]> git.kernelconcepts.de Git - karo-tx-linux.git/blob - crypto/testmgr.c
drivers/rtc/rtc-imxdi.c: add devicetree support
[karo-tx-linux.git] / crypto / testmgr.c
1 /*
2  * Algorithm testing framework and tests.
3  *
4  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6  * Copyright (c) 2007 Nokia Siemens Networks
7  * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8  *
9  * Updated RFC4106 AES-GCM testing.
10  *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
11  *             Adrian Hoban <adrian.hoban@intel.com>
12  *             Gabriele Paoloni <gabriele.paoloni@intel.com>
13  *             Tadeusz Struk (tadeusz.struk@intel.com)
14  *    Copyright (c) 2010, Intel Corporation.
15  *
16  * This program is free software; you can redistribute it and/or modify it
17  * under the terms of the GNU General Public License as published by the Free
18  * Software Foundation; either version 2 of the License, or (at your option)
19  * any later version.
20  *
21  */
22
23 #include <crypto/hash.h>
24 #include <linux/err.h>
25 #include <linux/module.h>
26 #include <linux/scatterlist.h>
27 #include <linux/slab.h>
28 #include <linux/string.h>
29 #include <crypto/rng.h>
30
31 #include "internal.h"
32
33 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
34
35 /* a perfect nop */
36 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
37 {
38         return 0;
39 }
40
41 #else
42
43 #include "testmgr.h"
44
45 /*
46  * Need slab memory for testing (size in number of pages).
47  */
48 #define XBUFSIZE        8
49
50 /*
51  * Indexes into the xbuf to simulate cross-page access.
52  */
53 #define IDX1            32
54 #define IDX2            32400
55 #define IDX3            1
56 #define IDX4            8193
57 #define IDX5            22222
58 #define IDX6            17101
59 #define IDX7            27333
60 #define IDX8            3000
61
62 /*
63 * Used by test_cipher()
64 */
65 #define ENCRYPT 1
66 #define DECRYPT 0
67
68 struct tcrypt_result {
69         struct completion completion;
70         int err;
71 };
72
73 struct aead_test_suite {
74         struct {
75                 struct aead_testvec *vecs;
76                 unsigned int count;
77         } enc, dec;
78 };
79
80 struct cipher_test_suite {
81         struct {
82                 struct cipher_testvec *vecs;
83                 unsigned int count;
84         } enc, dec;
85 };
86
87 struct comp_test_suite {
88         struct {
89                 struct comp_testvec *vecs;
90                 unsigned int count;
91         } comp, decomp;
92 };
93
94 struct pcomp_test_suite {
95         struct {
96                 struct pcomp_testvec *vecs;
97                 unsigned int count;
98         } comp, decomp;
99 };
100
101 struct hash_test_suite {
102         struct hash_testvec *vecs;
103         unsigned int count;
104 };
105
106 struct cprng_test_suite {
107         struct cprng_testvec *vecs;
108         unsigned int count;
109 };
110
111 struct alg_test_desc {
112         const char *alg;
113         int (*test)(const struct alg_test_desc *desc, const char *driver,
114                     u32 type, u32 mask);
115         int fips_allowed;       /* set if alg is allowed in fips mode */
116
117         union {
118                 struct aead_test_suite aead;
119                 struct cipher_test_suite cipher;
120                 struct comp_test_suite comp;
121                 struct pcomp_test_suite pcomp;
122                 struct hash_test_suite hash;
123                 struct cprng_test_suite cprng;
124         } suite;
125 };
126
127 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
128
129 static void hexdump(unsigned char *buf, unsigned int len)
130 {
131         print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
132                         16, 1,
133                         buf, len, false);
134 }
135
136 static void tcrypt_complete(struct crypto_async_request *req, int err)
137 {
138         struct tcrypt_result *res = req->data;
139
140         if (err == -EINPROGRESS)
141                 return;
142
143         res->err = err;
144         complete(&res->completion);
145 }
146
147 static int testmgr_alloc_buf(char *buf[XBUFSIZE])
148 {
149         int i;
150
151         for (i = 0; i < XBUFSIZE; i++) {
152                 buf[i] = (void *)__get_free_page(GFP_KERNEL);
153                 if (!buf[i])
154                         goto err_free_buf;
155         }
156
157         return 0;
158
159 err_free_buf:
160         while (i-- > 0)
161                 free_page((unsigned long)buf[i]);
162
163         return -ENOMEM;
164 }
165
166 static void testmgr_free_buf(char *buf[XBUFSIZE])
167 {
168         int i;
169
170         for (i = 0; i < XBUFSIZE; i++)
171                 free_page((unsigned long)buf[i]);
172 }
173
174 static int do_one_async_hash_op(struct ahash_request *req,
175                                 struct tcrypt_result *tr,
176                                 int ret)
177 {
178         if (ret == -EINPROGRESS || ret == -EBUSY) {
179                 ret = wait_for_completion_interruptible(&tr->completion);
180                 if (!ret)
181                         ret = tr->err;
182                 INIT_COMPLETION(tr->completion);
183         }
184         return ret;
185 }
186
187 static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
188                      unsigned int tcount, bool use_digest)
189 {
190         const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm));
191         unsigned int i, j, k, temp;
192         struct scatterlist sg[8];
193         char result[64];
194         struct ahash_request *req;
195         struct tcrypt_result tresult;
196         void *hash_buff;
197         char *xbuf[XBUFSIZE];
198         int ret = -ENOMEM;
199
200         if (testmgr_alloc_buf(xbuf))
201                 goto out_nobuf;
202
203         init_completion(&tresult.completion);
204
205         req = ahash_request_alloc(tfm, GFP_KERNEL);
206         if (!req) {
207                 printk(KERN_ERR "alg: hash: Failed to allocate request for "
208                        "%s\n", algo);
209                 goto out_noreq;
210         }
211         ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
212                                    tcrypt_complete, &tresult);
213
214         j = 0;
215         for (i = 0; i < tcount; i++) {
216                 if (template[i].np)
217                         continue;
218
219                 j++;
220                 memset(result, 0, 64);
221
222                 hash_buff = xbuf[0];
223
224                 memcpy(hash_buff, template[i].plaintext, template[i].psize);
225                 sg_init_one(&sg[0], hash_buff, template[i].psize);
226
227                 if (template[i].ksize) {
228                         crypto_ahash_clear_flags(tfm, ~0);
229                         ret = crypto_ahash_setkey(tfm, template[i].key,
230                                                   template[i].ksize);
231                         if (ret) {
232                                 printk(KERN_ERR "alg: hash: setkey failed on "
233                                        "test %d for %s: ret=%d\n", j, algo,
234                                        -ret);
235                                 goto out;
236                         }
237                 }
238
239                 ahash_request_set_crypt(req, sg, result, template[i].psize);
240                 if (use_digest) {
241                         ret = do_one_async_hash_op(req, &tresult,
242                                                    crypto_ahash_digest(req));
243                         if (ret) {
244                                 pr_err("alg: hash: digest failed on test %d "
245                                        "for %s: ret=%d\n", j, algo, -ret);
246                                 goto out;
247                         }
248                 } else {
249                         ret = do_one_async_hash_op(req, &tresult,
250                                                    crypto_ahash_init(req));
251                         if (ret) {
252                                 pr_err("alt: hash: init failed on test %d "
253                                        "for %s: ret=%d\n", j, algo, -ret);
254                                 goto out;
255                         }
256                         ret = do_one_async_hash_op(req, &tresult,
257                                                    crypto_ahash_update(req));
258                         if (ret) {
259                                 pr_err("alt: hash: update failed on test %d "
260                                        "for %s: ret=%d\n", j, algo, -ret);
261                                 goto out;
262                         }
263                         ret = do_one_async_hash_op(req, &tresult,
264                                                    crypto_ahash_final(req));
265                         if (ret) {
266                                 pr_err("alt: hash: final failed on test %d "
267                                        "for %s: ret=%d\n", j, algo, -ret);
268                                 goto out;
269                         }
270                 }
271
272                 if (memcmp(result, template[i].digest,
273                            crypto_ahash_digestsize(tfm))) {
274                         printk(KERN_ERR "alg: hash: Test %d failed for %s\n",
275                                j, algo);
276                         hexdump(result, crypto_ahash_digestsize(tfm));
277                         ret = -EINVAL;
278                         goto out;
279                 }
280         }
281
282         j = 0;
283         for (i = 0; i < tcount; i++) {
284                 if (template[i].np) {
285                         j++;
286                         memset(result, 0, 64);
287
288                         temp = 0;
289                         sg_init_table(sg, template[i].np);
290                         ret = -EINVAL;
291                         for (k = 0; k < template[i].np; k++) {
292                                 if (WARN_ON(offset_in_page(IDX[k]) +
293                                             template[i].tap[k] > PAGE_SIZE))
294                                         goto out;
295                                 sg_set_buf(&sg[k],
296                                            memcpy(xbuf[IDX[k] >> PAGE_SHIFT] +
297                                                   offset_in_page(IDX[k]),
298                                                   template[i].plaintext + temp,
299                                                   template[i].tap[k]),
300                                            template[i].tap[k]);
301                                 temp += template[i].tap[k];
302                         }
303
304                         if (template[i].ksize) {
305                                 crypto_ahash_clear_flags(tfm, ~0);
306                                 ret = crypto_ahash_setkey(tfm, template[i].key,
307                                                           template[i].ksize);
308
309                                 if (ret) {
310                                         printk(KERN_ERR "alg: hash: setkey "
311                                                "failed on chunking test %d "
312                                                "for %s: ret=%d\n", j, algo,
313                                                -ret);
314                                         goto out;
315                                 }
316                         }
317
318                         ahash_request_set_crypt(req, sg, result,
319                                                 template[i].psize);
320                         ret = crypto_ahash_digest(req);
321                         switch (ret) {
322                         case 0:
323                                 break;
324                         case -EINPROGRESS:
325                         case -EBUSY:
326                                 ret = wait_for_completion_interruptible(
327                                         &tresult.completion);
328                                 if (!ret && !(ret = tresult.err)) {
329                                         INIT_COMPLETION(tresult.completion);
330                                         break;
331                                 }
332                                 /* fall through */
333                         default:
334                                 printk(KERN_ERR "alg: hash: digest failed "
335                                        "on chunking test %d for %s: "
336                                        "ret=%d\n", j, algo, -ret);
337                                 goto out;
338                         }
339
340                         if (memcmp(result, template[i].digest,
341                                    crypto_ahash_digestsize(tfm))) {
342                                 printk(KERN_ERR "alg: hash: Chunking test %d "
343                                        "failed for %s\n", j, algo);
344                                 hexdump(result, crypto_ahash_digestsize(tfm));
345                                 ret = -EINVAL;
346                                 goto out;
347                         }
348                 }
349         }
350
351         ret = 0;
352
353 out:
354         ahash_request_free(req);
355 out_noreq:
356         testmgr_free_buf(xbuf);
357 out_nobuf:
358         return ret;
359 }
360
361 static int __test_aead(struct crypto_aead *tfm, int enc,
362                        struct aead_testvec *template, unsigned int tcount,
363                        const bool diff_dst)
364 {
365         const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm));
366         unsigned int i, j, k, n, temp;
367         int ret = -ENOMEM;
368         char *q;
369         char *key;
370         struct aead_request *req;
371         struct scatterlist *sg;
372         struct scatterlist *asg;
373         struct scatterlist *sgout;
374         const char *e, *d;
375         struct tcrypt_result result;
376         unsigned int authsize;
377         void *input;
378         void *output;
379         void *assoc;
380         char iv[MAX_IVLEN];
381         char *xbuf[XBUFSIZE];
382         char *xoutbuf[XBUFSIZE];
383         char *axbuf[XBUFSIZE];
384
385         if (testmgr_alloc_buf(xbuf))
386                 goto out_noxbuf;
387         if (testmgr_alloc_buf(axbuf))
388                 goto out_noaxbuf;
389
390         if (diff_dst && testmgr_alloc_buf(xoutbuf))
391                 goto out_nooutbuf;
392
393         /* avoid "the frame size is larger than 1024 bytes" compiler warning */
394         sg = kmalloc(sizeof(*sg) * 8 * (diff_dst ? 3 : 2), GFP_KERNEL);
395         if (!sg)
396                 goto out_nosg;
397         asg = &sg[8];
398         sgout = &asg[8];
399
400         if (diff_dst)
401                 d = "-ddst";
402         else
403                 d = "";
404
405         if (enc == ENCRYPT)
406                 e = "encryption";
407         else
408                 e = "decryption";
409
410         init_completion(&result.completion);
411
412         req = aead_request_alloc(tfm, GFP_KERNEL);
413         if (!req) {
414                 pr_err("alg: aead%s: Failed to allocate request for %s\n",
415                        d, algo);
416                 goto out;
417         }
418
419         aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
420                                   tcrypt_complete, &result);
421
422         for (i = 0, j = 0; i < tcount; i++) {
423                 if (!template[i].np) {
424                         j++;
425
426                         /* some tepmplates have no input data but they will
427                          * touch input
428                          */
429                         input = xbuf[0];
430                         assoc = axbuf[0];
431
432                         ret = -EINVAL;
433                         if (WARN_ON(template[i].ilen > PAGE_SIZE ||
434                                     template[i].alen > PAGE_SIZE))
435                                 goto out;
436
437                         memcpy(input, template[i].input, template[i].ilen);
438                         memcpy(assoc, template[i].assoc, template[i].alen);
439                         if (template[i].iv)
440                                 memcpy(iv, template[i].iv, MAX_IVLEN);
441                         else
442                                 memset(iv, 0, MAX_IVLEN);
443
444                         crypto_aead_clear_flags(tfm, ~0);
445                         if (template[i].wk)
446                                 crypto_aead_set_flags(
447                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
448
449                         key = template[i].key;
450
451                         ret = crypto_aead_setkey(tfm, key,
452                                                  template[i].klen);
453                         if (!ret == template[i].fail) {
454                                 pr_err("alg: aead%s: setkey failed on test %d for %s: flags=%x\n",
455                                        d, j, algo, crypto_aead_get_flags(tfm));
456                                 goto out;
457                         } else if (ret)
458                                 continue;
459
460                         authsize = abs(template[i].rlen - template[i].ilen);
461                         ret = crypto_aead_setauthsize(tfm, authsize);
462                         if (ret) {
463                                 pr_err("alg: aead%s: Failed to set authsize to %u on test %d for %s\n",
464                                        d, authsize, j, algo);
465                                 goto out;
466                         }
467
468                         sg_init_one(&sg[0], input,
469                                     template[i].ilen + (enc ? authsize : 0));
470
471                         if (diff_dst) {
472                                 output = xoutbuf[0];
473                                 sg_init_one(&sgout[0], output,
474                                             template[i].ilen +
475                                                 (enc ? authsize : 0));
476                         } else {
477                                 output = input;
478                         }
479
480                         sg_init_one(&asg[0], assoc, template[i].alen);
481
482                         aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
483                                                template[i].ilen, iv);
484
485                         aead_request_set_assoc(req, asg, template[i].alen);
486
487                         ret = enc ?
