2937 		.test = alg_test_hash,
2938 		.fips_allowed = 1,
2939 		.suite = {
2940 			.hash = {
2941 				.vecs = sha224_tv_template,
2942 				.count = SHA224_TEST_VECTORS
2943 			}
2944 		}
2945 	}, {
2946 		.alg = "sha256",
2947 		.test = alg_test_hash,
2948 		.fips_allowed = 1,
2949 		.suite = {
2950 			.hash = {
2951 				.vecs = sha256_tv_template,
2952 				.count = SHA256_TEST_VECTORS
2953 			}
2954 		}
2955 	}, {
2956 		.alg = "sha384",
2957 		.test = alg_test_hash,
2958 		.fips_allowed = 1,
2959 		.suite = {
2960 			.hash = {
2961 				.vecs = sha384_tv_template,
2962 				.count = SHA384_TEST_VECTORS
2963 			}
2964 		}
2965 	}, {
2966 		.alg = "sha512",
2967 		.test = alg_test_hash,
2968 		.fips_allowed = 1,
2969 		.suite = {
2970 			.hash = {
2971 				.vecs = sha512_tv_template,
2972 				.count = SHA512_TEST_VECTORS
2973 			}
2974 		}
2975 	}, {
2976 		.alg = "tgr128",
2977 		.test = alg_test_hash,
2978 		.suite = {
2979 			.hash = {
2980 				.vecs = tgr128_tv_template,
2981 				.count = TGR128_TEST_VECTORS
2982 			}
2983 		}
2984 	}, {
2985 		.alg = "tgr160",
2986 		.test = alg_test_hash,
2987 		.suite = {
2988 			.hash = {
2989 				.vecs = tgr160_tv_template,
2990 				.count = TGR160_TEST_VECTORS
2991 			}
2992 		}
2993 	}, {
2994 		.alg = "tgr192",
2995 		.test = alg_test_hash,
2996 		.suite = {
2997 			.hash = {
2998 				.vecs = tgr192_tv_template,
2999 				.count = TGR192_TEST_VECTORS
3000 			}
3001 		}
3002 	}, {
3003 		.alg = "vmac(aes)",
3004 		.test = alg_test_hash,
3005 		.suite = {
3006 			.hash = {
3007 				.vecs = aes_vmac128_tv_template,
3008 				.count = VMAC_AES_TEST_VECTORS
3009 			}
3010 		}
3011 	}, {
3012 		.alg = "wp256",
3013 		.test = alg_test_hash,
3014 		.suite = {
3015 			.hash = {
3016 				.vecs = wp256_tv_template,
3017 				.count = WP256_TEST_VECTORS
3018 			}
3019 		}
3020 	}, {
3021 		.alg = "wp384",
3022 		.test = alg_test_hash,
3023 		.suite = {
3024 			.hash = {
3025 				.vecs = wp384_tv_template,
3026 				.count = WP384_TEST_VECTORS
3027 			}
3028 		}
3029 	}, {
3030 		.alg = "wp512",
3031 		.test = alg_test_hash,
3032 		.suite = {
3033 			.hash = {
3034 				.vecs = wp512_tv_template,
3035 				.count = WP512_TEST_VECTORS
3036 			}
3037 		}
3038 	}, {
3039 		.alg = "xcbc(aes)",
3040 		.test = alg_test_hash,
3041 		.suite = {
3042 			.hash = {
3043 				.vecs = aes_xcbc128_tv_template,
3044 				.count = XCBC_AES_TEST_VECTORS
3045 			}
3046 		}
3047 	}, {
3048 		.alg = "xts(aes)",
3049 		.test = alg_test_skcipher,
3050 		.fips_allowed = 1,
3051 		.suite = {
3052 			.cipher = {
3053 				.enc = {
3054 					.vecs = aes_xts_enc_tv_template,
3055 					.count = AES_XTS_ENC_TEST_VECTORS
3056 				},
3057 				.dec = {
3058 					.vecs = aes_xts_dec_tv_template,
3059 					.count = AES_XTS_DEC_TEST_VECTORS
3060 				}
3061 			}
3062 		}
3063 	}, {
3064 		.alg = "xts(camellia)",
3065 		.test = alg_test_skcipher,
3066 		.suite = {
3067 			.cipher = {
3068 				.enc = {
3069 					.vecs = camellia_xts_enc_tv_template,
3070 					.count = CAMELLIA_XTS_ENC_TEST_VECTORS
3071 				},
3072 				.dec = {
3073 					.vecs = camellia_xts_dec_tv_template,
3074 					.count = CAMELLIA_XTS_DEC_TEST_VECTORS
3075 				}
3076 			}
3077 		}
3078 	}, {
3079 		.alg = "xts(cast6)",
3080 		.test = alg_test_skcipher,
3081 		.suite = {
3082 			.cipher = {
3083 				.enc = {
3084 					.vecs = cast6_xts_enc_tv_template,
3085 					.count = CAST6_XTS_ENC_TEST_VECTORS
3086 				},
3087 				.dec = {
3088 					.vecs = cast6_xts_dec_tv_template,
3089 					.count = CAST6_XTS_DEC_TEST_VECTORS
3090 				}
3091 			}
3092 		}
3093 	}, {
3094 		.alg = "xts(serpent)",
3095 		.test = alg_test_skcipher,
3096 		.suite = {
3097 			.cipher = {
3098 				.enc = {
3099 					.vecs = serpent_xts_enc_tv_template,
3100 					.count = SERPENT_XTS_ENC_TEST_VECTORS
3101 				},
3102 				.dec = {
