2008-07-31 13:08:25 +04:00
/*
* Algorithm testing framework and tests .
*
* Copyright ( c ) 2002 James Morris < jmorris @ intercode . com . au >
* Copyright ( c ) 2002 Jean - Francois Dive < jef @ linuxbe . org >
* Copyright ( c ) 2007 Nokia Siemens Networks
* Copyright ( c ) 2008 Herbert Xu < herbert @ gondor . apana . org . au >
*
2010-11-04 22:02:04 +03:00
* Updated RFC4106 AES - GCM testing .
* Authors : Aidan O ' Mahony ( aidan . o . mahony @ intel . com )
* Adrian Hoban < adrian . hoban @ intel . com >
* Gabriele Paoloni < gabriele . paoloni @ intel . com >
* Tadeusz Struk ( tadeusz . struk @ intel . com )
* Copyright ( c ) 2010 , Intel Corporation .
*
2008-07-31 13:08:25 +04:00
* This program is free software ; you can redistribute it and / or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation ; either version 2 of the License , or ( at your option )
* any later version .
*
*/
2015-04-22 10:06:31 +03:00
# include <crypto/aead.h>
2008-07-31 13:08:25 +04:00
# include <crypto/hash.h>
2015-08-20 10:21:46 +03:00
# include <crypto/skcipher.h>
2008-07-31 13:08:25 +04:00
# include <linux/err.h>
2015-04-22 08:25:58 +03:00
# include <linux/fips.h>
2008-07-31 13:08:25 +04:00
# include <linux/module.h>
# include <linux/scatterlist.h>
# include <linux/slab.h>
# include <linux/string.h>
2009-05-04 15:44:50 +04:00
# include <crypto/rng.h>
2014-05-31 19:25:36 +04:00
# include <crypto/drbg.h>
2015-06-16 20:31:06 +03:00
# include <crypto/akcipher.h>
2016-06-22 19:49:14 +03:00
# include <crypto/kpp.h>
2016-10-21 15:19:54 +03:00
# include <crypto/acompress.h>
2008-07-31 13:08:25 +04:00
# include "internal.h"
2010-06-03 14:53:43 +04:00
2016-05-03 12:00:17 +03:00
static bool notests ;
module_param ( notests , bool , 0644 ) ;
MODULE_PARM_DESC ( notests , " disable crypto self-tests " ) ;
2010-08-06 05:40:28 +04:00
# ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
2010-06-03 14:53:43 +04:00
/* a perfect nop */
int alg_test ( const char * driver , const char * alg , u32 type , u32 mask )
{
return 0 ;
}
# else
2008-07-31 13:08:25 +04:00
# include "testmgr.h"
/*
* Need slab memory for testing ( size in number of pages ) .
*/
# define XBUFSIZE 8
/*
* Indexes into the xbuf to simulate cross - page access .
*/
# define IDX1 32
# define IDX2 32400
2016-12-08 11:23:52 +03:00
# define IDX3 1511
2008-07-31 13:08:25 +04:00
# define IDX4 8193
# define IDX5 22222
# define IDX6 17101
# define IDX7 27333
# define IDX8 3000
/*
* Used by test_cipher ( )
*/
# define ENCRYPT 1
# define DECRYPT 0
struct tcrypt_result {
struct completion completion ;
int err ;
} ;
struct aead_test_suite {
struct {
struct aead_testvec * vecs ;
unsigned int count ;
} enc , dec ;
} ;
struct cipher_test_suite {
struct {
struct cipher_testvec * vecs ;
unsigned int count ;
} enc , dec ;
} ;
struct comp_test_suite {
struct {
struct comp_testvec * vecs ;
unsigned int count ;
} comp , decomp ;
} ;
struct hash_test_suite {
struct hash_testvec * vecs ;
unsigned int count ;
} ;
2009-05-04 15:44:50 +04:00
struct cprng_test_suite {
struct cprng_testvec * vecs ;
unsigned int count ;
} ;
2014-05-31 19:25:36 +04:00
struct drbg_test_suite {
struct drbg_testvec * vecs ;
unsigned int count ;
} ;
2015-06-16 20:31:06 +03:00
struct akcipher_test_suite {
struct akcipher_testvec * vecs ;
unsigned int count ;
} ;
2016-06-22 19:49:14 +03:00
struct kpp_test_suite {
struct kpp_testvec * vecs ;
unsigned int count ;
} ;
2008-07-31 13:08:25 +04:00
struct alg_test_desc {
const char * alg ;
int ( * test ) ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask ) ;
2009-05-15 09:16:03 +04:00
int fips_allowed ; /* set if alg is allowed in fips mode */
2008-07-31 13:08:25 +04:00
union {
struct aead_test_suite aead ;
struct cipher_test_suite cipher ;
struct comp_test_suite comp ;
struct hash_test_suite hash ;
2009-05-04 15:44:50 +04:00
struct cprng_test_suite cprng ;
2014-05-31 19:25:36 +04:00
struct drbg_test_suite drbg ;
2015-06-16 20:31:06 +03:00
struct akcipher_test_suite akcipher ;
2016-06-22 19:49:14 +03:00
struct kpp_test_suite kpp ;
2008-07-31 13:08:25 +04:00
} suite ;
} ;
static unsigned int IDX [ 8 ] = { IDX1 , IDX2 , IDX3 , IDX4 , IDX5 , IDX6 , IDX7 , IDX8 } ;
static void hexdump ( unsigned char * buf , unsigned int len )
{
print_hex_dump ( KERN_CONT , " " , DUMP_PREFIX_OFFSET ,
16 , 1 ,
buf , len , false ) ;
}
static void tcrypt_complete ( struct crypto_async_request * req , int err )
{
struct tcrypt_result * res = req - > data ;
if ( err = = - EINPROGRESS )
return ;
res - > err = err ;
complete ( & res - > completion ) ;
}
2009-05-06 10:15:47 +04:00
static int testmgr_alloc_buf ( char * buf [ XBUFSIZE ] )
{
int i ;
for ( i = 0 ; i < XBUFSIZE ; i + + ) {
buf [ i ] = ( void * ) __get_free_page ( GFP_KERNEL ) ;
if ( ! buf [ i ] )
goto err_free_buf ;
}
return 0 ;
err_free_buf :
while ( i - - > 0 )
free_page ( ( unsigned long ) buf [ i ] ) ;
return - ENOMEM ;
}
static void testmgr_free_buf ( char * buf [ XBUFSIZE ] )
{
int i ;
for ( i = 0 ; i < XBUFSIZE ; i + + )
free_page ( ( unsigned long ) buf [ i ] ) ;
}
2014-08-08 13:30:04 +04:00
static int wait_async_op ( struct tcrypt_result * tr , int ret )
2010-05-19 08:12:03 +04:00
{
if ( ret = = - EINPROGRESS | | ret = = - EBUSY ) {
2015-01-09 18:25:28 +03:00
wait_for_completion ( & tr - > completion ) ;
2013-11-15 02:32:02 +04:00
reinit_completion ( & tr - > completion ) ;
2015-01-09 18:25:28 +03:00
ret = tr - > err ;
2010-05-19 08:12:03 +04:00
}
return ret ;
}
2016-02-03 13:26:57 +03:00
static int ahash_partial_update ( struct ahash_request * * preq ,
struct crypto_ahash * tfm , struct hash_testvec * template ,
void * hash_buff , int k , int temp , struct scatterlist * sg ,
const char * algo , char * result , struct tcrypt_result * tresult )
{
char * state ;
struct ahash_request * req ;
int statesize , ret = - EINVAL ;
2016-09-28 17:38:37 +03:00
const char guard [ ] = { 0x00 , 0xba , 0xad , 0x00 } ;
2016-02-03 13:26:57 +03:00
req = * preq ;
statesize = crypto_ahash_statesize (
crypto_ahash_reqtfm ( req ) ) ;
2016-09-28 17:38:37 +03:00
state = kmalloc ( statesize + sizeof ( guard ) , GFP_KERNEL ) ;
2016-02-03 13:26:57 +03:00
if ( ! state ) {
pr_err ( " alt: hash: Failed to alloc state for %s \n " , algo ) ;
goto out_nostate ;
}
2016-09-28 17:38:37 +03:00
memcpy ( state + statesize , guard , sizeof ( guard ) ) ;
2016-02-03 13:26:57 +03:00
ret = crypto_ahash_export ( req , state ) ;
2016-09-28 17:38:37 +03:00
WARN_ON ( memcmp ( state + statesize , guard , sizeof ( guard ) ) ) ;
2016-02-03 13:26:57 +03:00
if ( ret ) {
pr_err ( " alt: hash: Failed to export() for %s \n " , algo ) ;
goto out ;
}
ahash_request_free ( req ) ;
req = ahash_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req ) {
pr_err ( " alg: hash: Failed to alloc request for %s \n " , algo ) ;
goto out_noreq ;
}