488                                 crypto_aead_encrypt(req) :
489                                 crypto_aead_decrypt(req);
490
491                         switch (ret) {
492                         case 0:
493                                 if (template[i].novrfy) {
494                                         /* verification was supposed to fail */
495                                         pr_err("alg: aead%s: %s failed on test %d for %s: ret was 0, expected -EBADMSG\n",
496                                                d, e, j, algo);
497                                         /* so really, we got a bad message */
498                                         ret = -EBADMSG;
499                                         goto out;
500                                 }
501                                 break;
502                         case -EINPROGRESS:
503                         case -EBUSY:
504                                 ret = wait_for_completion_interruptible(
505                                         &result.completion);
506                                 if (!ret && !(ret = result.err)) {
507                                         INIT_COMPLETION(result.completion);
508                                         break;
509                                 }
510                         case -EBADMSG:
511                                 if (template[i].novrfy)
512                                         /* verification failure was expected */
513                                         continue;
514                                 /* fall through */
515                         default:
516                                 pr_err("alg: aead%s: %s failed on test %d for %s: ret=%d\n",
517                                        d, e, j, algo, -ret);
518                                 goto out;
519                         }
520
521                         q = output;
522                         if (memcmp(q, template[i].result, template[i].rlen)) {
523                                 pr_err("alg: aead%s: Test %d failed on %s for %s\n",
524                                        d, j, e, algo);
525                                 hexdump(q, template[i].rlen);
526                                 ret = -EINVAL;
527                                 goto out;
528                         }
529                 }
530         }
531
532         for (i = 0, j = 0; i < tcount; i++) {
533                 if (template[i].np) {
534                         j++;
535
536                         if (template[i].iv)
537                                 memcpy(iv, template[i].iv, MAX_IVLEN);
538                         else
539                                 memset(iv, 0, MAX_IVLEN);
540
541                         crypto_aead_clear_flags(tfm, ~0);
542                         if (template[i].wk)
543                                 crypto_aead_set_flags(
544                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
545                         key = template[i].key;
546
547                         ret = crypto_aead_setkey(tfm, key, template[i].klen);
548                         if (!ret == template[i].fail) {
549                                 pr_err("alg: aead%s: setkey failed on chunk test %d for %s: flags=%x\n",
550                                        d, j, algo, crypto_aead_get_flags(tfm));
551                                 goto out;
552                         } else if (ret)
553                                 continue;
554
555                         authsize = abs(template[i].rlen - template[i].ilen);
556
557                         ret = -EINVAL;
558                         sg_init_table(sg, template[i].np);
559                         if (diff_dst)
560                                 sg_init_table(sgout, template[i].np);
561                         for (k = 0, temp = 0; k < template[i].np; k++) {
562                                 if (WARN_ON(offset_in_page(IDX[k]) +
563                                             template[i].tap[k] > PAGE_SIZE))
564                                         goto out;
565
566                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
567                                     offset_in_page(IDX[k]);
568
569                                 memcpy(q, template[i].input + temp,
570                                        template[i].tap[k]);
571
572                                 n = template[i].tap[k];
573                                 if (k == template[i].np - 1 && enc)
574                                         n += authsize;
575                                 if (offset_in_page(q) + n < PAGE_SIZE)
576                                         q[n] = 0;
577
578                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
579
580                                 if (diff_dst) {
581                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
582                                             offset_in_page(IDX[k]);
583
584                                         memset(q, 0, template[i].tap[k]);
585                                         if (offset_in_page(q) + n < PAGE_SIZE)
586                                                 q[n] = 0;
587
588                                         sg_set_buf(&sgout[k], q,
589                                                    template[i].tap[k]);
590                                 }
591
592                                 temp += template[i].tap[k];
593                         }
594
595                         ret = crypto_aead_setauthsize(tfm, authsize);
596                         if (ret) {
597                                 pr_err("alg: aead%s: Failed to set authsize to %u on chunk test %d for %s\n",
598                                        d, authsize, j, algo);
599                                 goto out;
600                         }
601
602                         if (enc) {
603                                 if (WARN_ON(sg[k - 1].offset +
604                                             sg[k - 1].length + authsize >
605                                             PAGE_SIZE)) {
606                                         ret = -EINVAL;
607                                         goto out;
608                                 }
609
610                                 sg[k - 1].length += authsize;
611
612                                 if (diff_dst)
613                                         sgout[k - 1].length += authsize;
614                         }
615
616                         sg_init_table(asg, template[i].anp);
617                         ret = -EINVAL;
618                         for (k = 0, temp = 0; k < template[i].anp; k++) {
619                                 if (WARN_ON(offset_in_page(IDX[k]) +
620                                             template[i].atap[k] > PAGE_SIZE))
621                                         goto out;
622                                 sg_set_buf(&asg[k],
623                                            memcpy(axbuf[IDX[k] >> PAGE_SHIFT] +
624                                                   offset_in_page(IDX[k]),
625                                                   template[i].assoc + temp,
626                                                   template[i].atap[k]),
627                                            template[i].atap[k]);
628                                 temp += template[i].atap[k];
629                         }
630
631                         aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
632                                                template[i].ilen,
633                                                iv);
634
635                         aead_request_set_assoc(req, asg, template[i].alen);
636
637                         ret = enc ?
638                                 crypto_aead_encrypt(req) :
639                                 crypto_aead_decrypt(req);
640
641                         switch (ret) {
642                         case 0:
643                                 if (template[i].novrfy) {
644                                         /* verification was supposed to fail */
645                                         pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret was 0, expected -EBADMSG\n",
646                                                d, e, j, algo);
647                                         /* so really, we got a bad message */
648                                         ret = -EBADMSG;
649                                         goto out;
650                                 }
651                                 break;
652                         case -EINPROGRESS:
653                         case -EBUSY:
654                                 ret = wait_for_completion_interruptible(
655                                         &result.completion);
656                                 if (!ret && !(ret = result.err)) {
657                                         INIT_COMPLETION(result.completion);
658                                         break;
659                                 }
660                         case -EBADMSG:
661                                 if (template[i].novrfy)
662                                         /* verification failure was expected */
663                                         continue;
664                                 /* fall through */
665                         default:
666                                 pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret=%d\n",
667                                        d, e, j, algo, -ret);
668                                 goto out;
669                         }
670
671                         ret = -EINVAL;
672                         for (k = 0, temp = 0; k < template[i].np; k++) {
673                                 if (diff_dst)
674                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
675                                             offset_in_page(IDX[k]);
676                                 else
677                                         q = xbuf[IDX[k] >> PAGE_SHIFT] +
678                                             offset_in_page(IDX[k]);
679
680                                 n = template[i].tap[k];
681                                 if (k == template[i].np - 1)
682                                         n += enc ? authsize : -authsize;
683
684                                 if (memcmp(q, template[i].result + temp, n)) {
685                                         pr_err("alg: aead%s: Chunk test %d failed on %s at page %u for %s\n",
686                                                d, j, e, k, algo);
687                                         hexdump(q, n);
688                                         goto out;
689                                 }
690
691                                 q += n;
692                                 if (k == template[i].np - 1 && !enc) {
693                                         if (!diff_dst &&
694                                                 memcmp(q, template[i].input +
695                                                       temp + n, authsize))
696                                                 n = authsize;
697                                         else
698                                                 n = 0;
699                                 } else {
700                                         for (n = 0; offset_in_page(q + n) &&
701                                                     q[n]; n++)
702                                                 ;
703                                 }
704                                 if (n) {
705                                         pr_err("alg: aead%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
706                                                d, j, e, k, algo, n);
707                                         hexdump(q, n);
708                                         goto out;
709                                 }
710
711                                 temp += template[i].tap[k];
712                         }
713                 }
714         }
715
716         ret = 0;
717
718 out:
719         aead_request_free(req);
720         kfree(sg);
721 out_nosg:
722         if (diff_dst)
723                 testmgr_free_buf(xoutbuf);
724 out_nooutbuf:
725         testmgr_free_buf(axbuf);
726 out_noaxbuf:
727         testmgr_free_buf(xbuf);
728 out_noxbuf:
729         return ret;
730 }
731
732 static int test_aead(struct crypto_aead *tfm, int enc,
733                      struct aead_testvec *template, unsigned int tcount)
734 {
735         int ret;
736
737         /* test 'dst == src' case */
738         ret = __test_aead(tfm, enc, template, tcount, false);
739         if (ret)
740                 return ret;
741
742         /* test 'dst != src' case */
743         return __test_aead(tfm, enc, template, tcount, true);
744 }
745
746 static int test_cipher(struct crypto_cipher *tfm, int enc,
747                        struct cipher_testvec *template, unsigned int tcount)
748 {
749         const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm));
750         unsigned int i, j, k;
751         char *q;
752         const char *e;
753         void *data;
754         char *xbuf[XBUFSIZE];
755         int ret = -ENOMEM;
756
757         if (testmgr_alloc_buf(xbuf))
758                 goto out_nobuf;
759
760         if (enc == ENCRYPT)
761                 e = "encryption";
762         else
763                 e = "decryption";
764
765         j = 0;
766         for (i = 0; i < tcount; i++) {
767                 if (template[i].np)
768                         continue;
769
770                 j++;
771
772                 ret = -EINVAL;
773                 if (WARN_ON(template[i].ilen > PAGE_SIZE))
774                         goto out;
775
776                 data = xbuf[0];
777                 memcpy(data, template[i].input, template[i].ilen);
778
779                 crypto_cipher_clear_flags(tfm, ~0);
780                 if (template[i].wk)
781                         crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
782
783                 ret = crypto_cipher_setkey(tfm, template[i].key,
784                                            template[i].klen);
785                 if (!ret == template[i].fail) {
786                         printk(KERN_ERR "alg: cipher: setkey failed "
787                                "on test %d for %s: flags=%x\n", j,
788                                algo, crypto_cipher_get_flags(tfm));
789                         goto out;
790                 } else if (ret)
791                         continue;
792
793                 for (k = 0; k < template[i].ilen;
794                      k += crypto_cipher_blocksize(tfm)) {
795                         if (enc)
796                                 crypto_cipher_encrypt_one(tfm, data + k,
797                                                           data + k);
798                         else
799                                 crypto_cipher_decrypt_one(tfm, data + k,
800                                                           data + k);
801                 }
802
803                 q = data;
804                 if (memcmp(q, template[i].result, template[i].rlen)) {
805                         printk(KERN_ERR "alg: cipher: Test %d failed "
806                                "on %s for %s\n", j, e, algo);
807                         hexdump(q, template[i].rlen);
808                         ret = -EINVAL;
809                         goto out;
810                 }
811         }
812
813         ret = 0;
814
815 out:
816         testmgr_free_buf(xbuf);
817 out_nobuf:
818         return ret;
819 }
820
821 static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc,
822                            struct cipher_testvec *template, unsigned int tcount,
823                            const bool diff_dst)
824 {
825         const char *algo =
826                 crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm));
827         unsigned int i, j, k, n, temp;
828         char *q;
829         struct ablkcipher_request *req;
830         struct scatterlist sg[8];
831         struct scatterlist sgout[8];
832         const char *e, *d;
833         struct tcrypt_result result;
834         void *data;
835         char iv[MAX_IVLEN];
836         char *xbuf[XBUFSIZE];
837         char *xoutbuf[XBUFSIZE];
838         int ret = -ENOMEM;
839
840         if (testmgr_alloc_buf(xbuf))
841                 goto out_nobuf;
842
843         if (diff_dst && testmgr_alloc_buf(xoutbuf))
844                 goto out_nooutbuf;
845
846         if (diff_dst)
847                 d = "-ddst";
848         else
849                 d = "";
850
851         if (enc == ENCRYPT)
852                 e = "encryption";
853         else
854                 e = "decryption";
855
856         init_completion(&result.completion);
857
858         req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
859         if (!req) {
860                 pr_err("alg: skcipher%s: Failed to allocate request for %s\n",
861                        d, algo);
862                 goto out;
863         }
864
865         ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
866                                         tcrypt_complete, &result);
867
868         j = 0;
869         for (i = 0; i < tcount; i++) {
870                 if (template[i].iv)
871                         memcpy(iv, template[i].iv, MAX_IVLEN);
872                 else
873                         memset(iv, 0, MAX_IVLEN);
874
875                 if (!(template[i].np) || (template[i].also_non_np)) {
876                         j++;
877
878                         ret = -EINVAL;
879                         if (WARN_ON(template[i].ilen > PAGE_SIZE))
880                                 goto out;
881
882                         data = xbuf[0];
883                         memcpy(data, template[i].input, template[i].ilen);
884
885                         crypto_ablkcipher_clear_flags(tfm, ~0);
886                         if (template[i].wk)
887                                 crypto_ablkcipher_set_flags(
888                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
889
890                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
891                                                        template[i].klen);
892                         if (!ret == template[i].fail) {
893                                 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n",
894                                        d, j, algo,
895                                        crypto_ablkcipher_get_flags(tfm));
896                                 goto out;
897                         } else if (ret)
898                                 continue;
899
900                         sg_init_one(&sg[0], data, template[i].ilen);
901                         if (diff_dst) {
902                                 data = xoutbuf[0];
903                                 sg_init_one(&sgout[0], data, template[i].ilen);
904                         }
905
906                         ablkcipher_request_set_crypt(req, sg,
907                                                      (diff_dst) ? sgout : sg,
908                                                      template[i].ilen, iv);
909                         ret = enc ?