3103 					.vecs = serpent_xts_dec_tv_template,
3104 					.count = SERPENT_XTS_DEC_TEST_VECTORS
3105 				}
3106 			}
3107 		}
3108 	}, {
3109 		.alg = "xts(twofish)",
3110 		.test = alg_test_skcipher,
3111 		.suite = {
3112 			.cipher = {
3113 				.enc = {
3114 					.vecs = tf_xts_enc_tv_template,
3115 					.count = TF_XTS_ENC_TEST_VECTORS
3116 				},
3117 				.dec = {
3118 					.vecs = tf_xts_dec_tv_template,
3119 					.count = TF_XTS_DEC_TEST_VECTORS
3120 				}
3121 			}
3122 		}
3123 	}, {
3124 		.alg = "zlib",
3125 		.test = alg_test_pcomp,
3126 		.fips_allowed = 1,
3127 		.suite = {
3128 			.pcomp = {
3129 				.comp = {
3130 					.vecs = zlib_comp_tv_template,
3131 					.count = ZLIB_COMP_TEST_VECTORS
3132 				},
3133 				.decomp = {
3134 					.vecs = zlib_decomp_tv_template,
3135 					.count = ZLIB_DECOMP_TEST_VECTORS
3136 				}
3137 			}
3138 		}
3139 	}
3140 };
3141 
3142 static bool alg_test_descs_checked;
3143 
3144 static void alg_test_descs_check_order(void)
3145 {
3146 	int i;
3147 
3148 	/* only check once */
3149 	if (alg_test_descs_checked)
3150 		return;
3151 
3152 	alg_test_descs_checked = true;
3153 
3154 	for (i = 1; i < ARRAY_SIZE(alg_test_descs); i++) {
3155 		int diff = strcmp(alg_test_descs[i - 1].alg,
3156 				  alg_test_descs[i].alg);
3157 
3158 		if (WARN_ON(diff > 0)) {
3159 			pr_warn("testmgr: alg_test_descs entries in wrong order: '%s' before '%s'\n",
3160 				alg_test_descs[i - 1].alg,
3161 				alg_test_descs[i].alg);
3162 		}
3163 
3164 		if (WARN_ON(diff == 0)) {
3165 			pr_warn("testmgr: duplicate alg_test_descs entry: '%s'\n",
3166 				alg_test_descs[i].alg);
3167 		}
3168 	}
3169 }
3170 
3171 static int alg_find_test(const char *alg)
3172 {
3173 	int start = 0;
3174 	int end = ARRAY_SIZE(alg_test_descs);
3175 
3176 	while (start < end) {
3177 		int i = (start + end) / 2;
3178 		int diff = strcmp(alg_test_descs[i].alg, alg);
3179 
3180 		if (diff > 0) {
3181 			end = i;
3182 			continue;
3183 		}
3184 
3185 		if (diff < 0) {
3186 			start = i + 1;
3187 			continue;
3188 		}
3189 
3190 		return i;
3191 	}
3192 
3193 	return -1;
3194 }
3195 
3196 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
3197 {
3198 	int i;
3199 	int j;
3200 	int rc;
3201 
3202 	alg_test_descs_check_order();
3203 
3204 	if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) {
3205 		char nalg[CRYPTO_MAX_ALG_NAME];
3206 
3207 		if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
3208 		    sizeof(nalg))
3209 			return -ENAMETOOLONG;
3210 
3211 		i = alg_find_test(nalg);
3212 		if (i < 0)
3213 			goto notest;
3214 
3215 		if (fips_enabled && !alg_test_descs[i].fips_allowed)
3216 			goto non_fips_alg;
3217 
3218 		rc = alg_test_cipher(alg_test_descs + i, driver, type, mask);
3219 		goto test_done;
3220 	}
3221 
3222 	i = alg_find_test(alg);
3223 	j = alg_find_test(driver);
3224 	if (i < 0 && j < 0)
3225 		goto notest;
3226 
3227 	if (fips_enabled && ((i >= 0 && !alg_test_descs[i].fips_allowed) ||
3228 			     (j >= 0 && !alg_test_descs[j].fips_allowed)))
3229 		goto non_fips_alg;
3230 
3231 	rc = 0;
3232 	if (i >= 0)
3233 		rc |= alg_test_descs[i].test(alg_test_descs + i, driver,
3234 					     type, mask);
3235 	if (j >= 0 && j != i)
3236 		rc |= alg_test_descs[j].test(alg_test_descs + j, driver,
3237 					     type, mask);
3238 
3239 test_done:
3240 	if (fips_enabled && rc)
3241 		panic("%s: %s alg self test failed in fips mode!\n", driver, alg);
3242 
3243 	if (fips_enabled && !rc)
3244 		printk(KERN_INFO "alg: self-tests for %s (%s) passed\n",
3245 		       driver, alg);
3246 
3247 	return rc;
3248 
3249 notest:
3250 	printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
3251 	return 0;
3252 non_fips_alg:
3253 	return -EINVAL;
3254 }
3255 
3256 #endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */
3257 
3258 EXPORT_SYMBOL_GPL(alg_test);
3259