ahash_request_set_callback ( req ,
CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , tresult ) ;
memcpy ( hash_buff , template - > plaintext + temp ,
template - > tap [ k ] ) ;
sg_init_one ( & sg [ 0 ] , hash_buff , template - > tap [ k ] ) ;
ahash_request_set_crypt ( req , sg , result , template - > tap [ k ] ) ;
ret = crypto_ahash_import ( req , state ) ;
if ( ret ) {
pr_err ( " alg: hash: Failed to import() for %s \n " , algo ) ;
goto out ;
}
ret = wait_async_op ( tresult , crypto_ahash_update ( req ) ) ;
if ( ret )
goto out ;
* preq = req ;
ret = 0 ;
goto out_noreq ;
out :
ahash_request_free ( req ) ;
out_noreq :
kfree ( state ) ;
out_nostate :
return ret ;
}
2013-06-13 18:37:55 +04:00
static int __test_hash ( struct crypto_ahash * tfm , struct hash_testvec * template ,
unsigned int tcount , bool use_digest ,
const int align_offset )
2008-07-31 13:08:25 +04:00
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_ahash_tfm ( tfm ) ) ;
unsigned int i , j , k , temp ;
struct scatterlist sg [ 8 ] ;
2014-07-23 12:59:38 +04:00
char * result ;
char * key ;
2008-07-31 13:08:25 +04:00
struct ahash_request * req ;
struct tcrypt_result tresult ;
void * hash_buff ;
2009-05-06 10:15:47 +04:00
char * xbuf [ XBUFSIZE ] ;
int ret = - ENOMEM ;
2014-07-23 12:59:38 +04:00
result = kmalloc ( MAX_DIGEST_SIZE , GFP_KERNEL ) ;
if ( ! result )
return ret ;
key = kmalloc ( MAX_KEYLEN , GFP_KERNEL ) ;
if ( ! key )
goto out_nobuf ;
2009-05-06 10:15:47 +04:00
if ( testmgr_alloc_buf ( xbuf ) )
goto out_nobuf ;
2008-07-31 13:08:25 +04:00
init_completion ( & tresult . completion ) ;
req = ahash_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req ) {
printk ( KERN_ERR " alg: hash: Failed to allocate request for "
" %s \n " , algo ) ;
goto out_noreq ;
}
ahash_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & tresult ) ;
2009-05-29 10:23:12 +04:00
j = 0 ;
2008-07-31 13:08:25 +04:00
for ( i = 0 ; i < tcount ; i + + ) {
2009-05-29 10:23:12 +04:00
if ( template [ i ] . np )
continue ;
2013-06-13 18:37:55 +04:00
ret = - EINVAL ;
if ( WARN_ON ( align_offset + template [ i ] . psize > PAGE_SIZE ) )
goto out ;
2009-05-29 10:23:12 +04:00
j + + ;
2014-07-23 12:59:38 +04:00
memset ( result , 0 , MAX_DIGEST_SIZE ) ;
2008-07-31 13:08:25 +04:00
hash_buff = xbuf [ 0 ] ;
2013-06-13 18:37:55 +04:00
hash_buff + = align_offset ;
2008-07-31 13:08:25 +04:00
memcpy ( hash_buff , template [ i ] . plaintext , template [ i ] . psize ) ;
sg_init_one ( & sg [ 0 ] , hash_buff , template [ i ] . psize ) ;
if ( template [ i ] . ksize ) {
crypto_ahash_clear_flags ( tfm , ~ 0 ) ;
2014-07-23 12:59:38 +04:00
if ( template [ i ] . ksize > MAX_KEYLEN ) {
pr_err ( " alg: hash: setkey failed on test %d for %s: key size %d > %d \n " ,
j , algo , template [ i ] . ksize , MAX_KEYLEN ) ;
ret = - EINVAL ;
goto out ;
}
memcpy ( key , template [ i ] . key , template [ i ] . ksize ) ;
ret = crypto_ahash_setkey ( tfm , key , template [ i ] . ksize ) ;
2008-07-31 13:08:25 +04:00
if ( ret ) {
printk ( KERN_ERR " alg: hash: setkey failed on "
2009-05-29 10:23:12 +04:00
" test %d for %s: ret=%d \n " , j , algo ,
2008-07-31 13:08:25 +04:00
- ret ) ;
goto out ;
}
}
ahash_request_set_crypt ( req , sg , result , template [ i ] . psize ) ;
2010-05-19 08:12:03 +04:00
if ( use_digest ) {
2014-08-08 13:30:04 +04:00
ret = wait_async_op ( & tresult , crypto_ahash_digest ( req ) ) ;
2010-05-19 08:12:03 +04:00
if ( ret ) {
pr_err ( " alg: hash: digest failed on test %d "
" for %s: ret=%d \n " , j , algo , - ret ) ;
goto out ;
}
} else {
2014-08-08 13:30:04 +04:00
ret = wait_async_op ( & tresult , crypto_ahash_init ( req ) ) ;
2010-05-19 08:12:03 +04:00
if ( ret ) {
pr_err ( " alt: hash: init failed on test %d "
" for %s: ret=%d \n " , j , algo , - ret ) ;
goto out ;
}
2014-08-08 13:30:04 +04:00
ret = wait_async_op ( & tresult , crypto_ahash_update ( req ) ) ;
2010-05-19 08:12:03 +04:00
if ( ret ) {
pr_err ( " alt: hash: update failed on test %d "
" for %s: ret=%d \n " , j , algo , - ret ) ;
goto out ;
}
2014-08-08 13:30:04 +04:00
ret = wait_async_op ( & tresult , crypto_ahash_final ( req ) ) ;
2010-05-19 08:12:03 +04:00
if ( ret ) {
pr_err ( " alt: hash: final failed on test %d "
" for %s: ret=%d \n " , j , algo , - ret ) ;
goto out ;
2008-07-31 13:08:25 +04:00
}
}
if ( memcmp ( result , template [ i ] . digest ,
crypto_ahash_digestsize ( tfm ) ) ) {
printk ( KERN_ERR " alg: hash: Test %d failed for %s \n " ,
2009-05-29 10:23:12 +04:00
j , algo ) ;
2008-07-31 13:08:25 +04:00
hexdump ( result , crypto_ahash_digestsize ( tfm ) ) ;
ret = - EINVAL ;
goto out ;
}
}
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
2013-06-13 18:37:55 +04:00
/* alignment tests are only done with continuous buffers */
if ( align_offset ! = 0 )
break ;
2014-08-08 15:27:50 +04:00
if ( ! template [ i ] . np )
continue ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:50 +04:00
j + + ;
memset ( result , 0 , MAX_DIGEST_SIZE ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:50 +04:00
temp = 0 ;
sg_init_table ( sg , template [ i ] . np ) ;
ret = - EINVAL ;
for ( k = 0 ; k < template [ i ] . np ; k + + ) {
if ( WARN_ON ( offset_in_page ( IDX [ k ] ) +
template [ i ] . tap [ k ] > PAGE_SIZE ) )
goto out ;
sg_set_buf ( & sg [ k ] ,
memcpy ( xbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ,
template [ i ] . plaintext + temp ,
template [ i ] . tap [ k ] ) ,
template [ i ] . tap [ k ] ) ;
temp + = template [ i ] . tap [ k ] ;
}
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:50 +04:00
if ( template [ i ] . ksize ) {
if ( template [ i ] . ksize > MAX_KEYLEN ) {
pr_err ( " alg: hash: setkey failed on test %d for %s: key size %d > %d \n " ,
j , algo , template [ i ] . ksize , MAX_KEYLEN ) ;
ret = - EINVAL ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2014-08-08 15:27:50 +04:00
crypto_ahash_clear_flags ( tfm , ~ 0 ) ;
memcpy ( key , template [ i ] . key , template [ i ] . ksize ) ;
ret = crypto_ahash_setkey ( tfm , key , template [ i ] . ksize ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:50 +04:00
if ( ret ) {
printk ( KERN_ERR " alg: hash: setkey "
" failed on chunking test %d "
" for %s: ret=%d \n " , j , algo , - ret ) ;
2008-07-31 13:08:25 +04:00
goto out ;
}
}
2014-08-08 15:27:50 +04:00
ahash_request_set_crypt ( req , sg , result , template [ i ] . psize ) ;
ret = crypto_ahash_digest ( req ) ;
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
2015-01-09 18:25:28 +03:00
wait_for_completion ( & tresult . completion ) ;
reinit_completion ( & tresult . completion ) ;
ret = tresult . err ;
if ( ! ret )
2014-08-08 15:27:50 +04:00
break ;
/* fall through */
default :
printk ( KERN_ERR " alg: hash: digest failed "
" on chunking test %d for %s: "
" ret=%d \n " , j , algo , - ret ) ;
goto out ;
}
if ( memcmp ( result , template [ i ] . digest ,