910                                 crypto_ablkcipher_encrypt(req) :
911                                 crypto_ablkcipher_decrypt(req);
912
913                         switch (ret) {
914                         case 0:
915                                 break;
916                         case -EINPROGRESS:
917                         case -EBUSY:
918                                 ret = wait_for_completion_interruptible(
919                                         &result.completion);
920                                 if (!ret && !((ret = result.err))) {
921                                         INIT_COMPLETION(result.completion);
922                                         break;
923                                 }
924                                 /* fall through */
925                         default:
926                                 pr_err("alg: skcipher%s: %s failed on test %d for %s: ret=%d\n",
927                                        d, e, j, algo, -ret);
928                                 goto out;
929                         }
930
931                         q = data;
932                         if (memcmp(q, template[i].result, template[i].rlen)) {
933                                 pr_err("alg: skcipher%s: Test %d failed on %s for %s\n",
934                                        d, j, e, algo);
935                                 hexdump(q, template[i].rlen);
936                                 ret = -EINVAL;
937                                 goto out;
938                         }
939                 }
940         }
941
942         j = 0;
943         for (i = 0; i < tcount; i++) {
944
945                 if (template[i].iv)
946                         memcpy(iv, template[i].iv, MAX_IVLEN);
947                 else
948                         memset(iv, 0, MAX_IVLEN);
949
950                 if (template[i].np) {
951                         j++;
952
953                         crypto_ablkcipher_clear_flags(tfm, ~0);
954                         if (template[i].wk)
955                                 crypto_ablkcipher_set_flags(
956                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
957
958                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
959                                                        template[i].klen);
960                         if (!ret == template[i].fail) {
961                                 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n",
962                                        d, j, algo,
963                                        crypto_ablkcipher_get_flags(tfm));
964                                 goto out;
965                         } else if (ret)
966                                 continue;
967
968                         temp = 0;
969                         ret = -EINVAL;
970                         sg_init_table(sg, template[i].np);
971                         if (diff_dst)
972                                 sg_init_table(sgout, template[i].np);
973                         for (k = 0; k < template[i].np; k++) {
974                                 if (WARN_ON(offset_in_page(IDX[k]) +
975                                             template[i].tap[k] > PAGE_SIZE))
976                                         goto out;
977
978                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
979                                     offset_in_page(IDX[k]);
980
981                                 memcpy(q, template[i].input + temp,
982                                        template[i].tap[k]);
983
984                                 if (offset_in_page(q) + template[i].tap[k] <
985                                     PAGE_SIZE)
986                                         q[template[i].tap[k]] = 0;
987
988                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
989                                 if (diff_dst) {
990                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
991                                             offset_in_page(IDX[k]);
992
993                                         sg_set_buf(&sgout[k], q,
994                                                    template[i].tap[k]);
995
996                                         memset(q, 0, template[i].tap[k]);
997                                         if (offset_in_page(q) +
998                                             template[i].tap[k] < PAGE_SIZE)
999                                                 q[template[i].tap[k]] = 0;
1000                                 }
1001
1002                                 temp += template[i].tap[k];
1003                         }
1004
1005                         ablkcipher_request_set_crypt(req, sg,
1006                                         (diff_dst) ? sgout : sg,
1007                                         template[i].ilen, iv);
1008
1009                         ret = enc ?
1010                                 crypto_ablkcipher_encrypt(req) :
1011                                 crypto_ablkcipher_decrypt(req);
1012
1013                         switch (ret) {
1014                         case 0:
1015                                 break;
1016                         case -EINPROGRESS:
1017                         case -EBUSY:
1018                                 ret = wait_for_completion_interruptible(
1019                                         &result.completion);
1020                                 if (!ret && !((ret = result.err))) {
1021                                         INIT_COMPLETION(result.completion);
1022                                         break;
1023                                 }
1024                                 /* fall through */
1025                         default:
1026                                 pr_err("alg: skcipher%s: %s failed on chunk test %d for %s: ret=%d\n",
1027                                        d, e, j, algo, -ret);
1028                                 goto out;
1029                         }
1030
1031                         temp = 0;
1032                         ret = -EINVAL;
1033                         for (k = 0; k < template[i].np; k++) {
1034                                 if (diff_dst)
1035                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
1036                                             offset_in_page(IDX[k]);
1037                                 else
1038                                         q = xbuf[IDX[k] >> PAGE_SHIFT] +
1039                                             offset_in_page(IDX[k]);
1040
1041                                 if (memcmp(q, template[i].result + temp,
1042                                            template[i].tap[k])) {
1043                                         pr_err("alg: skcipher%s: Chunk test %d failed on %s at page %u for %s\n",
1044                                                d, j, e, k, algo);
1045                                         hexdump(q, template[i].tap[k]);
1046                                         goto out;
1047                                 }
1048
1049                                 q += template[i].tap[k];
1050                                 for (n = 0; offset_in_page(q + n) && q[n]; n++)
1051                                         ;
1052                                 if (n) {
1053                                         pr_err("alg: skcipher%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
1054                                                d, j, e, k, algo, n);
1055                                         hexdump(q, n);
1056                                         goto out;
1057                                 }
1058                                 temp += template[i].tap[k];
1059                         }
1060                 }
1061         }
1062
1063         ret = 0;
1064
1065 out:
1066         ablkcipher_request_free(req);
1067         if (diff_dst)
1068                 testmgr_free_buf(xoutbuf);
1069 out_nooutbuf:
1070         testmgr_free_buf(xbuf);
1071 out_nobuf:
1072         return ret;
1073 }
1074
1075 static int test_skcipher(struct crypto_ablkcipher *tfm, int enc,
1076                          struct cipher_testvec *template, unsigned int tcount)
1077 {
1078         int ret;
1079
1080         /* test 'dst == src' case */
1081         ret = __test_skcipher(tfm, enc, template, tcount, false);
1082         if (ret)
1083                 return ret;
1084
1085         /* test 'dst != src' case */
1086         return __test_skcipher(tfm, enc, template, tcount, true);
1087 }
1088
1089 static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate,
1090                      struct comp_testvec *dtemplate, int ctcount, int dtcount)
1091 {
1092         const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm));
1093         unsigned int i;
1094         char result[COMP_BUF_SIZE];
1095         int ret;
1096
1097         for (i = 0; i < ctcount; i++) {
1098                 int ilen;
1099                 unsigned int dlen = COMP_BUF_SIZE;
1100
1101                 memset(result, 0, sizeof (result));
1102
1103                 ilen = ctemplate[i].inlen;
1104                 ret = crypto_comp_compress(tfm, ctemplate[i].input,
1105                                            ilen, result, &dlen);
1106                 if (ret) {
1107                         printk(KERN_ERR "alg: comp: compression failed "
1108                                "on test %d for %s: ret=%d\n", i + 1, algo,
1109                                -ret);
1110                         goto out;
1111                 }
1112
1113                 if (dlen != ctemplate[i].outlen) {
1114                         printk(KERN_ERR "alg: comp: Compression test %d "
1115                                "failed for %s: output len = %d\n", i + 1, algo,
1116                                dlen);
1117                         ret = -EINVAL;
1118                         goto out;
1119                 }
1120
1121                 if (memcmp(result, ctemplate[i].output, dlen)) {
1122                         printk(KERN_ERR "alg: comp: Compression test %d "
1123                                "failed for %s\n", i + 1, algo);
1124                         hexdump(result, dlen);
1125                         ret = -EINVAL;
1126                         goto out;
1127                 }
1128         }
1129
1130         for (i = 0; i < dtcount; i++) {
1131                 int ilen;
1132                 unsigned int dlen = COMP_BUF_SIZE;
1133
1134                 memset(result, 0, sizeof (result));
1135
1136                 ilen = dtemplate[i].inlen;
1137                 ret = crypto_comp_decompress(tfm, dtemplate[i].input,
1138                                              ilen, result, &dlen);
1139                 if (ret) {
1140                         printk(KERN_ERR "alg: comp: decompression failed "
1141                                "on test %d for %s: ret=%d\n", i + 1, algo,
1142                                -ret);
1143                         goto out;
1144                 }
1145
1146                 if (dlen != dtemplate[i].outlen) {
1147                         printk(KERN_ERR "alg: comp: Decompression test %d "
1148                                "failed for %s: output len = %d\n", i + 1, algo,
1149                                dlen);
1150                         ret = -EINVAL;
1151                         goto out;
1152                 }
1153
1154                 if (memcmp(result, dtemplate[i].output, dlen)) {
1155                         printk(KERN_ERR "alg: comp: Decompression test %d "
1156                                "failed for %s\n", i + 1, algo);
1157                         hexdump(result, dlen);
1158                         ret = -EINVAL;
1159                         goto out;
1160                 }
1161         }
1162
1163         ret = 0;
1164
1165 out:
1166         return ret;
1167 }
1168
1169 static int test_pcomp(struct crypto_pcomp *tfm,
1170                       struct pcomp_testvec *ctemplate,
1171                       struct pcomp_testvec *dtemplate, int ctcount,
1172                       int dtcount)
1173 {
1174         const char *algo = crypto_tfm_alg_driver_name(crypto_pcomp_tfm(tfm));
1175         unsigned int i;
1176         char result[COMP_BUF_SIZE];
1177         int res;
1178
1179         for (i = 0; i < ctcount; i++) {
1180                 struct comp_request req;
1181                 unsigned int produced = 0;
1182
1183                 res = crypto_compress_setup(tfm, ctemplate[i].params,
1184                                             ctemplate[i].paramsize);
1185                 if (res) {
1186                         pr_err("alg: pcomp: compression setup failed on test "
1187                                "%d for %s: error=%d\n", i + 1, algo, res);
1188                         return res;
1189                 }
1190
1191                 res = crypto_compress_init(tfm);
1192                 if (res) {
1193                         pr_err("alg: pcomp: compression init failed on test "
1194                                "%d for %s: error=%d\n", i + 1, algo, res);
1195                         return res;
1196                 }
1197
1198                 memset(result, 0, sizeof(result));
1199
1200                 req.next_in = ctemplate[i].input;
1201                 req.avail_in = ctemplate[i].inlen / 2;
1202                 req.next_out = result;
1203                 req.avail_out = ctemplate[i].outlen / 2;
1204
1205                 res = crypto_compress_update(tfm, &req);
1206                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1207                         pr_err("alg: pcomp: compression update failed on test "
1208                                "%d for %s: error=%d\n", i + 1, algo, res);
1209                         return res;
1210                 }
1211                 if (res > 0)
1212                         produced += res;
1213
1214                 /* Add remaining input data */
1215                 req.avail_in += (ctemplate[i].inlen + 1) / 2;
1216
1217                 res = crypto_compress_update(tfm, &req);
1218                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1219                         pr_err("alg: pcomp: compression update failed on test "
1220                                "%d for %s: error=%d\n", i + 1, algo, res);
1221                         return res;
1222                 }
1223                 if (res > 0)
1224                         produced += res;
1225
1226                 /* Provide remaining output space */
1227                 req.avail_out += COMP_BUF_SIZE - ctemplate[i].outlen / 2;
1228
1229                 res = crypto_compress_final(tfm, &req);
1230                 if (res < 0) {
1231                         pr_err("alg: pcomp: compression final failed on test "
1232                                "%d for %s: error=%d\n", i + 1, algo, res);
1233                         return res;
1234                 }
1235                 produced += res;
1236
1237                 if (COMP_BUF_SIZE - req.avail_out != ctemplate[i].outlen) {
1238                         pr_err("alg: comp: Compression test %d failed for %s: "
1239                                "output len = %d (expected %d)\n", i + 1, algo,
1240                                COMP_BUF_SIZE - req.avail_out,
1241                                ctemplate[i].outlen);
1242                         return -EINVAL;
1243                 }
1244
1245                 if (produced != ctemplate[i].outlen) {
1246                         pr_err("alg: comp: Compression test %d failed for %s: "
1247                                "returned len = %u (expected %d)\n", i + 1,
1248                                algo, produced, ctemplate[i].outlen);
1249                         return -EINVAL;
1250                 }
1251
1252                 if (memcmp(result, ctemplate[i].output, ctemplate[i].outlen)) {
1253                         pr_err("alg: pcomp: Compression test %d failed for "
1254                                "%s\n", i + 1, algo);
1255                         hexdump(result, ctemplate[i].outlen);
1256                         return -EINVAL;
1257                 }
1258         }
1259
1260         for (i = 0; i < dtcount; i++) {
1261                 struct comp_request req;
1262                 unsigned int produced = 0;
1263
1264                 res = crypto_decompress_setup(tfm, dtemplate[i].params,
1265                                               dtemplate[i].paramsize);
1266                 if (res) {
1267                         pr_err("alg: pcomp: decompression setup failed on "
1268                                "test %d for %s: error=%d\n", i + 1, algo, res);
1269                         return res;
1270                 }
1271
1272                 res = crypto_decompress_init(tfm);
1273                 if (res) {
1274                         pr_err("alg: pcomp: decompression init failed on test "
1275                                "%d for %s: error=%d\n", i + 1, algo, res);
1276                         return res;
1277                 }
1278
1279                 memset(result, 0, sizeof(result));
1280
1281                 req.next_in = dtemplate[i].input;
1282                 req.avail_in = dtemplate[i].inlen / 2;
1283                 req.next_out = result;
1284                 req.avail_out = dtemplate[i].outlen / 2;
1285
1286                 res = crypto_decompress_update(tfm, &req);
1287                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1288                         pr_err("alg: pcomp: decompression update failed on "
1289                                "test %d for %s: error=%d\n", i + 1, algo, res);
1290                         return res;
1291                 }
1292                 if (res > 0)
1293                         produced += res;
1294
1295                 /* Add remaining input data */
1296                 req.avail_in += (dtemplate[i].inlen + 1) / 2;
1297
1298                 res = crypto_decompress_update(tfm, &req);
1299                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1300                         pr_err("alg: pcomp: decompression update failed on "
1301                                "test %d for %s: error=%d\n", i + 1, algo, res);
1302                         return res;
1303                 }
1304                 if (res > 0)
1305                         produced += res;
1306