crypto_ahash_digestsize ( tfm ) ) ) {
printk ( KERN_ERR " alg: hash: Chunking test %d "
" failed for %s \n " , j , algo ) ;
hexdump ( result , crypto_ahash_digestsize ( tfm ) ) ;
ret = - EINVAL ;
2016-02-03 13:26:57 +03:00
goto out ;
}
}
/* partial update exercise */
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
/* alignment tests are only done with continuous buffers */
if ( align_offset ! = 0 )
break ;
if ( template [ i ] . np < 2 )
continue ;
j + + ;
memset ( result , 0 , MAX_DIGEST_SIZE ) ;
ret = - EINVAL ;
hash_buff = xbuf [ 0 ] ;
memcpy ( hash_buff , template [ i ] . plaintext ,
template [ i ] . tap [ 0 ] ) ;
sg_init_one ( & sg [ 0 ] , hash_buff , template [ i ] . tap [ 0 ] ) ;
if ( template [ i ] . ksize ) {
crypto_ahash_clear_flags ( tfm , ~ 0 ) ;
if ( template [ i ] . ksize > MAX_KEYLEN ) {
pr_err ( " alg: hash: setkey failed on test %d for %s: key size %d > %d \n " ,
j , algo , template [ i ] . ksize , MAX_KEYLEN ) ;
ret = - EINVAL ;
goto out ;
}
memcpy ( key , template [ i ] . key , template [ i ] . ksize ) ;
ret = crypto_ahash_setkey ( tfm , key , template [ i ] . ksize ) ;
if ( ret ) {
pr_err ( " alg: hash: setkey failed on test %d for %s: ret=%d \n " ,
j , algo , - ret ) ;
goto out ;
}
}
ahash_request_set_crypt ( req , sg , result , template [ i ] . tap [ 0 ] ) ;
ret = wait_async_op ( & tresult , crypto_ahash_init ( req ) ) ;
if ( ret ) {
pr_err ( " alt: hash: init failed on test %d for %s: ret=%d \n " ,
j , algo , - ret ) ;
goto out ;
}
ret = wait_async_op ( & tresult , crypto_ahash_update ( req ) ) ;
if ( ret ) {
pr_err ( " alt: hash: update failed on test %d for %s: ret=%d \n " ,
j , algo , - ret ) ;
goto out ;
}
temp = template [ i ] . tap [ 0 ] ;
for ( k = 1 ; k < template [ i ] . np ; k + + ) {
ret = ahash_partial_update ( & req , tfm , & template [ i ] ,
hash_buff , k , temp , & sg [ 0 ] , algo , result ,
& tresult ) ;
if ( ret ) {
pr_err ( " hash: partial update failed on test %d for %s: ret=%d \n " ,
j , algo , - ret ) ;
goto out_noreq ;
}
temp + = template [ i ] . tap [ k ] ;
}
ret = wait_async_op ( & tresult , crypto_ahash_final ( req ) ) ;
if ( ret ) {
pr_err ( " alt: hash: final failed on test %d for %s: ret=%d \n " ,
j , algo , - ret ) ;
goto out ;
}
if ( memcmp ( result , template [ i ] . digest ,
crypto_ahash_digestsize ( tfm ) ) ) {
pr_err ( " alg: hash: Partial Test %d failed for %s \n " ,
j , algo ) ;
hexdump ( result , crypto_ahash_digestsize ( tfm ) ) ;
ret = - EINVAL ;
2014-08-08 15:27:50 +04:00
goto out ;
}
2008-07-31 13:08:25 +04:00
}
ret = 0 ;
out :
ahash_request_free ( req ) ;
out_noreq :
2009-05-06 10:15:47 +04:00
testmgr_free_buf ( xbuf ) ;
out_nobuf :
2014-07-23 12:59:38 +04:00
kfree ( key ) ;
kfree ( result ) ;
2008-07-31 13:08:25 +04:00
return ret ;
}
2013-06-13 18:37:55 +04:00
static int test_hash ( struct crypto_ahash * tfm , struct hash_testvec * template ,
unsigned int tcount , bool use_digest )
{
unsigned int alignmask ;
int ret ;
ret = __test_hash ( tfm , template , tcount , use_digest , 0 ) ;
if ( ret )
return ret ;
/* test unaligned buffers, check with one byte offset */
ret = __test_hash ( tfm , template , tcount , use_digest , 1 ) ;
if ( ret )
return ret ;
alignmask = crypto_tfm_alg_alignmask ( & tfm - > base ) ;
if ( alignmask ) {
/* Check if alignment mask for tfm is correctly set. */
ret = __test_hash ( tfm , template , tcount , use_digest ,
alignmask + 1 ) ;
if ( ret )
return ret ;
}
return 0 ;
}
2012-09-21 11:26:52 +04:00
static int __test_aead ( struct crypto_aead * tfm , int enc ,
struct aead_testvec * template , unsigned int tcount ,
2013-06-13 18:37:50 +04:00
const bool diff_dst , const int align_offset )
2008-07-31 13:08:25 +04:00
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_aead_tfm ( tfm ) ) ;
unsigned int i , j , k , n , temp ;
2009-05-06 10:15:47 +04:00
int ret = - ENOMEM ;
2008-07-31 13:08:25 +04:00
char * q ;
char * key ;
struct aead_request * req ;
2012-09-21 11:26:52 +04:00
struct scatterlist * sg ;
struct scatterlist * sgout ;
const char * e , * d ;
2008-07-31 13:08:25 +04:00
struct tcrypt_result result ;
2015-01-28 12:03:05 +03:00
unsigned int authsize , iv_len ;
2008-07-31 13:08:25 +04:00
void * input ;
2012-09-21 11:26:52 +04:00
void * output ;
2008-07-31 13:08:25 +04:00
void * assoc ;
2014-05-19 20:51:33 +04:00
char * iv ;
2009-05-06 10:15:47 +04:00
char * xbuf [ XBUFSIZE ] ;
2012-09-21 11:26:52 +04:00
char * xoutbuf [ XBUFSIZE ] ;
2009-05-06 10:15:47 +04:00
char * axbuf [ XBUFSIZE ] ;
2014-05-19 20:51:33 +04:00
iv = kzalloc ( MAX_IVLEN , GFP_KERNEL ) ;
if ( ! iv )
return ret ;
2014-07-23 12:59:38 +04:00
key = kmalloc ( MAX_KEYLEN , GFP_KERNEL ) ;
if ( ! key )
goto out_noxbuf ;
2009-05-06 10:15:47 +04:00
if ( testmgr_alloc_buf ( xbuf ) )
goto out_noxbuf ;
if ( testmgr_alloc_buf ( axbuf ) )
goto out_noaxbuf ;
2012-09-21 11:26:52 +04:00
if ( diff_dst & & testmgr_alloc_buf ( xoutbuf ) )
goto out_nooutbuf ;
/* avoid "the frame size is larger than 1024 bytes" compiler warning */
2015-05-27 11:03:43 +03:00
sg = kmalloc ( sizeof ( * sg ) * 8 * ( diff_dst ? 4 : 2 ) , GFP_KERNEL ) ;
2012-09-21 11:26:52 +04:00
if ( ! sg )
goto out_nosg ;
2015-05-27 11:03:43 +03:00
sgout = & sg [ 16 ] ;
2012-09-21 11:26:52 +04:00
if ( diff_dst )
d = " -ddst " ;
else
d = " " ;
2008-07-31 13:08:25 +04:00
if ( enc = = ENCRYPT )
e = " encryption " ;
else
e = " decryption " ;
init_completion ( & result . completion ) ;
req = aead_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req ) {
2012-09-21 11:26:52 +04:00
pr_err ( " alg: aead%s: Failed to allocate request for %s \n " ,
d , algo ) ;
2008-07-31 13:08:25 +04:00
goto out ;
}
aead_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
2016-02-03 15:58:12 +03:00
iv_len = crypto_aead_ivsize ( tfm ) ;
2008-07-31 13:08:25 +04:00
for ( i = 0 , j = 0 ; i < tcount ; i + + ) {
2014-07-28 14:11:23 +04:00
if ( template [ i ] . np )
continue ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
j + + ;
2009-05-29 10:05:42 +04:00
2014-07-28 14:11:23 +04:00
/* some templates have no input data but they will
* touch input
*/
input = xbuf [ 0 ] ;
input + = align_offset ;
assoc = axbuf [ 0 ] ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = - EINVAL ;
if ( WARN_ON ( align_offset + template [ i ] . ilen >
PAGE_SIZE | | template [ i ] . alen > PAGE_SIZE ) )
goto out ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
memcpy ( input , template [ i ] . input , template [ i ] . ilen ) ;
memcpy ( assoc , template [ i ] . assoc , template [ i ] . alen ) ;
if ( template [ i ] . iv )
2015-01-28 12:03:05 +03:00
memcpy ( iv , template [ i ] . iv , iv_len ) ;
2014-07-28 14:11:23 +04:00
else
2015-01-28 12:03:05 +03:00
memset ( iv , 0 , iv_len ) ;
2014-07-28 14:11:23 +04:00
crypto_aead_clear_flags ( tfm , ~ 0 ) ;
if ( template [ i ] . wk )
crypto_aead_set_flags ( tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
if ( template [ i ] . klen > MAX_KEYLEN ) {
pr_err ( " alg: aead%s: setkey failed on test %d for %s: key size %d > %d \n " ,
d , j , algo , template [ i ] . klen ,
MAX_KEYLEN ) ;
ret = - EINVAL ;
goto out ;
}
memcpy ( key , template [ i ] . key , template [ i ] . klen ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = crypto_aead_setkey ( tfm , key , template [ i ] . klen ) ;
2016-07-29 11:32:09 +03:00
if ( template [ i ] . fail = = ! ret ) {
2014-07-28 14:11:23 +04:00
pr_err ( " alg: aead%s: setkey failed on test %d for %s: flags=%x \n " ,
d , j , algo , crypto_aead_get_flags ( tfm ) ) ;
goto out ;
} else if ( ret )
continue ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
authsize = abs ( template [ i ] . rlen - template [ i ] . ilen ) ;
ret = crypto_aead_setauthsize ( tfm , authsize ) ;
if ( ret ) {
pr_err ( " alg: aead%s: Failed to set authsize to %u on test %d for %s \n " ,
d , authsize , j , algo ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2015-05-27 11:03:43 +03:00
k = ! ! template [ i ] . alen ;
sg_init_table ( sg , k + 1 ) ;
sg_set_buf ( & sg [ 0 ] , assoc , template [ i ] . alen ) ;
sg_set_buf ( & sg [ k ] , input ,
template [ i ] . ilen + ( enc ? authsize : 0 ) ) ;
output = input ;
2014-07-28 14:11:23 +04:00
if ( diff_dst ) {
2015-05-27 11:03:43 +03:00
sg_init_table ( sgout , k + 1 ) ;
sg_set_buf ( & sgout [ 0 ] , assoc , template [ i ] . alen ) ;
2014-07-28 14:11:23 +04:00
output = xoutbuf [ 0 ] ;
output + = align_offset ;
2015-05-27 11:03:43 +03:00
sg_set_buf ( & sgout [ k ] , output ,
template [ i ] . rlen + ( enc ? 0 : authsize ) ) ;
2014-07-28 14:11:23 +04:00
}
2012-09-21 11:26:52 +04:00
2014-07-28 14:11:23 +04:00
aead_request_set_crypt ( req , sg , ( diff_dst ) ? sgout : sg ,
template [ i ] . ilen , iv ) ;
2008-07-31 13:08:25 +04:00
2015-05-27 11:03:43 +03:00
aead_request_set_ad ( req , template [ i ] . alen ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = enc ? crypto_aead_encrypt ( req ) : crypto_aead_decrypt ( req ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
switch ( ret ) {
case 0 :
if ( template [ i ] . novrfy ) {
/* verification was supposed to fail */
pr_err ( " alg: aead%s: %s failed on test %d for %s: ret was 0, expected -EBADMSG \n " ,
d , e , j , algo ) ;
/* so really, we got a bad message */
ret = - EBADMSG ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2014-07-28 14:11:23 +04:00
break ;
case - EINPROGRESS :
case - EBUSY :
2015-01-09 18:25:28 +03:00
wait_for_completion ( & result . completion ) ;
reinit_completion ( & result . completion ) ;
ret = result . err ;
if ( ! ret )
2014-07-28 14:11:23 +04:00
break ;
case - EBADMSG :
if ( template [ i ] . novrfy )
/* verification failure was expected */
continue ;
/* fall through */
default :
pr_err ( " alg: aead%s: %s failed on test %d for %s: ret=%d \n " ,
d , e , j , algo , - ret ) ;
goto out ;
}
q = output ;
if ( memcmp ( q , template [ i ] . result , template [ i ] . rlen ) ) {
pr_err ( " alg: aead%s: Test %d failed on %s for %s \n " ,
d , j , e , algo ) ;
hexdump ( q , template [ i ] . rlen ) ;
ret = - EINVAL ;
goto out ;
2008-07-31 13:08:25 +04:00
}
}
for ( i = 0 , j = 0 ; i < tcount ; i + + ) {
2013-06-13 18:37:50 +04:00
/* alignment tests are only done with continuous buffers */
if ( align_offset ! = 0 )
break ;
2014-07-28 14:11:23 +04:00
if ( ! template [ i ] . np )
continue ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
j + + ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
if ( template [ i ] . iv )
2016-02-03 15:58:12 +03:00
memcpy ( iv , template [ i ] . iv , iv_len ) ;
2014-07-28 14:11:23 +04:00
else
memset ( iv , 0 , MAX_IVLEN ) ;
crypto_aead_clear_flags ( tfm , ~ 0 ) ;
if ( template [ i ] . wk )
crypto_aead_set_flags ( tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
if ( template [ i ] . klen > MAX_KEYLEN ) {
pr_err ( " alg: aead%s: setkey failed on test %d for %s: key size %d > %d \n " ,
d , j , algo , template [ i ] . klen , MAX_KEYLEN ) ;
ret = - EINVAL ;
goto out ;
}
memcpy ( key , template [ i ] . key , template [ i ] . klen ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = crypto_aead_setkey ( tfm , key , template [ i ] . klen ) ;
2016-07-29 11:32:09 +03:00
if ( template [ i ] . fail = = ! ret ) {
2014-07-28 14:11:23 +04:00
pr_err ( " alg: aead%s: setkey failed on chunk test %d for %s: flags=%x \n " ,
d , j , algo , crypto_aead_get_flags ( tfm ) ) ;
goto out ;
} else if ( ret )
continue ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
authsize = abs ( template [ i ] . rlen - template [ i ] . ilen ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = - EINVAL ;
2015-05-27 11:03:43 +03:00
sg_init_table ( sg , template [ i ] . anp + template [ i ] . np ) ;
2014-07-28 14:11:23 +04:00
if ( diff_dst )
2015-05-27 11:03:43 +03:00
sg_init_table ( sgout , template [ i ] . anp + template [ i ] . np ) ;
ret = - EINVAL ;
for ( k = 0 , temp = 0 ; k < template [ i ] . anp ; k + + ) {
if ( WARN_ON ( offset_in_page ( IDX [ k ] ) +
template [ i ] . atap [ k ] > PAGE_SIZE ) )
goto out ;
sg_set_buf ( & sg [ k ] ,
memcpy ( axbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ,
template [ i ] . assoc + temp ,
template [ i ] . atap [ k ] ) ,
template [ i ] . atap [ k ] ) ;
if ( diff_dst )
sg_set_buf ( & sgout [ k ] ,
axbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ,
template [ i ] . atap [ k ] ) ;
temp + = template [ i ] . atap [ k ] ;
}
2014-07-28 14:11:23 +04:00
for ( k = 0 , temp = 0 ; k < template [ i ] . np ; k + + ) {
if ( WARN_ON ( offset_in_page ( IDX [ k ] ) +
template [ i ] . tap [ k ] > PAGE_SIZE ) )
goto out ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
q = xbuf [ IDX [ k ] > > PAGE_SHIFT ] + offset_in_page ( IDX [ k ] ) ;
memcpy ( q , template [ i ] . input + temp , template [ i ] . tap [ k ] ) ;
2015-05-27 11:03:43 +03:00
sg_set_buf ( & sg [ template [ i ] . anp + k ] ,
q , template [ i ] . tap [ k ] ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
if ( diff_dst ) {
q = xoutbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ;
2012-09-21 11:26:52 +04:00
2014-07-28 14:11:23 +04:00
memset ( q , 0 , template [ i ] . tap [ k ] ) ;
2012-09-21 11:26:52 +04:00
2015-05-27 11:03:43 +03:00
sg_set_buf ( & sgout [ template [ i ] . anp + k ] ,
q , template [ i ] . tap [ k ] ) ;
2014-07-28 14:11:23 +04:00
}
2012-09-21 11:26:52 +04:00
2014-07-28 14:11:23 +04:00
n = template [ i ] . tap [ k ] ;
if ( k = = template [ i ] . np - 1 & & enc )
n + = authsize ;
if ( offset_in_page ( q ) + n < PAGE_SIZE )
q [ n ] = 0 ;
2012-09-21 11:26:52 +04:00
2014-07-28 14:11:23 +04:00
temp + = template [ i ] . tap [ k ] ;
}
2013-11-28 17:11:18 +04:00
2014-07-28 14:11:23 +04:00
ret = crypto_aead_setauthsize ( tfm , authsize ) ;
if ( ret ) {