1307                 /* Provide remaining output space */
1308                 req.avail_out += COMP_BUF_SIZE - dtemplate[i].outlen / 2;
1309
1310                 res = crypto_decompress_final(tfm, &req);
1311                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1312                         pr_err("alg: pcomp: decompression final failed on "
1313                                "test %d for %s: error=%d\n", i + 1, algo, res);
1314                         return res;
1315                 }
1316                 if (res > 0)
1317                         produced += res;
1318
1319                 if (COMP_BUF_SIZE - req.avail_out != dtemplate[i].outlen) {
1320                         pr_err("alg: comp: Decompression test %d failed for "
1321                                "%s: output len = %d (expected %d)\n", i + 1,
1322                                algo, COMP_BUF_SIZE - req.avail_out,
1323                                dtemplate[i].outlen);
1324                         return -EINVAL;
1325                 }
1326
1327                 if (produced != dtemplate[i].outlen) {
1328                         pr_err("alg: comp: Decompression test %d failed for "
1329                                "%s: returned len = %u (expected %d)\n", i + 1,
1330                                algo, produced, dtemplate[i].outlen);
1331                         return -EINVAL;
1332                 }
1333
1334                 if (memcmp(result, dtemplate[i].output, dtemplate[i].outlen)) {
1335                         pr_err("alg: pcomp: Decompression test %d failed for "
1336                                "%s\n", i + 1, algo);
1337                         hexdump(result, dtemplate[i].outlen);
1338                         return -EINVAL;
1339                 }
1340         }
1341
1342         return 0;
1343 }
1344
1345
1346 static int test_cprng(struct crypto_rng *tfm, struct cprng_testvec *template,
1347                       unsigned int tcount)
1348 {
1349         const char *algo = crypto_tfm_alg_driver_name(crypto_rng_tfm(tfm));
1350         int err = 0, i, j, seedsize;
1351         u8 *seed;
1352         char result[32];
1353
1354         seedsize = crypto_rng_seedsize(tfm);
1355
1356         seed = kmalloc(seedsize, GFP_KERNEL);
1357         if (!seed) {
1358                 printk(KERN_ERR "alg: cprng: Failed to allocate seed space "
1359                        "for %s\n", algo);
1360                 return -ENOMEM;
1361         }
1362
1363         for (i = 0; i < tcount; i++) {
1364                 memset(result, 0, 32);
1365
1366                 memcpy(seed, template[i].v, template[i].vlen);
1367                 memcpy(seed + template[i].vlen, template[i].key,
1368                        template[i].klen);
1369                 memcpy(seed + template[i].vlen + template[i].klen,
1370                        template[i].dt, template[i].dtlen);
1371
1372                 err = crypto_rng_reset(tfm, seed, seedsize);
1373                 if (err) {
1374                         printk(KERN_ERR "alg: cprng: Failed to reset rng "
1375                                "for %s\n", algo);
1376                         goto out;
1377                 }
1378
1379                 for (j = 0; j < template[i].loops; j++) {
1380                         err = crypto_rng_get_bytes(tfm, result,
1381                                                    template[i].rlen);
1382                         if (err != template[i].rlen) {
1383                                 printk(KERN_ERR "alg: cprng: Failed to obtain "
1384                                        "the correct amount of random data for "
1385                                        "%s (requested %d, got %d)\n", algo,
1386                                        template[i].rlen, err);
1387                                 goto out;
1388                         }
1389                 }
1390
1391                 err = memcmp(result, template[i].result,
1392                              template[i].rlen);
1393                 if (err) {
1394                         printk(KERN_ERR "alg: cprng: Test %d failed for %s\n",
1395                                i, algo);
1396                         hexdump(result, template[i].rlen);
1397                         err = -EINVAL;
1398                         goto out;
1399                 }
1400         }
1401
1402 out:
1403         kfree(seed);
1404         return err;
1405 }
1406
1407 static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
1408                          u32 type, u32 mask)
1409 {
1410         struct crypto_aead *tfm;
1411         int err = 0;
1412
1413         tfm = crypto_alloc_aead(driver, type, mask);
1414         if (IS_ERR(tfm)) {
1415                 printk(KERN_ERR "alg: aead: Failed to load transform for %s: "
1416                        "%ld\n", driver, PTR_ERR(tfm));
1417                 return PTR_ERR(tfm);
1418         }
1419
1420         if (desc->suite.aead.enc.vecs) {
1421                 err = test_aead(tfm, ENCRYPT, desc->suite.aead.enc.vecs,
1422                                 desc->suite.aead.enc.count);
1423                 if (err)
1424                         goto out;
1425         }
1426
1427         if (!err && desc->suite.aead.dec.vecs)
1428                 err = test_aead(tfm, DECRYPT, desc->suite.aead.dec.vecs,
1429                                 desc->suite.aead.dec.count);
1430
1431 out:
1432         crypto_free_aead(tfm);
1433         return err;
1434 }
1435
1436 static int alg_test_cipher(const struct alg_test_desc *desc,
1437                            const char *driver, u32 type, u32 mask)
1438 {
1439         struct crypto_cipher *tfm;
1440         int err = 0;
1441
1442         tfm = crypto_alloc_cipher(driver, type, mask);
1443         if (IS_ERR(tfm)) {
1444                 printk(KERN_ERR "alg: cipher: Failed to load transform for "
1445                        "%s: %ld\n", driver, PTR_ERR(tfm));
1446                 return PTR_ERR(tfm);
1447         }
1448
1449         if (desc->suite.cipher.enc.vecs) {
1450                 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1451                                   desc->suite.cipher.enc.count);
1452                 if (err)
1453                         goto out;
1454         }
1455
1456         if (desc->suite.cipher.dec.vecs)
1457                 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1458                                   desc->suite.cipher.dec.count);
1459
1460 out:
1461         crypto_free_cipher(tfm);
1462         return err;
1463 }
1464
1465 static int alg_test_skcipher(const struct alg_test_desc *desc,
1466                              const char *driver, u32 type, u32 mask)
1467 {
1468         struct crypto_ablkcipher *tfm;
1469         int err = 0;
1470
1471         tfm = crypto_alloc_ablkcipher(driver, type, mask);
1472         if (IS_ERR(tfm)) {
1473                 printk(KERN_ERR "alg: skcipher: Failed to load transform for "
1474                        "%s: %ld\n", driver, PTR_ERR(tfm));
1475                 return PTR_ERR(tfm);
1476         }
1477
1478         if (desc->suite.cipher.enc.vecs) {
1479                 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1480                                     desc->suite.cipher.enc.count);
1481                 if (err)
1482                         goto out;
1483         }
1484
1485         if (desc->suite.cipher.dec.vecs)
1486                 err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1487                                     desc->suite.cipher.dec.count);
1488
1489 out:
1490         crypto_free_ablkcipher(tfm);
1491         return err;
1492 }
1493
1494 static int alg_test_comp(const struct alg_test_desc *desc, const char *driver,
1495                          u32 type, u32 mask)
1496 {
1497         struct crypto_comp *tfm;
1498         int err;
1499
1500         tfm = crypto_alloc_comp(driver, type, mask);
1501         if (IS_ERR(tfm)) {
1502                 printk(KERN_ERR "alg: comp: Failed to load transform for %s: "
1503                        "%ld\n", driver, PTR_ERR(tfm));
1504                 return PTR_ERR(tfm);
1505         }
1506
1507         err = test_comp(tfm, desc->suite.comp.comp.vecs,
1508                         desc->suite.comp.decomp.vecs,
1509                         desc->suite.comp.comp.count,
1510                         desc->suite.comp.decomp.count);
1511
1512         crypto_free_comp(tfm);
1513         return err;
1514 }
1515
1516 static int alg_test_pcomp(const struct alg_test_desc *desc, const char *driver,
1517                           u32 type, u32 mask)
1518 {
1519         struct crypto_pcomp *tfm;
1520         int err;
1521
1522         tfm = crypto_alloc_pcomp(driver, type, mask);
1523         if (IS_ERR(tfm)) {
1524                 pr_err("alg: pcomp: Failed to load transform for %s: %ld\n",
1525                        driver, PTR_ERR(tfm));
1526                 return PTR_ERR(tfm);
1527         }
1528
1529         err = test_pcomp(tfm, desc->suite.pcomp.comp.vecs,
1530                          desc->suite.pcomp.decomp.vecs,
1531                          desc->suite.pcomp.comp.count,
1532                          desc->suite.pcomp.decomp.count);
1533
1534         crypto_free_pcomp(tfm);
1535         return err;
1536 }
1537
1538 static int alg_test_hash(const struct alg_test_desc *desc, const char *driver,
1539                          u32 type, u32 mask)
1540 {
1541         struct crypto_ahash *tfm;
1542         int err;
1543
1544         tfm = crypto_alloc_ahash(driver, type, mask);
1545         if (IS_ERR(tfm)) {
1546                 printk(KERN_ERR "alg: hash: Failed to load transform for %s: "
1547                        "%ld\n", driver, PTR_ERR(tfm));
1548                 return PTR_ERR(tfm);
1549         }
1550
1551         err = test_hash(tfm, desc->suite.hash.vecs,
1552                         desc->suite.hash.count, true);
1553         if (!err)
1554                 err = test_hash(tfm, desc->suite.hash.vecs,
1555                                 desc->suite.hash.count, false);
1556
1557         crypto_free_ahash(tfm);
1558         return err;
1559 }
1560
1561 static int alg_test_crc32c(const struct alg_test_desc *desc,
1562                            const char *driver, u32 type, u32 mask)
1563 {
1564         struct crypto_shash *tfm;
1565         u32 val;
1566         int err;
1567
1568         err = alg_test_hash(desc, driver, type, mask);
1569         if (err)
1570                 goto out;
1571
1572         tfm = crypto_alloc_shash(driver, type, mask);
1573         if (IS_ERR(tfm)) {
1574                 printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: "
1575                        "%ld\n", driver, PTR_ERR(tfm));
1576                 err = PTR_ERR(tfm);
1577                 goto out;
1578         }
1579
1580         do {
1581                 struct {
1582                         struct shash_desc shash;
1583                         char ctx[crypto_shash_descsize(tfm)];
1584                 } sdesc;
1585
1586                 sdesc.shash.tfm = tfm;
1587                 sdesc.shash.flags = 0;
1588
1589                 *(u32 *)sdesc.ctx = le32_to_cpu(420553207);
1590                 err = crypto_shash_final(&sdesc.shash, (u8 *)&val);
1591                 if (err) {
1592                         printk(KERN_ERR "alg: crc32c: Operation failed for "
1593                                "%s: %d\n", driver, err);
1594                         break;
1595                 }
1596
1597                 if (val != ~420553207) {
1598                         printk(KERN_ERR "alg: crc32c: Test failed for %s: "
1599                                "%d\n", driver, val);
1600                         err = -EINVAL;
1601                 }
1602         } while (0);
1603
1604         crypto_free_shash(tfm);
1605
1606 out:
1607         return err;
1608 }
1609
1610 static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver,
1611                           u32 type, u32 mask)
1612 {
1613         struct crypto_rng *rng;
1614         int err;
1615
1616         rng = crypto_alloc_rng(driver, type, mask);
1617         if (IS_ERR(rng)) {
1618                 printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
1619                        "%ld\n", driver, PTR_ERR(rng));
1620                 return PTR_ERR(rng);
1621         }
1622
1623         err = test_cprng(rng, desc->suite.cprng.vecs, desc->suite.cprng.count);
1624
1625         crypto_free_rng(rng);
1626
1627         return err;
1628 }
1629
1630 static int alg_test_null(const struct alg_test_desc *desc,
1631                              const char *driver, u32 type, u32 mask)
1632 {
1633         return 0;
1634 }
1635
1636 /* Please keep this list sorted by algorithm name. */
1637 static const struct alg_test_desc alg_test_descs[] = {
1638         {
1639                 .alg = "__cbc-cast5-avx",
1640                 .test = alg_test_null,
1641                 .suite = {
1642                         .cipher = {
1643                                 .enc = {
1644                                         .vecs = NULL,
1645                                         .count = 0
1646                                 },
1647                                 .dec = {
1648                                         .vecs = NULL,
1649                                         .count = 0
1650                                 }
1651                         }
1652                 }
1653         }, {
1654                 .alg = "__cbc-cast6-avx",
1655                 .test = alg_test_null,
1656                 .suite = {
1657                         .cipher = {
1658                                 .enc = {
1659                                         .vecs = NULL,
1660                                         .count = 0
1661                                 },
1662                                 .dec = {
1663                                         .vecs = NULL,
1664                                         .count = 0
1665                                 }
1666                         }
1667                 }
1668         }, {
1669                 .alg = "__cbc-serpent-avx",
1670                 .test = alg_test_null,
1671                 .suite = {
1672                         .cipher = {
1673                                 .enc = {
1674                                         .vecs = NULL,
1675                                         .count = 0
1676                                 },
1677                                 .dec = {
1678                                         .vecs = NULL,
1679                                         .count = 0
1680                                 }
1681                         }
1682                 }
1683         }, {
1684                 .alg = "__cbc-serpent-sse2",
1685                 .test = alg_test_null,
1686                 .suite = {
1687                         .cipher = {
1688                                 .enc = {
1689                                         .vecs = NULL,
1690                                         .count = 0
1691                                 },
1692                                 .dec = {
1693                                         .vecs = NULL,
1694                                         .count = 0
1695                                 }
1696                         }
1697                 }
1698         }, {
1699                 .alg = "__cbc-twofish-avx",
1700                 .test = alg_test_null,
1701                 .suite = {
1702                         .cipher = {
1703                                 .enc = {
1704                                         .vecs = NULL,
1705                                         .count = 0
1706                                 },
1707                                 .dec = {
1708                                         .vecs = NULL,
1709                                         .count = 0
1710                                 }
1711                         }
1712                 }
1713         }, {
1714                 .alg = "__driver-cbc-aes-aesni",
1715                 .test = alg_test_null,
1716                 .fips_allowed = 1,
1717                 .suite = {
1718                         .cipher = {
1719                                 .enc = {
1720                                         .vecs = NULL,
1721                                         .count = 0
1722                                 },
1723                                 .dec = {
1724                                         .vecs = NULL,
1725                                         .count = 0
1726                                 }
1727                         }
1728                 }
1729         }, {
1730                 .alg = "__driver-cbc-camellia-aesni",
1731                 .test = alg_test_null,
1732                 .suite = {
1733                         .cipher = {
1734                                 .enc = {
1735                                         .vecs = NULL,
1736                                         .count = 0
1737                                 },
1738                                 .dec = {
1739                                         .vecs = NULL,
1740                                         .count = 0
1741                                 }
1742                         }
1743                 }
1744         }, {
1745                 .alg = "__driver-cbc-cast5-avx",
1746                 .test = alg_test_null,
1747                 .suite = {
1748                         .cipher = {
1749                                 .enc = {
1750                                         .vecs = NULL,
1751                                         .count = 0
1752                                 },
1753                                 .dec = {
1754                                         .vecs = NULL,
1755                                         .count = 0
1756                                 }
1757                         }
1758                 }
1759         }, {
1760                 .alg = "__driver-cbc-cast6-avx",
1761                 .test = alg_test_null,
1762                 .suite = {
1763                         .cipher = {
1764                                 .enc = {
1765                                         .vecs = NULL,
1766                                         .count = 0
1767                                 },
1768                                 .dec = {