pr_err ( " alg: aead%s: Failed to set authsize to %u on chunk test %d for %s \n " ,
d , authsize , j , algo ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
if ( enc ) {
2015-05-27 11:03:43 +03:00
if ( WARN_ON ( sg [ template [ i ] . anp + k - 1 ] . offset +
sg [ template [ i ] . anp + k - 1 ] . length +
authsize > PAGE_SIZE ) ) {
2014-07-28 14:11:23 +04:00
ret = - EINVAL ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2014-07-28 14:11:23 +04:00
if ( diff_dst )
2015-05-27 11:03:43 +03:00
sgout [ template [ i ] . anp + k - 1 ] . length + =
authsize ;
sg [ template [ i ] . anp + k - 1 ] . length + = authsize ;
2014-07-28 14:11:23 +04:00
}
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
aead_request_set_crypt ( req , sg , ( diff_dst ) ? sgout : sg ,
template [ i ] . ilen ,
iv ) ;
2008-07-31 13:08:25 +04:00
2015-05-27 11:03:43 +03:00
aead_request_set_ad ( req , template [ i ] . alen ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = enc ? crypto_aead_encrypt ( req ) : crypto_aead_decrypt ( req ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
switch ( ret ) {
case 0 :
if ( template [ i ] . novrfy ) {
/* verification was supposed to fail */
pr_err ( " alg: aead%s: %s failed on chunk test %d for %s: ret was 0, expected -EBADMSG \n " ,
d , e , j , algo ) ;
/* so really, we got a bad message */
ret = - EBADMSG ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2014-07-28 14:11:23 +04:00
break ;
case - EINPROGRESS :
case - EBUSY :
2015-01-09 18:25:28 +03:00
wait_for_completion ( & result . completion ) ;
reinit_completion ( & result . completion ) ;
ret = result . err ;
if ( ! ret )
2014-07-28 14:11:23 +04:00
break ;
case - EBADMSG :
if ( template [ i ] . novrfy )
/* verification failure was expected */
continue ;
/* fall through */
default :
pr_err ( " alg: aead%s: %s failed on chunk test %d for %s: ret=%d \n " ,
d , e , j , algo , - ret ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
ret = - EINVAL ;
for ( k = 0 , temp = 0 ; k < template [ i ] . np ; k + + ) {
if ( diff_dst )
q = xoutbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ;
else
q = xbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
n = template [ i ] . tap [ k ] ;
if ( k = = template [ i ] . np - 1 )
n + = enc ? authsize : - authsize ;
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
if ( memcmp ( q , template [ i ] . result + temp , n ) ) {
pr_err ( " alg: aead%s: Chunk test %d failed on %s at page %u for %s \n " ,
d , j , e , k , algo ) ;
hexdump ( q , n ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2014-07-28 14:11:23 +04:00
q + = n ;
if ( k = = template [ i ] . np - 1 & & ! enc ) {
if ( ! diff_dst & &
memcmp ( q , template [ i ] . input +
temp + n , authsize ) )
n = authsize ;
else
n = 0 ;
} else {
for ( n = 0 ; offset_in_page ( q + n ) & & q [ n ] ; n + + )
;
}
if ( n ) {
pr_err ( " alg: aead%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes: \n " ,
d , j , e , k , algo , n ) ;
hexdump ( q , n ) ;
goto out ;
2008-07-31 13:08:25 +04:00
}
2014-07-28 14:11:23 +04:00
temp + = template [ i ] . tap [ k ] ;
2008-07-31 13:08:25 +04:00
}
}
ret = 0 ;
out :
aead_request_free ( req ) ;
2012-09-21 11:26:52 +04:00
kfree ( sg ) ;
out_nosg :
if ( diff_dst )
testmgr_free_buf ( xoutbuf ) ;
out_nooutbuf :
2009-05-06 10:15:47 +04:00
testmgr_free_buf ( axbuf ) ;
out_noaxbuf :
testmgr_free_buf ( xbuf ) ;
out_noxbuf :
2014-07-23 12:59:38 +04:00
kfree ( key ) ;
2014-05-19 20:51:33 +04:00
kfree ( iv ) ;
2008-07-31 13:08:25 +04:00
return ret ;
}
2012-09-21 11:26:52 +04:00
static int test_aead ( struct crypto_aead * tfm , int enc ,
struct aead_testvec * template , unsigned int tcount )
{
2013-06-13 18:37:50 +04:00
unsigned int alignmask ;
2012-09-21 11:26:52 +04:00
int ret ;
/* test 'dst == src' case */
2013-06-13 18:37:50 +04:00
ret = __test_aead ( tfm , enc , template , tcount , false , 0 ) ;
2012-09-21 11:26:52 +04:00
if ( ret )
return ret ;
/* test 'dst != src' case */
2013-06-13 18:37:50 +04:00
ret = __test_aead ( tfm , enc , template , tcount , true , 0 ) ;
if ( ret )
return ret ;
/* test unaligned buffers, check with one byte offset */
ret = __test_aead ( tfm , enc , template , tcount , true , 1 ) ;
if ( ret )
return ret ;
alignmask = crypto_tfm_alg_alignmask ( & tfm - > base ) ;
if ( alignmask ) {
/* Check if alignment mask for tfm is correctly set. */
ret = __test_aead ( tfm , enc , template , tcount , true ,
alignmask + 1 ) ;
if ( ret )
return ret ;
}
return 0 ;
2012-09-21 11:26:52 +04:00
}
2008-08-17 11:01:56 +04:00
static int test_cipher ( struct crypto_cipher * tfm , int enc ,
2008-07-31 13:08:25 +04:00
struct cipher_testvec * template , unsigned int tcount )
2008-08-17 11:01:56 +04:00
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_cipher_tfm ( tfm ) ) ;
unsigned int i , j , k ;
char * q ;
const char * e ;
void * data ;
2009-05-06 10:15:47 +04:00
char * xbuf [ XBUFSIZE ] ;
int ret = - ENOMEM ;
if ( testmgr_alloc_buf ( xbuf ) )
goto out_nobuf ;
2008-08-17 11:01:56 +04:00
if ( enc = = ENCRYPT )
e = " encryption " ;
else
e = " decryption " ;
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
if ( template [ i ] . np )
continue ;
2016-08-25 16:15:01 +03:00
if ( fips_enabled & & template [ i ] . fips_skip )
continue ;
2008-08-17 11:01:56 +04:00
j + + ;
2009-05-29 10:05:42 +04:00
ret = - EINVAL ;
if ( WARN_ON ( template [ i ] . ilen > PAGE_SIZE ) )
goto out ;
2008-08-17 11:01:56 +04:00
data = xbuf [ 0 ] ;
memcpy ( data , template [ i ] . input , template [ i ] . ilen ) ;
crypto_cipher_clear_flags ( tfm , ~ 0 ) ;
if ( template [ i ] . wk )
crypto_cipher_set_flags ( tfm , CRYPTO_TFM_REQ_WEAK_KEY ) ;
ret = crypto_cipher_setkey ( tfm , template [ i ] . key ,
template [ i ] . klen ) ;
2016-07-29 11:32:09 +03:00
if ( template [ i ] . fail = = ! ret ) {
2008-08-17 11:01:56 +04:00
printk ( KERN_ERR " alg: cipher: setkey failed "
" on test %d for %s: flags=%x \n " , j ,
algo , crypto_cipher_get_flags ( tfm ) ) ;
goto out ;
} else if ( ret )
continue ;
for ( k = 0 ; k < template [ i ] . ilen ;
k + = crypto_cipher_blocksize ( tfm ) ) {
if ( enc )
crypto_cipher_encrypt_one ( tfm , data + k ,
data + k ) ;
else
crypto_cipher_decrypt_one ( tfm , data + k ,
data + k ) ;
}
q = data ;
if ( memcmp ( q , template [ i ] . result , template [ i ] . rlen ) ) {
printk ( KERN_ERR " alg: cipher: Test %d failed "
" on %s for %s \n " , j , e , algo ) ;
hexdump ( q , template [ i ] . rlen ) ;
ret = - EINVAL ;
goto out ;
}
}
ret = 0 ;
out :
2009-05-06 10:15:47 +04:00
testmgr_free_buf ( xbuf ) ;
out_nobuf :
2008-08-17 11:01:56 +04:00
return ret ;
}
2015-08-20 10:21:46 +03:00
static int __test_skcipher ( struct crypto_skcipher * tfm , int enc ,
2012-09-21 11:26:47 +04:00
struct cipher_testvec * template , unsigned int tcount ,
2013-06-13 18:37:45 +04:00
const bool diff_dst , const int align_offset )
2008-07-31 13:08:25 +04:00
{
const char * algo =
2015-08-20 10:21:46 +03:00
crypto_tfm_alg_driver_name ( crypto_skcipher_tfm ( tfm ) ) ;
2008-07-31 13:08:25 +04:00
unsigned int i , j , k , n , temp ;
char * q ;
2015-08-20 10:21:46 +03:00
struct skcipher_request * req ;
2008-07-31 13:08:25 +04:00
struct scatterlist sg [ 8 ] ;
2012-09-21 11:26:47 +04:00
struct scatterlist sgout [ 8 ] ;
const char * e , * d ;
2008-07-31 13:08:25 +04:00
struct tcrypt_result result ;
void * data ;
char iv [ MAX_IVLEN ] ;
2009-05-06 10:15:47 +04:00
char * xbuf [ XBUFSIZE ] ;
2012-09-21 11:26:47 +04:00
char * xoutbuf [ XBUFSIZE ] ;
2009-05-06 10:15:47 +04:00
int ret = - ENOMEM ;
2015-09-10 13:11:55 +03:00
unsigned int ivsize = crypto_skcipher_ivsize ( tfm ) ;
2009-05-06 10:15:47 +04:00
if ( testmgr_alloc_buf ( xbuf ) )
goto out_nobuf ;
2008-07-31 13:08:25 +04:00
2012-09-21 11:26:47 +04:00
if ( diff_dst & & testmgr_alloc_buf ( xoutbuf ) )
goto out_nooutbuf ;
if ( diff_dst )
d = " -ddst " ;
else
d = " " ;
2008-07-31 13:08:25 +04:00
if ( enc = = ENCRYPT )
e = " encryption " ;
else
e = " decryption " ;
init_completion ( & result . completion ) ;
2015-08-20 10:21:46 +03:00
req = skcipher_request_alloc ( tfm , GFP_KERNEL ) ;
2008-07-31 13:08:25 +04:00
if ( ! req ) {
2012-09-21 11:26:47 +04:00
pr_err ( " alg: skcipher%s: Failed to allocate request for %s \n " ,
d , algo ) ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2015-08-20 10:21:46 +03:00
skcipher_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
2008-07-31 13:08:25 +04:00
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
2014-08-08 15:27:52 +04:00
if ( template [ i ] . np & & ! template [ i ] . also_non_np )
continue ;
2016-08-25 16:15:01 +03:00
if ( fips_enabled & & template [ i ] . fips_skip )
continue ;
2008-07-31 13:08:25 +04:00
if ( template [ i ] . iv )
2015-09-10 13:11:55 +03:00
memcpy ( iv , template [ i ] . iv , ivsize ) ;
2008-07-31 13:08:25 +04:00
else
memset ( iv , 0 , MAX_IVLEN ) ;
2014-08-08 15:27:51 +04:00
j + + ;
ret = - EINVAL ;
if ( WARN_ON ( align_offset + template [ i ] . ilen > PAGE_SIZE ) )
goto out ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
data = xbuf [ 0 ] ;
data + = align_offset ;
memcpy ( data , template [ i ] . input , template [ i ] . ilen ) ;
2015-08-20 10:21:46 +03:00
crypto_skcipher_clear_flags ( tfm , ~ 0 ) ;
2014-08-08 15:27:51 +04:00
if ( template [ i ] . wk )
2015-08-20 10:21:46 +03:00
crypto_skcipher_set_flags ( tfm ,
CRYPTO_TFM_REQ_WEAK_KEY ) ;
2008-07-31 13:08:25 +04:00
2015-08-20 10:21:46 +03:00
ret = crypto_skcipher_setkey ( tfm , template [ i ] . key ,
template [ i ] . klen ) ;
2016-07-29 11:32:09 +03:00
if ( template [ i ] . fail = = ! ret ) {
2014-08-08 15:27:51 +04:00
pr_err ( " alg: skcipher%s: setkey failed on test %d for %s: flags=%x \n " ,
2015-08-20 10:21:46 +03:00
d , j , algo , crypto_skcipher_get_flags ( tfm ) ) ;
2014-08-08 15:27:51 +04:00
goto out ;
} else if ( ret )
continue ;
sg_init_one ( & sg [ 0 ] , data , template [ i ] . ilen ) ;
if ( diff_dst ) {
data = xoutbuf [ 0 ] ;
data + = align_offset ;
sg_init_one ( & sgout [ 0 ] , data , template [ i ] . ilen ) ;
}
2008-07-31 13:08:25 +04:00
2015-08-20 10:21:46 +03:00
skcipher_request_set_crypt ( req , sg , ( diff_dst ) ? sgout : sg ,
template [ i ] . ilen , iv ) ;
ret = enc ? crypto_skcipher_encrypt ( req ) :
crypto_skcipher_decrypt ( req ) ;
2014-08-08 15:27:51 +04:00
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
2015-01-09 18:25:28 +03:00
wait_for_completion ( & result . completion ) ;
reinit_completion ( & result . completion ) ;
ret = result . err ;
if ( ! ret )
2008-07-31 13:08:25 +04:00
break ;
2014-08-08 15:27:51 +04:00
/* fall through */
default :
pr_err ( " alg: skcipher%s: %s failed on test %d for %s: ret=%d \n " ,
d , e , j , algo , - ret ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
q = data ;
if ( memcmp ( q , template [ i ] . result , template [ i ] . rlen ) ) {
2015-06-16 12:46:46 +03:00
pr_err ( " alg: skcipher%s: Test %d failed (invalid result) on %s for %s \n " ,
2014-08-08 15:27:51 +04:00
d , j , e , algo ) ;
hexdump ( q , template [ i ] . rlen ) ;
ret = - EINVAL ;
goto out ;
2008-07-31 13:08:25 +04:00
}
2015-06-16 12:46:46 +03:00
if ( template [ i ] . iv_out & &
memcmp ( iv , template [ i ] . iv_out ,
crypto_skcipher_ivsize ( tfm ) ) ) {
pr_err ( " alg: skcipher%s: Test %d failed (invalid output IV) on %s for %s \n " ,
d , j , e , algo ) ;
hexdump ( iv , crypto_skcipher_ivsize ( tfm ) ) ;
ret = - EINVAL ;
goto out ;
}
2008-07-31 13:08:25 +04:00
}
j = 0 ;
for ( i = 0 ; i < tcount ; i + + ) {
2013-06-13 18:37:45 +04:00
/* alignment tests are only done with continuous buffers */
if ( align_offset ! = 0 )
break ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:52 +04:00
if ( ! template [ i ] . np )
continue ;
2016-08-25 16:15:01 +03:00
if ( fips_enabled & & template [ i ] . fips_skip )
continue ;
2008-07-31 13:08:25 +04:00
if ( template [ i ] . iv )
2015-09-10 13:11:55 +03:00
memcpy ( iv , template [ i ] . iv , ivsize ) ;
2008-07-31 13:08:25 +04:00
else
memset ( iv , 0 , MAX_IVLEN ) ;
2014-08-08 15:27:51 +04:00
j + + ;
2015-08-20 10:21:46 +03:00
crypto_skcipher_clear_flags ( tfm , ~ 0 ) ;
2014-08-08 15:27:51 +04:00
if ( template [ i ] . wk )
2015-08-20 10:21:46 +03:00
crypto_skcipher_set_flags ( tfm ,
CRYPTO_TFM_REQ_WEAK_KEY ) ;
2008-07-31 13:08:25 +04:00
2015-08-20 10:21:46 +03:00
ret = crypto_skcipher_setkey ( tfm , template [ i ] . key ,
template [ i ] . klen ) ;
2016-07-29 11:32:09 +03:00
if ( template [ i ] . fail = = ! ret ) {
2014-08-08 15:27:51 +04:00
pr_err ( " alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x \n " ,
2015-08-20 10:21:46 +03:00
d , j , algo , crypto_skcipher_get_flags ( tfm ) ) ;
2014-08-08 15:27:51 +04:00
goto out ;
} else if ( ret )
continue ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
temp = 0 ;
ret = - EINVAL ;
sg_init_table ( sg , template [ i ] . np ) ;
if ( diff_dst )
sg_init_table ( sgout , template [ i ] . np ) ;
for ( k = 0 ; k < template [ i ] . np ; k + + ) {
if ( WARN_ON ( offset_in_page ( IDX [ k ] ) +
template [ i ] . tap [ k ] > PAGE_SIZE ) )
2008-07-31 13:08:25 +04:00
goto out ;
2014-08-08 15:27:51 +04:00
q = xbuf [ IDX [ k ] > > PAGE_SHIFT ] + offset_in_page ( IDX [ k ] ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
memcpy ( q , template [ i ] . input + temp , template [ i ] . tap [ k ] ) ;
if ( offset_in_page ( q ) + template [ i ] . tap [ k ] < PAGE_SIZE )
q [ template [ i ] . tap [ k ] ] = 0 ;
sg_set_buf ( & sg [ k ] , q , template [ i ] . tap [ k ] ) ;
if ( diff_dst ) {
q = xoutbuf [ IDX [ k ] > > PAGE_SHIFT ] +
2008-07-31 13:08:25 +04:00
offset_in_page ( IDX [ k ] ) ;
2014-08-08 15:27:51 +04:00
sg_set_buf ( & sgout [ k ] , q , template [ i ] . tap [ k ] ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