1769                                         .vecs = NULL,
1770                                         .count = 0
1771                                 }
1772                         }
1773                 }
1774         }, {
1775                 .alg = "__driver-cbc-serpent-avx",
1776                 .test = alg_test_null,
1777                 .suite = {
1778                         .cipher = {
1779                                 .enc = {
1780                                         .vecs = NULL,
1781                                         .count = 0
1782                                 },
1783                                 .dec = {
1784                                         .vecs = NULL,
1785                                         .count = 0
1786                                 }
1787                         }
1788                 }
1789         }, {
1790                 .alg = "__driver-cbc-serpent-sse2",
1791                 .test = alg_test_null,
1792                 .suite = {
1793                         .cipher = {
1794                                 .enc = {
1795                                         .vecs = NULL,
1796                                         .count = 0
1797                                 },
1798                                 .dec = {
1799                                         .vecs = NULL,
1800                                         .count = 0
1801                                 }
1802                         }
1803                 }
1804         }, {
1805                 .alg = "__driver-cbc-twofish-avx",
1806                 .test = alg_test_null,
1807                 .suite = {
1808                         .cipher = {
1809                                 .enc = {
1810                                         .vecs = NULL,
1811                                         .count = 0
1812                                 },
1813                                 .dec = {
1814                                         .vecs = NULL,
1815                                         .count = 0
1816                                 }
1817                         }
1818                 }
1819         }, {
1820                 .alg = "__driver-ecb-aes-aesni",
1821                 .test = alg_test_null,
1822                 .fips_allowed = 1,
1823                 .suite = {
1824                         .cipher = {
1825                                 .enc = {
1826                                         .vecs = NULL,
1827                                         .count = 0
1828                                 },
1829                                 .dec = {
1830                                         .vecs = NULL,
1831                                         .count = 0
1832                                 }
1833                         }
1834                 }
1835         }, {
1836                 .alg = "__driver-ecb-camellia-aesni",
1837                 .test = alg_test_null,
1838                 .suite = {
1839                         .cipher = {
1840                                 .enc = {
1841                                         .vecs = NULL,
1842                                         .count = 0
1843                                 },
1844                                 .dec = {
1845                                         .vecs = NULL,
1846                                         .count = 0
1847                                 }
1848                         }
1849                 }
1850         }, {
1851                 .alg = "__driver-ecb-cast5-avx",
1852                 .test = alg_test_null,
1853                 .suite = {
1854                         .cipher = {
1855                                 .enc = {
1856                                         .vecs = NULL,
1857                                         .count = 0
1858                                 },
1859                                 .dec = {
1860                                         .vecs = NULL,
1861                                         .count = 0
1862                                 }
1863                         }
1864                 }
1865         }, {
1866                 .alg = "__driver-ecb-cast6-avx",
1867                 .test = alg_test_null,
1868                 .suite = {
1869                         .cipher = {
1870                                 .enc = {
1871                                         .vecs = NULL,
1872                                         .count = 0
1873                                 },
1874                                 .dec = {
1875                                         .vecs = NULL,
1876                                         .count = 0
1877                                 }
1878                         }
1879                 }
1880         }, {
1881                 .alg = "__driver-ecb-serpent-avx",
1882                 .test = alg_test_null,
1883                 .suite = {
1884                         .cipher = {
1885                                 .enc = {
1886                                         .vecs = NULL,
1887                                         .count = 0
1888                                 },
1889                                 .dec = {
1890                                         .vecs = NULL,
1891                                         .count = 0
1892                                 }
1893                         }
1894                 }
1895         }, {
1896                 .alg = "__driver-ecb-serpent-sse2",
1897                 .test = alg_test_null,
1898                 .suite = {
1899                         .cipher = {
1900                                 .enc = {
1901                                         .vecs = NULL,
1902                                         .count = 0
1903                                 },
1904                                 .dec = {
1905                                         .vecs = NULL,
1906                                         .count = 0
1907                                 }
1908                         }
1909                 }
1910         }, {
1911                 .alg = "__driver-ecb-twofish-avx",
1912                 .test = alg_test_null,
1913                 .suite = {
1914                         .cipher = {
1915                                 .enc = {
1916                                         .vecs = NULL,
1917                                         .count = 0
1918                                 },
1919                                 .dec = {
1920                                         .vecs = NULL,
1921                                         .count = 0
1922                                 }
1923                         }
1924                 }
1925         }, {
1926                 .alg = "__ghash-pclmulqdqni",
1927                 .test = alg_test_null,
1928                 .fips_allowed = 1,
1929                 .suite = {
1930                         .hash = {
1931                                 .vecs = NULL,
1932                                 .count = 0
1933                         }
1934                 }
1935         }, {
1936                 .alg = "ansi_cprng",
1937                 .test = alg_test_cprng,
1938                 .fips_allowed = 1,
1939                 .suite = {
1940                         .cprng = {
1941                                 .vecs = ansi_cprng_aes_tv_template,
1942                                 .count = ANSI_CPRNG_AES_TEST_VECTORS
1943                         }
1944                 }
1945         }, {
1946                 .alg = "authenc(hmac(sha1),cbc(aes))",
1947                 .test = alg_test_aead,
1948                 .fips_allowed = 1,
1949                 .suite = {
1950                         .aead = {
1951                                 .enc = {
1952                                         .vecs = hmac_sha1_aes_cbc_enc_tv_template,
1953                                         .count = HMAC_SHA1_AES_CBC_ENC_TEST_VECTORS
1954                                 }
1955                         }
1956                 }
1957         }, {
1958                 .alg = "authenc(hmac(sha256),cbc(aes))",
1959                 .test = alg_test_aead,
1960                 .fips_allowed = 1,
1961                 .suite = {
1962                         .aead = {
1963                                 .enc = {
1964                                         .vecs = hmac_sha256_aes_cbc_enc_tv_template,
1965                                         .count = HMAC_SHA256_AES_CBC_ENC_TEST_VECTORS
1966                                 }
1967                         }
1968                 }
1969         }, {
1970                 .alg = "authenc(hmac(sha512),cbc(aes))",
1971                 .test = alg_test_aead,
1972                 .fips_allowed = 1,
1973                 .suite = {
1974                         .aead = {
1975                                 .enc = {
1976                                         .vecs = hmac_sha512_aes_cbc_enc_tv_template,
1977                                         .count = HMAC_SHA512_AES_CBC_ENC_TEST_VECTORS
1978                                 }
1979                         }
1980                 }
1981         }, {
1982                 .alg = "cbc(aes)",
1983                 .test = alg_test_skcipher,
1984                 .fips_allowed = 1,
1985                 .suite = {
1986                         .cipher = {
1987                                 .enc = {
1988                                         .vecs = aes_cbc_enc_tv_template,
1989                                         .count = AES_CBC_ENC_TEST_VECTORS
1990                                 },
1991                                 .dec = {
1992                                         .vecs = aes_cbc_dec_tv_template,
1993                                         .count = AES_CBC_DEC_TEST_VECTORS
1994                                 }
1995                         }
1996                 }
1997         }, {
1998                 .alg = "cbc(anubis)",
1999                 .test = alg_test_skcipher,
2000                 .suite = {
2001                         .cipher = {
2002                                 .enc = {
2003                                         .vecs = anubis_cbc_enc_tv_template,
2004                                         .count = ANUBIS_CBC_ENC_TEST_VECTORS
2005                                 },
2006                                 .dec = {
2007                                         .vecs = anubis_cbc_dec_tv_template,
2008                                         .count = ANUBIS_CBC_DEC_TEST_VECTORS
2009                                 }
2010                         }
2011                 }
2012         }, {
2013                 .alg = "cbc(blowfish)",
2014                 .test = alg_test_skcipher,
2015                 .suite = {
2016                         .cipher = {
2017                                 .enc = {
2018                                         .vecs = bf_cbc_enc_tv_template,
2019                                         .count = BF_CBC_ENC_TEST_VECTORS
2020                                 },
2021                                 .dec = {
2022                                         .vecs = bf_cbc_dec_tv_template,
2023                                         .count = BF_CBC_DEC_TEST_VECTORS
2024                                 }
2025                         }
2026                 }
2027         }, {
2028                 .alg = "cbc(camellia)",
2029                 .test = alg_test_skcipher,
2030                 .suite = {
2031                         .cipher = {
2032                                 .enc = {
2033                                         .vecs = camellia_cbc_enc_tv_template,
2034                                         .count = CAMELLIA_CBC_ENC_TEST_VECTORS
2035                                 },
2036                                 .dec = {
2037                                         .vecs = camellia_cbc_dec_tv_template,
2038                                         .count = CAMELLIA_CBC_DEC_TEST_VECTORS
2039                                 }
2040                         }
2041                 }
2042         }, {
2043                 .alg = "cbc(cast5)",
2044                 .test = alg_test_skcipher,
2045                 .suite = {
2046                         .cipher = {
2047                                 .enc = {
2048                                         .vecs = cast5_cbc_enc_tv_template,
2049                                         .count = CAST5_CBC_ENC_TEST_VECTORS
2050                                 },
2051                                 .dec = {
2052                                         .vecs = cast5_cbc_dec_tv_template,
2053                                         .count = CAST5_CBC_DEC_TEST_VECTORS
2054                                 }
2055                         }
2056                 }
2057         }, {
2058                 .alg = "cbc(cast6)",
2059                 .test = alg_test_skcipher,
2060                 .suite = {
2061                         .cipher = {
2062                                 .enc = {
2063                                         .vecs = cast6_cbc_enc_tv_template,
2064                                         .count = CAST6_CBC_ENC_TEST_VECTORS
2065                                 },
2066                                 .dec = {
2067                                         .vecs = cast6_cbc_dec_tv_template,
2068                                         .count = CAST6_CBC_DEC_TEST_VECTORS
2069                                 }
2070                         }
2071                 }
2072         }, {
2073                 .alg = "cbc(des)",
2074                 .test = alg_test_skcipher,
2075                 .suite = {
2076                         .cipher = {
2077                                 .enc = {
2078                                         .vecs = des_cbc_enc_tv_template,
2079                                         .count = DES_CBC_ENC_TEST_VECTORS
2080                                 },
2081                                 .dec = {
2082                                         .vecs = des_cbc_dec_tv_template,
2083                                         .count = DES_CBC_DEC_TEST_VECTORS
2084                                 }
2085                         }
2086                 }
2087         }, {
2088                 .alg = "cbc(des3_ede)",
2089                 .test = alg_test_skcipher,
2090                 .fips_allowed = 1,
2091                 .suite = {
2092                         .cipher = {
2093                                 .enc = {
2094                                         .vecs = des3_ede_cbc_enc_tv_template,
2095                                         .count = DES3_EDE_CBC_ENC_TEST_VECTORS
2096                                 },
2097                                 .dec = {
2098                                         .vecs = des3_ede_cbc_dec_tv_template,
2099                                         .count = DES3_EDE_CBC_DEC_TEST_VECTORS
2100                                 }
2101                         }
2102                 }
2103         }, {
2104                 .alg = "cbc(serpent)",
2105                 .test = alg_test_skcipher,
2106                 .suite = {
2107                         .cipher = {
2108                                 .enc = {
2109                                         .vecs = serpent_cbc_enc_tv_template,
2110                                         .count = SERPENT_CBC_ENC_TEST_VECTORS
2111                                 },
2112                                 .dec = {
2113                                         .vecs = serpent_cbc_dec_tv_template,
2114                                         .count = SERPENT_CBC_DEC_TEST_VECTORS
2115                                 }
2116                         }
2117                 }
2118         }, {
2119                 .alg = "cbc(twofish)",
2120                 .test = alg_test_skcipher,
2121                 .suite = {
2122                         .cipher = {
2123                                 .enc = {
2124                                         .vecs = tf_cbc_enc_tv_template,
2125                                         .count = TF_CBC_ENC_TEST_VECTORS
2126                                 },
2127                                 .dec = {
2128                                         .vecs = tf_cbc_dec_tv_template,
2129                                         .count = TF_CBC_DEC_TEST_VECTORS
2130                                 }
2131                         }
2132                 }
2133         }, {
2134                 .alg = "ccm(aes)",
2135                 .test = alg_test_aead,
2136                 .fips_allowed = 1,
2137                 .suite = {
2138                         .aead = {
2139                                 .enc = {
2140                                         .vecs = aes_ccm_enc_tv_template,
2141                                         .count = AES_CCM_ENC_TEST_VECTORS
2142                                 },
2143                                 .dec = {
2144                                         .vecs = aes_ccm_dec_tv_template,
2145                                         .count = AES_CCM_DEC_TEST_VECTORS
2146                                 }
2147                         }
2148                 }
2149         }, {
2150                 .alg = "crc32c",
2151                 .test = alg_test_crc32c,
2152                 .fips_allowed = 1,
2153                 .suite = {
2154                         .hash = {
2155                                 .vecs = crc32c_tv_template,
2156                                 .count = CRC32C_TEST_VECTORS
2157                         }
2158                 }
2159         }, {
2160                 .alg = "cryptd(__driver-cbc-aes-aesni)",
2161                 .test = alg_test_null,
2162                 .fips_allowed = 1,
2163                 .suite = {
2164                         .cipher = {
2165                                 .enc = {
2166                                         .vecs = NULL,
2167                                         .count = 0
2168                                 },
2169                                 .dec = {
2170                                         .vecs = NULL,
2171                                         .count = 0
2172                                 }
2173                         }
2174                 }
2175         }, {