memset ( q , 0 , template [ i ] . tap [ k ] ) ;
if ( offset_in_page ( q ) +
template [ i ] . tap [ k ] < PAGE_SIZE )
2008-07-31 13:08:25 +04:00
q [ template [ i ] . tap [ k ] ] = 0 ;
2014-08-08 15:27:51 +04:00
}
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
temp + = template [ i ] . tap [ k ] ;
}
2012-09-21 11:26:47 +04:00
2015-08-20 10:21:46 +03:00
skcipher_request_set_crypt ( req , sg , ( diff_dst ) ? sgout : sg ,
template [ i ] . ilen , iv ) ;
2012-09-21 11:26:47 +04:00
2015-08-20 10:21:46 +03:00
ret = enc ? crypto_skcipher_encrypt ( req ) :
crypto_skcipher_decrypt ( req ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
switch ( ret ) {
case 0 :
break ;
case - EINPROGRESS :
case - EBUSY :
2015-01-09 18:25:28 +03:00
wait_for_completion ( & result . completion ) ;
reinit_completion ( & result . completion ) ;
ret = result . err ;
if ( ! ret )
2014-08-08 15:27:51 +04:00
break ;
/* fall through */
default :
pr_err ( " alg: skcipher%s: %s failed on chunk test %d for %s: ret=%d \n " ,
d , e , j , algo , - ret ) ;
goto out ;
}
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
temp = 0 ;
ret = - EINVAL ;
for ( k = 0 ; k < template [ i ] . np ; k + + ) {
if ( diff_dst )
q = xoutbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ;
else
q = xbuf [ IDX [ k ] > > PAGE_SHIFT ] +
offset_in_page ( IDX [ k ] ) ;
2008-07-31 13:08:25 +04:00
2014-08-08 15:27:51 +04:00
if ( memcmp ( q , template [ i ] . result + temp ,
template [ i ] . tap [ k ] ) ) {
pr_err ( " alg: skcipher%s: Chunk test %d failed on %s at page %u for %s \n " ,
d , j , e , k , algo ) ;
hexdump ( q , template [ i ] . tap [ k ] ) ;
2008-07-31 13:08:25 +04:00
goto out ;
}
2014-08-08 15:27:51 +04:00
q + = template [ i ] . tap [ k ] ;
for ( n = 0 ; offset_in_page ( q + n ) & & q [ n ] ; n + + )
;
if ( n ) {
pr_err ( " alg: skcipher%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes: \n " ,
d , j , e , k , algo , n ) ;
hexdump ( q , n ) ;
goto out ;
2008-07-31 13:08:25 +04:00
}
2014-08-08 15:27:51 +04:00
temp + = template [ i ] . tap [ k ] ;
2008-07-31 13:08:25 +04:00
}
}
ret = 0 ;
out :
2015-08-20 10:21:46 +03:00
skcipher_request_free ( req ) ;
2012-09-21 11:26:47 +04:00
if ( diff_dst )
testmgr_free_buf ( xoutbuf ) ;
out_nooutbuf :
2009-05-06 10:15:47 +04:00
testmgr_free_buf ( xbuf ) ;
out_nobuf :
2008-07-31 13:08:25 +04:00
return ret ;
}
2015-08-20 10:21:46 +03:00
static int test_skcipher ( struct crypto_skcipher * tfm , int enc ,
2012-09-21 11:26:47 +04:00
struct cipher_testvec * template , unsigned int tcount )
{
2013-06-13 18:37:45 +04:00
unsigned int alignmask ;
2012-09-21 11:26:47 +04:00
int ret ;
/* test 'dst == src' case */
2013-06-13 18:37:45 +04:00
ret = __test_skcipher ( tfm , enc , template , tcount , false , 0 ) ;
2012-09-21 11:26:47 +04:00
if ( ret )
return ret ;
/* test 'dst != src' case */
2013-06-13 18:37:45 +04:00
ret = __test_skcipher ( tfm , enc , template , tcount , true , 0 ) ;
if ( ret )
return ret ;
/* test unaligned buffers, check with one byte offset */
ret = __test_skcipher ( tfm , enc , template , tcount , true , 1 ) ;
if ( ret )
return ret ;
alignmask = crypto_tfm_alg_alignmask ( & tfm - > base ) ;
if ( alignmask ) {
/* Check if alignment mask for tfm is correctly set. */
ret = __test_skcipher ( tfm , enc , template , tcount , true ,
alignmask + 1 ) ;
if ( ret )
return ret ;
}
return 0 ;
2012-09-21 11:26:47 +04:00
}
2008-07-31 13:08:25 +04:00
static int test_comp ( struct crypto_comp * tfm , struct comp_testvec * ctemplate ,
struct comp_testvec * dtemplate , int ctcount , int dtcount )
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_comp_tfm ( tfm ) ) ;
unsigned int i ;
char result [ COMP_BUF_SIZE ] ;
int ret ;
for ( i = 0 ; i < ctcount ; i + + ) {
2009-03-29 11:44:19 +04:00
int ilen ;
unsigned int dlen = COMP_BUF_SIZE ;
2008-07-31 13:08:25 +04:00
memset ( result , 0 , sizeof ( result ) ) ;
ilen = ctemplate [ i ] . inlen ;
ret = crypto_comp_compress ( tfm , ctemplate [ i ] . input ,
ilen , result , & dlen ) ;
if ( ret ) {
printk ( KERN_ERR " alg: comp: compression failed "
" on test %d for %s: ret=%d \n " , i + 1 , algo ,
- ret ) ;
goto out ;
}
2008-11-28 15:51:28 +03:00
if ( dlen ! = ctemplate [ i ] . outlen ) {
printk ( KERN_ERR " alg: comp: Compression test %d "
" failed for %s: output len = %d \n " , i + 1 , algo ,
dlen ) ;
ret = - EINVAL ;
goto out ;
}
2008-07-31 13:08:25 +04:00
if ( memcmp ( result , ctemplate [ i ] . output , dlen ) ) {
printk ( KERN_ERR " alg: comp: Compression test %d "
" failed for %s \n " , i + 1 , algo ) ;
hexdump ( result , dlen ) ;
ret = - EINVAL ;
goto out ;
}
}
for ( i = 0 ; i < dtcount ; i + + ) {
2009-03-29 11:44:19 +04:00
int ilen ;
unsigned int dlen = COMP_BUF_SIZE ;
2008-07-31 13:08:25 +04:00
memset ( result , 0 , sizeof ( result ) ) ;
ilen = dtemplate [ i ] . inlen ;
ret = crypto_comp_decompress ( tfm , dtemplate [ i ] . input ,
ilen , result , & dlen ) ;
if ( ret ) {
printk ( KERN_ERR " alg: comp: decompression failed "
" on test %d for %s: ret=%d \n " , i + 1 , algo ,
- ret ) ;
goto out ;
}
2008-11-28 15:51:28 +03:00
if ( dlen ! = dtemplate [ i ] . outlen ) {
printk ( KERN_ERR " alg: comp: Decompression test %d "
" failed for %s: output len = %d \n " , i + 1 , algo ,
dlen ) ;
ret = - EINVAL ;
goto out ;
}
2008-07-31 13:08:25 +04:00
if ( memcmp ( result , dtemplate [ i ] . output , dlen ) ) {
printk ( KERN_ERR " alg: comp: Decompression test %d "
" failed for %s \n " , i + 1 , algo ) ;
hexdump ( result , dlen ) ;
ret = - EINVAL ;
goto out ;
}
}
ret = 0 ;
out :
return ret ;
}
2016-10-21 15:19:54 +03:00
static int test_acomp ( struct crypto_acomp * tfm , struct comp_testvec * ctemplate ,
struct comp_testvec * dtemplate , int ctcount , int dtcount )
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_acomp_tfm ( tfm ) ) ;
unsigned int i ;
2016-11-23 21:24:35 +03:00
char * output ;
2016-10-21 15:19:54 +03:00
int ret ;
struct scatterlist src , dst ;
struct acomp_req * req ;
struct tcrypt_result result ;
2016-11-23 21:24:35 +03:00
output = kmalloc ( COMP_BUF_SIZE , GFP_KERNEL ) ;
if ( ! output )
return - ENOMEM ;
2016-10-21 15:19:54 +03:00
for ( i = 0 ; i < ctcount ; i + + ) {
unsigned int dlen = COMP_BUF_SIZE ;
int ilen = ctemplate [ i ] . inlen ;
2016-11-23 21:24:35 +03:00
memset ( output , 0 , dlen ) ;
2016-10-21 15:19:54 +03:00
init_completion ( & result . completion ) ;
sg_init_one ( & src , ctemplate [ i ] . input , ilen ) ;
sg_init_one ( & dst , output , dlen ) ;
req = acomp_request_alloc ( tfm ) ;
if ( ! req ) {
pr_err ( " alg: acomp: request alloc failed for %s \n " ,
algo ) ;
ret = - ENOMEM ;
goto out ;
}
acomp_request_set_params ( req , & src , & dst , ilen , dlen ) ;
acomp_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
ret = wait_async_op ( & result , crypto_acomp_compress ( req ) ) ;
if ( ret ) {