2176                 .alg = "cryptd(__driver-cbc-camellia-aesni)",
2177                 .test = alg_test_null,
2178                 .fips_allowed = 1,
2179                 .suite = {
2180                         .cipher = {
2181                                 .enc = {
2182                                         .vecs = NULL,
2183                                         .count = 0
2184                                 },
2185                                 .dec = {
2186                                         .vecs = NULL,
2187                                         .count = 0
2188                                 }
2189                         }
2190                 }
2191         }, {
2192                 .alg = "cryptd(__driver-ecb-aes-aesni)",
2193                 .test = alg_test_null,
2194                 .fips_allowed = 1,
2195                 .suite = {
2196                         .cipher = {
2197                                 .enc = {
2198                                         .vecs = NULL,
2199                                         .count = 0
2200                                 },
2201                                 .dec = {
2202                                         .vecs = NULL,
2203                                         .count = 0
2204                                 }
2205                         }
2206                 }
2207         }, {
2208                 .alg = "cryptd(__driver-ecb-camellia-aesni)",
2209                 .test = alg_test_null,
2210                 .fips_allowed = 1,
2211                 .suite = {
2212                         .cipher = {
2213                                 .enc = {
2214                                         .vecs = NULL,
2215                                         .count = 0
2216                                 },
2217                                 .dec = {
2218                                         .vecs = NULL,
2219                                         .count = 0
2220                                 }
2221                         }
2222                 }
2223         }, {
2224                 .alg = "cryptd(__driver-ecb-cast5-avx)",
2225                 .test = alg_test_null,
2226                 .suite = {
2227                         .cipher = {
2228                                 .enc = {
2229                                         .vecs = NULL,
2230                                         .count = 0
2231                                 },
2232                                 .dec = {
2233                                         .vecs = NULL,
2234                                         .count = 0
2235                                 }
2236                         }
2237                 }
2238         }, {
2239                 .alg = "cryptd(__driver-ecb-cast6-avx)",
2240                 .test = alg_test_null,
2241                 .suite = {
2242                         .cipher = {
2243                                 .enc = {
2244                                         .vecs = NULL,
2245                                         .count = 0
2246                                 },
2247                                 .dec = {
2248                                         .vecs = NULL,
2249                                         .count = 0
2250                                 }
2251                         }
2252                 }
2253         }, {
2254                 .alg = "cryptd(__driver-ecb-serpent-avx)",
2255                 .test = alg_test_null,
2256                 .suite = {
2257                         .cipher = {
2258                                 .enc = {
2259                                         .vecs = NULL,
2260                                         .count = 0
2261                                 },
2262                                 .dec = {
2263                                         .vecs = NULL,
2264                                         .count = 0
2265                                 }
2266                         }
2267                 }
2268         }, {
2269                 .alg = "cryptd(__driver-ecb-serpent-sse2)",
2270                 .test = alg_test_null,
2271                 .suite = {
2272                         .cipher = {
2273                                 .enc = {
2274                                         .vecs = NULL,
2275                                         .count = 0
2276                                 },
2277                                 .dec = {
2278                                         .vecs = NULL,
2279                                         .count = 0
2280                                 }
2281                         }
2282                 }
2283         }, {
2284                 .alg = "cryptd(__driver-ecb-twofish-avx)",
2285                 .test = alg_test_null,
2286                 .suite = {
2287                         .cipher = {
2288                                 .enc = {
2289                                         .vecs = NULL,
2290                                         .count = 0
2291                                 },
2292                                 .dec = {
2293                                         .vecs = NULL,
2294                                         .count = 0
2295                                 }
2296                         }
2297                 }
2298         }, {
2299                 .alg = "cryptd(__driver-gcm-aes-aesni)",
2300                 .test = alg_test_null,
2301                 .fips_allowed = 1,
2302                 .suite = {
2303                         .cipher = {
2304                                 .enc = {
2305                                         .vecs = NULL,
2306                                         .count = 0
2307                                 },
2308                                 .dec = {
2309                                         .vecs = NULL,
2310                                         .count = 0
2311                                 }
2312                         }
2313                 }
2314         }, {
2315                 .alg = "cryptd(__ghash-pclmulqdqni)",
2316                 .test = alg_test_null,
2317                 .fips_allowed = 1,
2318                 .suite = {
2319                         .hash = {
2320                                 .vecs = NULL,
2321                                 .count = 0
2322                         }
2323                 }
2324         }, {
2325                 .alg = "ctr(aes)",
2326                 .test = alg_test_skcipher,
2327                 .fips_allowed = 1,
2328                 .suite = {
2329                         .cipher = {
2330                                 .enc = {
2331                                         .vecs = aes_ctr_enc_tv_template,
2332                                         .count = AES_CTR_ENC_TEST_VECTORS
2333                                 },
2334                                 .dec = {
2335                                         .vecs = aes_ctr_dec_tv_template,
2336                                         .count = AES_CTR_DEC_TEST_VECTORS
2337                                 }
2338                         }
2339                 }
2340         }, {
2341                 .alg = "ctr(blowfish)",
2342                 .test = alg_test_skcipher,
2343                 .suite = {
2344                         .cipher = {
2345                                 .enc = {
2346                                         .vecs = bf_ctr_enc_tv_template,
2347                                         .count = BF_CTR_ENC_TEST_VECTORS
2348                                 },
2349                                 .dec = {
2350                                         .vecs = bf_ctr_dec_tv_template,
2351                                         .count = BF_CTR_DEC_TEST_VECTORS
2352                                 }
2353                         }
2354                 }
2355         }, {
2356                 .alg = "ctr(camellia)",
2357                 .test = alg_test_skcipher,
2358                 .suite = {
2359                         .cipher = {
2360                                 .enc = {
2361                                         .vecs = camellia_ctr_enc_tv_template,
2362                                         .count = CAMELLIA_CTR_ENC_TEST_VECTORS
2363                                 },
2364                                 .dec = {
2365                                         .vecs = camellia_ctr_dec_tv_template,
2366                                         .count = CAMELLIA_CTR_DEC_TEST_VECTORS
2367                                 }
2368                         }
2369                 }
2370         }, {
2371                 .alg = "ctr(cast5)",
2372                 .test = alg_test_skcipher,
2373                 .suite = {
2374                         .cipher = {
2375                                 .enc = {
2376                                         .vecs = cast5_ctr_enc_tv_template,
2377                                         .count = CAST5_CTR_ENC_TEST_VECTORS
2378                                 },
2379                                 .dec = {
2380                                         .vecs = cast5_ctr_dec_tv_template,
2381                                         .count = CAST5_CTR_DEC_TEST_VECTORS
2382                                 }
2383                         }
2384                 }
2385         }, {
2386                 .alg = "ctr(cast6)",
2387                 .test = alg_test_skcipher,
2388                 .suite = {
2389                         .cipher = {
2390                                 .enc = {
2391                                         .vecs = cast6_ctr_enc_tv_template,
2392                                         .count = CAST6_CTR_ENC_TEST_VECTORS
2393                                 },
2394                                 .dec = {
2395                                         .vecs = cast6_ctr_dec_tv_template,
2396                                         .count = CAST6_CTR_DEC_TEST_VECTORS
2397                                 }
2398                         }
2399                 }
2400         }, {
2401                 .alg = "ctr(des)",
2402                 .test = alg_test_skcipher,
2403                 .suite = {
2404                         .cipher = {
2405                                 .enc = {
2406                                         .vecs = des_ctr_enc_tv_template,
2407                                         .count = DES_CTR_ENC_TEST_VECTORS
2408                                 },
2409                                 .dec = {
2410                                         .vecs = des_ctr_dec_tv_template,
2411                                         .count = DES_CTR_DEC_TEST_VECTORS
2412                                 }
2413                         }
2414                 }
2415         }, {
2416                 .alg = "ctr(des3_ede)",
2417                 .test = alg_test_skcipher,
2418                 .suite = {
2419                         .cipher = {
2420                                 .enc = {
2421                                         .vecs = des3_ede_ctr_enc_tv_template,
2422                                         .count = DES3_EDE_CTR_ENC_TEST_VECTORS
2423                                 },
2424                                 .dec = {
2425                                         .vecs = des3_ede_ctr_dec_tv_template,
2426                                         .count = DES3_EDE_CTR_DEC_TEST_VECTORS
2427                                 }
2428                         }
2429                 }
2430         }, {
2431                 .alg = "ctr(serpent)",
2432                 .test = alg_test_skcipher,
2433                 .suite = {
2434                         .cipher = {
2435                                 .enc = {
2436                                         .vecs = serpent_ctr_enc_tv_template,
2437                                         .count = SERPENT_CTR_ENC_TEST_VECTORS
2438                                 },
2439                                 .dec = {
2440                                         .vecs = serpent_ctr_dec_tv_template,
2441                                         .count = SERPENT_CTR_DEC_TEST_VECTORS
2442                                 }
2443                         }
2444                 }
2445         }, {
2446                 .alg = "ctr(twofish)",
2447                 .test = alg_test_skcipher,
2448                 .suite = {
2449                         .cipher = {
2450                                 .enc = {
2451                                         .vecs = tf_ctr_enc_tv_template,
2452                                         .count = TF_CTR_ENC_TEST_VECTORS
2453                                 },
2454                                 .dec = {
2455                                         .vecs = tf_ctr_dec_tv_template,
2456                                         .count = TF_CTR_DEC_TEST_VECTORS
2457                                 }
2458                         }
2459                 }
2460         }, {
2461                 .alg = "cts(cbc(aes))",
2462                 .test = alg_test_skcipher,
2463                 .suite = {
2464                         .cipher = {
2465                                 .enc = {
2466                                         .vecs = cts_mode_enc_tv_template,
2467                                         .count = CTS_MODE_ENC_TEST_VECTORS
2468                                 },
2469                                 .dec = {
2470                                         .vecs = cts_mode_dec_tv_template,
2471                                         .count = CTS_MODE_DEC_TEST_VECTORS
2472                                 }
2473                         }
2474                 }
2475         }, {
2476                 .alg = "deflate",
2477                 .test = alg_test_comp,
2478                 .suite = {
2479                         .comp = {
2480                                 .comp = {
2481                                         .vecs = deflate_comp_tv_template,
2482                                         .count = DEFLATE_COMP_TEST_VECTORS
2483                                 },
2484                                 .decomp = {
2485                                         .vecs = deflate_decomp_tv_template,
2486                                         .count = DEFLATE_DECOMP_TEST_VECTORS
2487                                 }
2488                         }
2489                 }
2490         }, {
2491                 .alg = "ecb(__aes-aesni)",
2492                 .test = alg_test_null,
2493                 .fips_allowed = 1,
2494                 .suite = {
2495                         .cipher = {
2496                                 .enc = {
2497                                         .vecs = NULL,
2498                                         .count = 0
2499                                 },
2500                                 .dec = {
2501                                         .vecs = NULL,
2502                                         .count = 0
2503                                 }
2504                         }
2505                 }
2506         }, {
2507                 .alg = "ecb(aes)",
2508                 .test = alg_test_skcipher,
2509                 .fips_allowed = 1,
2510                 .suite = {
2511                         .cipher = {
2512                                 .enc = {
2513                                         .vecs = aes_enc_tv_template,
2514                                         .count = AES_ENC_TEST_VECTORS
2515                                 },
2516                                 .dec = {
2517                                         .vecs = aes_dec_tv_template,
2518                                         .count = AES_DEC_TEST_VECTORS
2519                                 }
2520                         }
2521                 }
2522         }, {
2523                 .alg = "ecb(anubis)",
2524                 .test = alg_test_skcipher,
2525                 .suite = {
2526                         .cipher = {
2527                                 .enc = {
2528                                         .vecs = anubis_enc_tv_template,
2529                                         .count = ANUBIS_ENC_TEST_VECTORS
2530                                 },
2531                                 .dec = {
2532                                         .vecs = anubis_dec_tv_template,
2533                                         .count = ANUBIS_DEC_TEST_VECTORS
2534                                 }
2535                         }
2536                 }
2537         }, {
2538                 .alg = "ecb(arc4)",
2539                 .test = alg_test_skcipher,
2540                 .suite = {
2541                         .cipher = {
2542                                 .enc = {
2543                                         .vecs = arc4_enc_tv_template,
2544                                         .count = ARC4_ENC_TEST_VECTORS
2545                                 },
2546                                 .dec = {
2547                                         .vecs = arc4_dec_tv_template,
2548                                         .count = ARC4_DEC_TEST_VECTORS
2549                                 }
2550                         }
2551                 }
2552         }, {
2553                 .alg = "ecb(blowfish)",
2554                 .test = alg_test_skcipher,
2555                 .suite = {
2556                         .cipher = {
2557                                 .enc = {
2558                                         .vecs = bf_enc_tv_template,
2559                                         .count = BF_ENC_TEST_VECTORS
2560                                 },
2561                                 .dec = {
2562                                         .vecs = bf_dec_tv_template,
2563                                         .count = BF_DEC_TEST_VECTORS
2564                                 }
2565                         }
2566                 }
2567         }, {
2568                 .alg = "ecb(camellia)",
2569                 .test = alg_test_skcipher,
2570                 .suite = {
2571                         .cipher = {
2572                                 .enc = {
2573                                         .vecs = camellia_enc_tv_template,
2574                                         .count = CAMELLIA_ENC_TEST_VECTORS
2575                                 },
2576                                 .dec = {
2577                                         .vecs = camellia_dec_tv_template,
2578                                         .count = CAMELLIA_DEC_TEST_VECTORS
2579                                 }
2580                         }
2581                 }
2582         }, {
2583                 .alg = "ecb(cast5)",
2584                 .test = alg_test_skcipher,
2585                 .suite = {
2586                         .cipher = {
2587                                 .enc = {
2588                                         .vecs = cast5_enc_tv_template,
2589                                         .count = CAST5_ENC_TEST_VECTORS
2590                                 },
2591                                 .dec = {
2592                                         .vecs = cast5_dec_tv_template,
2593                                         .count = CAST5_DEC_TEST_VECTORS
2594                                 }
2595                         }
2596                 }
2597         }, {
2598                 .alg = "ecb(cast6)",
2599                 .test = alg_test_skcipher,
2600                 .suite = {
2601                         .cipher = {
2602                                 .enc = {
2603                                         .vecs = cast6_enc_tv_template,
2604                                         .count = CAST6_ENC_TEST_VECTORS
2605                                 },
2606                                 .dec = {
2607                                         .vecs = cast6_dec_tv_template,
2608                                         .count = CAST6_DEC_TEST_VECTORS
2609                                 }
2610                         }
2611                 }
2612         }, {
2613                 .alg = "ecb(des)",
2614                 .test = alg_test_skcipher,
2615                 .fips_allowed = 1,
2616                 .suite = {
2617                         .cipher = {
2618                                 .enc = {
2619                                         .vecs = des_enc_tv_template,
2620                                         .count = DES_ENC_TEST_VECTORS
2621                                 },
2622                                 .dec = {
2623                                         .vecs = des_dec_tv_template,
2624                                         .count = DES_DEC_TEST_VECTORS
2625                                 }
2626                         }
2627                 }
2628         }, {
2629                 .alg = "ecb(des3_ede)",
2630                 .test = alg_test_skcipher,
2631                 .fips_allowed = 1,
2632                 .suite = {
2633                         .cipher = {
2634                                 .enc = {
2635                                         .vecs = des3_ede_enc_tv_template,
2636                                         .count = DES3_EDE_ENC_TEST_VECTORS
2637                                 },
2638                                 .dec = {
2639                                         .vecs = des3_ede_dec_tv_template,
2640                                         .count = DES3_EDE_DEC_TEST_VECTORS
2641                                 }
2642                         }
2643                 }
2644         }, {
2645                 .alg = "ecb(khazad)",
2646                 .test = alg_test_skcipher,
2647                 .suite = {
2648                         .cipher = {
2649                                 .enc = {
2650                                         .vecs = khazad_enc_tv_template,
2651                                         .count = KHAZAD_ENC_TEST_VECTORS
2652                                 },
2653                                 .dec = {
2654                                         .vecs = khazad_dec_tv_template,
2655                                         .count = KHAZAD_DEC_TEST_VECTORS
2656                                 }
2657                         }
2658                 }
2659         }, {
2660                 .alg = "ecb(seed)",
2661                 .test = alg_test_skcipher,
2662                 .suite = {
2663                         .cipher = {
2664                                 .enc = {
2665                                         .vecs = seed_enc_tv_template,
2666                                         .count = SEED_ENC_TEST_VECTORS
2667                                 },
2668                                 .dec = {
2669                                         .vecs = seed_dec_tv_template,
2670                                         .count = SEED_DEC_TEST_VECTORS
2671                                 }
2672                         }
2673                 }
2674         }, {
2675                 .alg = "ecb(serpent)",
2676                 .test = alg_test_skcipher,
2677                 .suite = {
2678                         .cipher = {
2679                                 .enc = {
2680                                         .vecs = serpent_enc_tv_template,
2681                                         .count = SERPENT_ENC_TEST_VECTORS
2682                                 },
2683                                 .dec = {
2684                                         .vecs = serpent_dec_tv_template,
2685                                         .count = SERPENT_DEC_TEST_VECTORS
2686                                 }
2687                         }
2688                 }
2689         }, {
2690                 .alg = "ecb(tea)",
2691                 .test = alg_test_skcipher,
2692                 .suite = {
2693                         .cipher = {
2694                                 .enc = {
2695                                         .vecs = tea_enc_tv_template,
2696                                         .count = TEA_ENC_TEST_VECTORS
2697                                 },
2698                                 .dec = {
2699                                         .vecs = tea_dec_tv_template,
2700                                         .count = TEA_DEC_TEST_VECTORS
2701                                 }
2702                         }
2703                 }
2704         }, {
2705                 .alg = "ecb(tnepres)",
2706                 .test = alg_test_skcipher,
2707                 .suite = {
2708                         .cipher = {
2709                                 .enc = {
2710                                         .vecs = tnepres_enc_tv_template,
2711                                         .count = TNEPRES_ENC_TEST_VECTORS
2712                                 },
2713                                 .dec = {
2714                                         .vecs = tnepres_dec_tv_template,
2715                                         .count = TNEPRES_DEC_TEST_VECTORS
2716                                 }
2717                         }
2718                 }
2719         }, {
2720                 .alg = "ecb(twofish)",
2721                 .test = alg_test_skcipher,
2722                 .suite = {
2723                         .cipher = {
2724                                 .enc = {
2725                                         .vecs = tf_enc_tv_template,
2726                                         .count = TF_ENC_TEST_VECTORS
2727                                 },
2728                                 .dec = {
2729                                         .vecs = tf_dec_tv_template,
2730                                         .count = TF_DEC_TEST_VECTORS
2731                                 }
2732                         }
2733                 }
2734         }, {
2735                 .alg = "ecb(xeta)",
2736                 .test = alg_test_skcipher,
2737                 .suite = {
2738                         .cipher = {
2739                                 .enc = {
2740                                         .vecs = xeta_enc_tv_template,
2741                                         .count = XETA_ENC_TEST_VECTORS
2742                                 },
2743                                 .dec = {
2744                                         .vecs = xeta_dec_tv_template,
2745                                         .count = XETA_DEC_TEST_VECTORS
2746                                 }
2747                         }
2748                 }
2749         }, {
2750                 .alg = "ecb(xtea)",
2751                 .test = alg_test_skcipher,
2752                 .suite = {
2753                         .cipher = {
2754                                 .enc = {
2755                                         .vecs = xtea_enc_tv_template,
2756                                         .count = XTEA_ENC_TEST_VECTORS
2757                                 },
2758                                 .dec = {
2759                                         .vecs = xtea_dec_tv_template,
2760                                         .count = XTEA_DEC_TEST_VECTORS
2761                                 }
2762                         }
2763                 }
2764         }, {
2765                 .alg = "gcm(aes)",
2766                 .test = alg_test_aead,
2767                 .fips_allowed = 1,
2768                 .suite = {
2769                         .aead = {
2770                                 .enc = {
2771                                         .vecs = aes_gcm_enc_tv_template,
2772                                         .count = AES_GCM_ENC_TEST_VECTORS
2773                                 },
2774                                 .dec = {
2775                                         .vecs = aes_gcm_dec_tv_template,
2776                                         .count = AES_GCM_DEC_TEST_VECTORS
2777                                 }
2778                         }
2779                 }
2780         }, {
2781                 .alg = "ghash",
2782                 .test = alg_test_hash,
2783                 .fips_allowed = 1,
2784                 .suite = {
2785                         .hash = {
2786                                 .vecs = ghash_tv_template,
2787                                 .count = GHASH_TEST_VECTORS
2788                         }
2789                 }
2790         }, {
2791                 .alg = "hmac(crc32)",
2792                 .test = alg_test_hash,
2793                 .suite = {
2794                         .hash = {
2795                                 .vecs = bfin_crc_tv_template,
2796                                 .count = BFIN_CRC_TEST_VECTORS
2797                         }
2798                 }
2799         }, {
2800                 .alg = "hmac(md5)",
2801                 .test = alg_test_hash,
2802                 .suite = {
2803                         .hash = {
2804                                 .vecs = hmac_md5_tv_template,
2805                                 .count = HMAC_MD5_TEST_VECTORS
2806                         }
2807                 }
2808         }, {
2809                 .alg = "hmac(rmd128)",
2810                 .test = alg_test_hash,
2811                 .suite = {
2812                         .hash = {
2813                                 .vecs = hmac_rmd128_tv_template,
2814                                 .count = HMAC_RMD128_TEST_VECTORS
2815                         }
2816                 }
2817         }, {
2818                 .alg = "hmac(rmd160)",
2819                 .test = alg_test_hash,
2820                 .suite = {
2821                         .hash = {
2822                                 .vecs = hmac_rmd160_tv_template,
2823                                 .count = HMAC_RMD160_TEST_VECTORS
2824                         }
2825                 }
2826         }, {
2827                 .alg = "hmac(sha1)",
2828                 .test = alg_test_hash,
2829                 .fips_allowed = 1,
2830                 .suite = {
2831                         .hash = {
2832                                 .vecs = hmac_sha1_tv_template,
2833                                 .count = HMAC_SHA1_TEST_VECTORS
2834                         }
2835                 }
2836         }, {
2837                 .alg = "hmac(sha224)",
2838                 .test = alg_test_hash,
2839                 .fips_allowed = 1,
2840                 .suite = {
2841                         .hash = {
2842                                 .vecs = hmac_sha224_tv_template,
2843                                 .count = HMAC_SHA224_TEST_VECTORS
2844                         }
2845                 }
2846         }, {
2847                 .alg = "hmac(sha256)",
2848                 .test = alg_test_hash,
2849                 .fips_allowed = 1,
2850                 .suite = {
2851                         .hash = {
2852                                 .vecs = hmac_sha256_tv_template,
2853                                 .count = HMAC_SHA256_TEST_VECTORS
2854                         }
2855                 }
2856         }, {
2857                 .alg = "hmac(sha384)",
2858                 .test = alg_test_hash,
2859                 .fips_allowed = 1,
2860                 .suite = {
2861                         .hash = {
2862                                 .vecs = hmac_sha384_tv_template,
2863                                 .count = HMAC_SHA384_TEST_VECTORS
2864                         }
2865                 }
2866         }, {
2867                 .alg = "hmac(sha512)",
2868                 .test = alg_test_hash,
2869                 .fips_allowed = 1,
2870                 .suite = {
2871                         .hash = {
2872                                 .vecs = hmac_sha512_tv_template,
2873                                 .count = HMAC_SHA512_TEST_VECTORS
2874                         }
2875                 }
2876         }, {
2877                 .alg = "lrw(aes)",
2878                 .test = alg_test_skcipher,
2879                 .suite = {
2880                         .cipher = {
2881                                 .enc = {
2882                                         .vecs = aes_lrw_enc_tv_template,
2883                                         .count = AES_LRW_ENC_TEST_VECTORS
2884                                 },
2885                                 .dec = {
2886                                         .vecs = aes_lrw_dec_tv_template,
2887                                         .count = AES_LRW_DEC_TEST_VECTORS
2888                                 }
2889                         }
2890                 }
2891         }, {
2892                 .alg = "lrw(camellia)",
2893                 .test = alg_test_skcipher,
2894                 .suite = {
2895                         .cipher = {
2896                                 .enc = {
2897                                         .vecs = camellia_lrw_enc_tv_template,
2898                                         .count = CAMELLIA_LRW_ENC_TEST_VECTORS
2899                                 },
2900                                 .dec = {
2901                                         .vecs = camellia_lrw_dec_tv_template,
2902                                         .count = CAMELLIA_LRW_DEC_TEST_VECTORS
2903                                 }
2904                         }
2905                 }
2906         }, {
2907                 .alg = "lrw(cast6)",
2908                 .test = alg_test_skcipher,
2909                 .suite = {
2910                         .cipher = {
2911                                 .enc = {
2912                                         .vecs = cast6_lrw_enc_tv_template,
2913                                         .count = CAST6_LRW_ENC_TEST_VECTORS
2914                                 },
2915                                 .dec = {
2916                                         .vecs = cast6_lrw_dec_tv_template,
2917                                         .count = CAST6_LRW_DEC_TEST_VECTORS
2918                                 }
2919                         }
2920                 }
2921         }, {
2922                 .alg = "lrw(serpent)",
2923                 .test = alg_test_skcipher,
2924                 .suite = {
2925                         .cipher = {
2926                                 .enc = {
2927                                         .vecs = serpent_lrw_enc_tv_template,
2928                                         .count = SERPENT_LRW_ENC_TEST_VECTORS
2929                                 },
2930                                 .dec = {
2931                                         .vecs = serpent_lrw_dec_tv_template,
2932                                         .count = SERPENT_LRW_DEC_TEST_VECTORS
2933                                 }
2934                         }
2935                 }
2936         }, {
2937                 .alg = "lrw(twofish)",
2938                 .test = alg_test_skcipher,
2939                 .suite = {
2940                         .cipher = {
2941                                 .enc = {
2942                                         .vecs = tf_lrw_enc_tv_template,
2943                                         .count = TF_LRW_ENC_TEST_VECTORS
2944                                 },
2945                                 .dec = {
2946                                         .vecs = tf_lrw_dec_tv_template,
2947                                         .count = TF_LRW_DEC_TEST_VECTORS
2948                                 }
2949                         }
2950                 }
2951         }, {
2952                 .alg = "lzo",
2953                 .test = alg_test_comp,
2954                 .suite = {
2955                         .comp = {
2956                                 .comp = {
2957                                         .vecs = lzo_comp_tv_template,
2958                                         .count = LZO_COMP_TEST_VECTORS
2959                                 },
2960                                 .decomp = {
2961                                         .vecs = lzo_decomp_tv_template,
2962                                         .count = LZO_DECOMP_TEST_VECTORS
2963                                 }
2964                         }
2965                 }
2966         }, {
2967                 .alg = "md4",
2968                 .test = alg_test_hash,
2969                 .suite = {
2970                         .hash = {
2971                                 .vecs = md4_tv_template,
2972                                 .count = MD4_TEST_VECTORS
2973                         }
2974                 }
2975         }, {
2976                 .alg = "md5",
2977                 .test = alg_test_hash,
2978                 .suite = {
2979                         .hash = {
2980                                 .vecs = md5_tv_template,
2981                                 .count = MD5_TEST_VECTORS
2982                         }
2983                 }
2984         }, {
2985                 .alg = "michael_mic",
2986                 .test = alg_test_hash,
2987                 .suite = {
2988                         .hash = {
2989                                 .vecs = michael_mic_tv_template,
2990                                 .count = MICHAEL_MIC_TEST_VECTORS
2991                         }
2992                 }
2993         }, {
2994                 .alg = "ofb(aes)",
2995                 .test = alg_test_skcipher,
2996                 .fips_allowed = 1,
2997                 .suite = {
2998                         .cipher = {
2999                                 .enc = {
3000                                         .vecs = aes_ofb_enc_tv_template,
3001                                         .count = AES_OFB_ENC_TEST_VECTORS
3002                                 },
3003                                 .dec = {
3004                                         .vecs = aes_ofb_dec_tv_template,
3005                                         .count = AES_OFB_DEC_TEST_VECTORS
3006                                 }
3007                         }
3008                 }
3009         }, {
3010                 .alg = "pcbc(fcrypt)",
3011                 .test = alg_test_skcipher,
3012                 .suite = {
3013                         .cipher = {
3014                                 .enc = {
3015                                         .vecs = fcrypt_pcbc_enc_tv_template,
3016                                         .count = FCRYPT_ENC_TEST_VECTORS
3017                                 },
3018                                 .dec = {
3019                                         .vecs = fcrypt_pcbc_dec_tv_template,
3020                                         .count = FCRYPT_DEC_TEST_VECTORS
3021                                 }
3022                         }
3023                 }
3024         }, {
3025                 .alg = "rfc3686(ctr(aes))",
3026                 .test = alg_test_skcipher,
3027                 .fips_allowed = 1,
3028                 .suite = {
3029                         .cipher = {
3030                                 .enc = {
3031                                         .vecs = aes_ctr_rfc3686_enc_tv_template,
3032                                         .count = AES_CTR_3686_ENC_TEST_VECTORS
3033                                 },
3034                                 .dec = {
3035                                         .vecs = aes_ctr_rfc3686_dec_tv_template,
3036                                         .count = AES_CTR_3686_DEC_TEST_VECTORS
3037                                 }
3038                         }
3039                 }
3040         }, {
3041                 .alg = "rfc4106(gcm(aes))",
3042                 .test = alg_test_aead,
3043                 .suite = {
3044                         .aead = {
3045                                 .enc = {
3046                                         .vecs = aes_gcm_rfc4106_enc_tv_template,
3047                                         .count = AES_GCM_4106_ENC_TEST_VECTORS
3048                                 },
3049                                 .dec = {
3050                                         .vecs = aes_gcm_rfc4106_dec_tv_template,
3051                                         .count = AES_GCM_4106_DEC_TEST_VECTORS
3052                                 }
3053                         }
3054                 }
3055         }, {
3056
3057
3058                 .alg = "rfc4309(ccm(aes))",
3059                 .test = alg_test_aead,
3060                 .fips_allowed = 1,
3061                 .suite = {
3062                         .aead = {
3063                                 .enc = {
3064                                         .vecs = aes_ccm_rfc4309_enc_tv_template,
3065                                         .count = AES_CCM_4309_ENC_TEST_VECTORS
3066                                 },
3067                                 .dec = {
3068                                         .vecs = aes_ccm_rfc4309_dec_tv_template,
3069                                         .count = AES_CCM_4309_DEC_TEST_VECTORS
3070                                 }
3071                         }
3072                 }
3073         }, {
3074                 .alg = "rmd128",
3075                 .test = alg_test_hash,
3076                 .suite = {
3077                         .hash = {
3078                                 .vecs = rmd128_tv_template,
3079                                 .count = RMD128_TEST_VECTORS
3080                         }
3081                 }
3082         }, {
3083                 .alg = "rmd160",
3084                 .test = alg_test_hash,
3085                 .suite = {
3086                         .hash = {
3087                                 .vecs = rmd160_tv_template,
3088                                 .count = RMD160_TEST_VECTORS
3089                         }
3090                 }
3091         }, {
3092                 .alg = "rmd256",
3093                 .test = alg_test_hash,
3094                 .suite = {
3095                         .hash = {
3096                                 .vecs = rmd256_tv_template,
3097                                 .count = RMD256_TEST_VECTORS
3098                         }
3099                 }
3100         }, {
3101                 .alg = "rmd320",
3102                 .test = alg_test_hash,
3103                 .suite = {
3104                         .hash = {
3105                                 .vecs = rmd320_tv_template,
3106                                 .count = RMD320_TEST_VECTORS
3107                         }
3108                 }
3109         }, {
3110                 .alg = "salsa20",
3111                 .test = alg_test_skcipher,
3112                 .suite = {
3113                         .cipher = {
3114                                 .enc = {
3115                                         .vecs = salsa20_stream_enc_tv_template,
3116                                         .count = SALSA20_STREAM_ENC_TEST_VECTORS
3117                                 }
3118                         }
3119                 }
3120         }, {
3121                 .alg = "sha1",
3122                 .test = alg_test_hash,
3123                 .fips_allowed = 1,
3124                 .suite = {
3125                         .hash = {
3126                                 .vecs = sha1_tv_template,
3127                                 .count = SHA1_TEST_VECTORS
3128                         }
3129                 }
3130         }, {
3131                 .alg = "sha224",
3132                 .test = alg_test_hash,
3133                 .fips_allowed = 1,
3134                 .suite = {
3135                         .hash = {
3136                                 .vecs = sha224_tv_template,
3137                                 .count = SHA224_TEST_VECTORS
3138                         }
3139                 }
3140         }, {
3141                 .alg = "sha256",
3142                 .test = alg_test_hash,
3143                 .fips_allowed = 1,
3144                 .suite = {
3145                         .hash = {
3146                                 .vecs = sha256_tv_template,
3147                                 .count = SHA256_TEST_VECTORS
3148                         }
3149                 }
3150         }, {
3151                 .alg = "sha384",
3152                 .test = alg_test_hash,
3153                 .fips_allowed = 1,
3154                 .suite = {
3155                         .hash = {
3156                                 .vecs = sha384_tv_template,
3157                                 .count = SHA384_TEST_VECTORS
3158                         }
3159                 }
3160         }, {
3161                 .alg = "sha512",
3162                 .test = alg_test_hash,
3163                 .fips_allowed = 1,
3164                 .suite = {
3165                         .hash = {
3166                                 .vecs = sha512_tv_template,
3167                                 .count = SHA512_TEST_VECTORS
3168                         }
3169                 }
3170         }, {
3171                 .alg = "tgr128",
3172                 .test = alg_test_hash,
3173                 .suite = {
3174                         .hash = {
3175                                 .vecs = tgr128_tv_template,
3176                                 .count = TGR128_TEST_VECTORS
3177                         }
3178                 }
3179         }, {
3180                 .alg = "tgr160",
3181                 .test = alg_test_hash,
3182                 .suite = {
3183                         .hash = {
3184                                 .vecs = tgr160_tv_template,
3185                                 .count = TGR160_TEST_VECTORS
3186                         }
3187                 }
3188         }, {
3189                 .alg = "tgr192",
3190                 .test = alg_test_hash,
3191                 .suite = {
3192                         .hash = {
3193                                 .vecs = tgr192_tv_template,
3194                                 .count = TGR192_TEST_VECTORS
3195                         }
3196                 }
3197         }, {
3198                 .alg = "vmac(aes)",
3199                 .test = alg_test_hash,
3200                 .suite = {
3201                         .hash = {
3202                                 .vecs = aes_vmac128_tv_template,
3203                                 .count = VMAC_AES_TEST_VECTORS
3204                         }
3205                 }
3206         }, {
3207                 .alg = "wp256",
3208                 .test = alg_test_hash,
3209                 .suite = {
3210                         .hash = {
3211                                 .vecs = wp256_tv_template,
3212                                 .count = WP256_TEST_VECTORS
3213                         }
3214                 }
3215         }, {
3216                 .alg = "wp384",
3217                 .test = alg_test_hash,
3218                 .suite = {
3219                         .hash = {
3220                                 .vecs = wp384_tv_template,
3221                                 .count = WP384_TEST_VECTORS
3222                         }
3223                 }
3224         }, {
3225                 .alg = "wp512",
3226                 .test = alg_test_hash,
3227                 .suite = {
3228                         .hash = {
3229                                 .vecs = wp512_tv_template,
3230                                 .count = WP512_TEST_VECTORS
3231                         }
3232                 }
3233         }, {
3234                 .alg = "xcbc(aes)",
3235                 .test = alg_test_hash,
3236                 .suite = {
3237                         .hash = {
3238                                 .vecs = aes_xcbc128_tv_template,
3239                                 .count = XCBC_AES_TEST_VECTORS
3240                         }
3241                 }
3242         }, {
3243                 .alg = "xts(aes)",
3244                 .test = alg_test_skcipher,
3245                 .fips_allowed = 1,
3246                 .suite = {
3247                         .cipher = {
3248                                 .enc = {
3249                                         .vecs = aes_xts_enc_tv_template,
3250                                         .count = AES_XTS_ENC_TEST_VECTORS
3251                                 },
3252                                 .dec = {
3253                                         .vecs = aes_xts_dec_tv_template,
3254                                         .count = AES_XTS_DEC_TEST_VECTORS
3255                                 }
3256                         }
3257                 }
3258         }, {
3259                 .alg = "xts(camellia)",
3260                 .test = alg_test_skcipher,
3261                 .suite = {
3262                         .cipher = {
3263                                 .enc = {
3264                                         .vecs = camellia_xts_enc_tv_template,
3265                                         .count = CAMELLIA_XTS_ENC_TEST_VECTORS
3266                                 },
3267                                 .dec = {
3268                                         .vecs = camellia_xts_dec_tv_template,
3269                                         .count = CAMELLIA_XTS_DEC_TEST_VECTORS
3270                                 }
3271                         }
3272                 }
3273         }, {
3274                 .alg = "xts(cast6)",
3275                 .test = alg_test_skcipher,
3276                 .suite = {
3277                         .cipher = {
3278                                 .enc = {
3279                                         .vecs = cast6_xts_enc_tv_template,
3280                                         .count = CAST6_XTS_ENC_TEST_VECTORS
3281                                 },
3282                                 .dec = {
3283                                         .vecs = cast6_xts_dec_tv_template,
3284                                         .count = CAST6_XTS_DEC_TEST_VECTORS
3285                                 }
3286                         }
3287                 }
3288         }, {
3289                 .alg = "xts(serpent)",
3290                 .test = alg_test_skcipher,
3291                 .suite = {
3292                         .cipher = {
3293                                 .enc = {
3294                                         .vecs = serpent_xts_enc_tv_template,
3295                                         .count = SERPENT_XTS_ENC_TEST_VECTORS
3296                                 },
3297                                 .dec = {
3298                                         .vecs = serpent_xts_dec_tv_template,
3299                                         .count = SERPENT_XTS_DEC_TEST_VECTORS
3300                                 }
3301                         }
3302                 }
3303         }, {
3304                 .alg = "xts(twofish)",
3305                 .test = alg_test_skcipher,
3306                 .suite = {
3307                         .cipher = {
3308                                 .enc = {
3309                                         .vecs = tf_xts_enc_tv_template,
3310                                         .count = TF_XTS_ENC_TEST_VECTORS
3311                                 },
3312                                 .dec = {
3313                                         .vecs = tf_xts_dec_tv_template,
3314                                         .count = TF_XTS_DEC_TEST_VECTORS
3315                                 }
3316                         }
3317                 }
3318         }, {
3319                 .alg = "zlib",
3320                 .test = alg_test_pcomp,
3321                 .suite = {
3322                         .pcomp = {
3323                                 .comp = {
3324                                         .vecs = zlib_comp_tv_template,
3325                                         .count = ZLIB_COMP_TEST_VECTORS
3326                                 },
3327                                 .decomp = {
3328                                         .vecs = zlib_decomp_tv_template,
3329                                         .count = ZLIB_DECOMP_TEST_VECTORS
3330                                 }
3331                         }
3332                 }
3333         }
3334 };
3335
3336 static int alg_find_test(const char *alg)
3337 {
3338         int start = 0;
3339         int end = ARRAY_SIZE(alg_test_descs);
3340
3341         while (start < end) {
3342                 int i = (start + end) / 2;
3343                 int diff = strcmp(alg_test_descs[i].alg, alg);
3344
3345                 if (diff > 0) {
3346                         end = i;
3347                         continue;
3348                 }
3349
3350                 if (diff < 0) {
3351                         start = i + 1;
3352                         continue;
3353                 }
3354
3355                 return i;
3356         }
3357
3358         return -1;
3359 }
3360
3361 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
3362 {
3363         int i;
3364         int j;
3365         int rc;
3366
3367         if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) {
3368                 char nalg[CRYPTO_MAX_ALG_NAME];
3369
3370                 if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
3371                     sizeof(nalg))
3372                         return -ENAMETOOLONG;
3373
3374                 i = alg_find_test(nalg);
3375                 if (i < 0)
3376                         goto notest;
3377
3378                 if (fips_enabled && !alg_test_descs[i].fips_allowed)
3379                         goto non_fips_alg;
3380
3381                 rc = alg_test_cipher(alg_test_descs + i, driver, type, mask);
3382                 goto test_done;
3383         }
3384
3385         i = alg_find_test(alg);
3386         j = alg_find_test(driver);
3387         if (i < 0 && j < 0)
3388                 goto notest;
3389
3390         if (fips_enabled && ((i >= 0 && !alg_test_descs[i].fips_allowed) ||
3391                              (j >= 0 && !alg_test_descs[j].fips_allowed)))
3392                 goto non_fips_alg;
3393
3394         rc = 0;
3395         if (i >= 0)
3396                 rc |= alg_test_descs[i].test(alg_test_descs + i, driver,
3397                                              type, mask);
3398         if (j >= 0)
3399                 rc |= alg_test_descs[j].test(alg_test_descs + j, driver,
3400                                              type, mask);
3401
3402 test_done:
3403         if (fips_enabled && rc)
3404                 panic("%s: %s alg self test failed in fips mode!\n", driver, alg);
3405
3406         if (fips_enabled && !rc)
3407                 printk(KERN_INFO "alg: self-tests for %s (%s) passed\n",
3408                        driver, alg);
3409
3410         return rc;
3411
3412 notest:
3413         printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
3414         return 0;
3415 non_fips_alg:
3416         return -EINVAL;
3417 }
3418
3419 #endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */
3420
3421 EXPORT_SYMBOL_GPL(alg_test);