pr_err ( " alg: acomp: compression failed on test %d for %s: ret=%d \n " ,
i + 1 , algo , - ret ) ;
acomp_request_free ( req ) ;
goto out ;
}
if ( req - > dlen ! = ctemplate [ i ] . outlen ) {
pr_err ( " alg: acomp: Compression test %d failed for %s: output len = %d \n " ,
i + 1 , algo , req - > dlen ) ;
ret = - EINVAL ;
acomp_request_free ( req ) ;
goto out ;
}
if ( memcmp ( output , ctemplate [ i ] . output , req - > dlen ) ) {
pr_err ( " alg: acomp: Compression test %d failed for %s \n " ,
i + 1 , algo ) ;
hexdump ( output , req - > dlen ) ;
ret = - EINVAL ;
acomp_request_free ( req ) ;
goto out ;
}
acomp_request_free ( req ) ;
}
for ( i = 0 ; i < dtcount ; i + + ) {
unsigned int dlen = COMP_BUF_SIZE ;
int ilen = dtemplate [ i ] . inlen ;
2016-11-23 21:24:35 +03:00
memset ( output , 0 , dlen ) ;
2016-10-21 15:19:54 +03:00
init_completion ( & result . completion ) ;
sg_init_one ( & src , dtemplate [ i ] . input , ilen ) ;
sg_init_one ( & dst , output , dlen ) ;
req = acomp_request_alloc ( tfm ) ;
if ( ! req ) {
pr_err ( " alg: acomp: request alloc failed for %s \n " ,
algo ) ;
ret = - ENOMEM ;
goto out ;
}
acomp_request_set_params ( req , & src , & dst , ilen , dlen ) ;
acomp_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
ret = wait_async_op ( & result , crypto_acomp_decompress ( req ) ) ;
if ( ret ) {
pr_err ( " alg: acomp: decompression failed on test %d for %s: ret=%d \n " ,
i + 1 , algo , - ret ) ;
acomp_request_free ( req ) ;
goto out ;
}
if ( req - > dlen ! = dtemplate [ i ] . outlen ) {
pr_err ( " alg: acomp: Decompression test %d failed for %s: output len = %d \n " ,
i + 1 , algo , req - > dlen ) ;
ret = - EINVAL ;
acomp_request_free ( req ) ;
goto out ;
}
if ( memcmp ( output , dtemplate [ i ] . output , req - > dlen ) ) {
pr_err ( " alg: acomp: Decompression test %d failed for %s \n " ,
i + 1 , algo ) ;
hexdump ( output , req - > dlen ) ;
ret = - EINVAL ;
acomp_request_free ( req ) ;
goto out ;
}
acomp_request_free ( req ) ;
}
ret = 0 ;
out :
2016-11-23 21:24:35 +03:00
kfree ( output ) ;
2016-10-21 15:19:54 +03:00
return ret ;
}
2009-05-04 15:44:50 +04:00
static int test_cprng ( struct crypto_rng * tfm , struct cprng_testvec * template ,
unsigned int tcount )
{
const char * algo = crypto_tfm_alg_driver_name ( crypto_rng_tfm ( tfm ) ) ;
2009-10-27 14:04:42 +03:00
int err = 0 , i , j , seedsize ;
2009-05-04 15:44:50 +04:00
u8 * seed ;
char result [ 32 ] ;
seedsize = crypto_rng_seedsize ( tfm ) ;
seed = kmalloc ( seedsize , GFP_KERNEL ) ;
if ( ! seed ) {
printk ( KERN_ERR " alg: cprng: Failed to allocate seed space "
" for %s \n " , algo ) ;
return - ENOMEM ;
}
for ( i = 0 ; i < tcount ; i + + ) {
memset ( result , 0 , 32 ) ;
memcpy ( seed , template [ i ] . v , template [ i ] . vlen ) ;
memcpy ( seed + template [ i ] . vlen , template [ i ] . key ,
template [ i ] . klen ) ;
memcpy ( seed + template [ i ] . vlen + template [ i ] . klen ,
template [ i ] . dt , template [ i ] . dtlen ) ;
err = crypto_rng_reset ( tfm , seed , seedsize ) ;
if ( err ) {
printk ( KERN_ERR " alg: cprng: Failed to reset rng "
" for %s \n " , algo ) ;
goto out ;
}
for ( j = 0 ; j < template [ i ] . loops ; j + + ) {
err = crypto_rng_get_bytes ( tfm , result ,
template [ i ] . rlen ) ;
2015-03-10 19:00:36 +03:00
if ( err < 0 ) {
2009-05-04 15:44:50 +04:00
printk ( KERN_ERR " alg: cprng: Failed to obtain "
" the correct amount of random data for "
2015-03-10 19:00:36 +03:00
" %s (requested %d) \n " , algo ,
template [ i ] . rlen ) ;
2009-05-04 15:44:50 +04:00
goto out ;
}
}
err = memcmp ( result , template [ i ] . result ,
template [ i ] . rlen ) ;
if ( err ) {
printk ( KERN_ERR " alg: cprng: Test %d failed for %s \n " ,
i , algo ) ;
hexdump ( result , template [ i ] . rlen ) ;
err = - EINVAL ;
goto out ;
}
}
out :
kfree ( seed ) ;
return err ;
}
2008-07-31 13:08:25 +04:00
static int alg_test_aead ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
struct crypto_aead * tfm ;
int err = 0 ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_aead ( driver , type , mask ) ;
2008-07-31 13:08:25 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( KERN_ERR " alg: aead: Failed to load transform for %s: "
" %ld \n " , driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
if ( desc - > suite . aead . enc . vecs ) {
err = test_aead ( tfm , ENCRYPT , desc - > suite . aead . enc . vecs ,
desc - > suite . aead . enc . count ) ;
if ( err )
goto out ;
}
if ( ! err & & desc - > suite . aead . dec . vecs )
err = test_aead ( tfm , DECRYPT , desc - > suite . aead . dec . vecs ,
desc - > suite . aead . dec . count ) ;
out :
crypto_free_aead ( tfm ) ;
return err ;
}
static int alg_test_cipher ( const struct alg_test_desc * desc ,
const char * driver , u32 type , u32 mask )
{
2008-08-17 11:01:56 +04:00
struct crypto_cipher * tfm ;
2008-07-31 13:08:25 +04:00
int err = 0 ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_cipher ( driver , type , mask ) ;
2008-07-31 13:08:25 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( KERN_ERR " alg: cipher: Failed to load transform for "
" %s: %ld \n " , driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
if ( desc - > suite . cipher . enc . vecs ) {
err = test_cipher ( tfm , ENCRYPT , desc - > suite . cipher . enc . vecs ,
desc - > suite . cipher . enc . count ) ;
if ( err )
goto out ;
}
if ( desc - > suite . cipher . dec . vecs )
err = test_cipher ( tfm , DECRYPT , desc - > suite . cipher . dec . vecs ,
desc - > suite . cipher . dec . count ) ;
2008-08-17 11:01:56 +04:00
out :
crypto_free_cipher ( tfm ) ;
return err ;
}
static int alg_test_skcipher ( const struct alg_test_desc * desc ,
const char * driver , u32 type , u32 mask )
{
2015-08-20 10:21:46 +03:00
struct crypto_skcipher * tfm ;
2008-08-17 11:01:56 +04:00
int err = 0 ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_skcipher ( driver , type , mask ) ;
2008-08-17 11:01:56 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( KERN_ERR " alg: skcipher: Failed to load transform for "
" %s: %ld \n " , driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
if ( desc - > suite . cipher . enc . vecs ) {
err = test_skcipher ( tfm , ENCRYPT , desc - > suite . cipher . enc . vecs ,
desc - > suite . cipher . enc . count ) ;
if ( err )
goto out ;
}
if ( desc - > suite . cipher . dec . vecs )
err = test_skcipher ( tfm , DECRYPT , desc - > suite . cipher . dec . vecs ,
desc - > suite . cipher . dec . count ) ;
2008-07-31 13:08:25 +04:00
out :
2015-08-20 10:21:46 +03:00
crypto_free_skcipher ( tfm ) ;
2008-07-31 13:08:25 +04:00
return err ;
}
static int alg_test_comp ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
2016-10-21 15:19:54 +03:00
struct crypto_comp * comp ;
struct crypto_acomp * acomp ;
2008-07-31 13:08:25 +04:00
int err ;
2016-10-21 15:19:54 +03:00
u32 algo_type = type & CRYPTO_ALG_TYPE_ACOMPRESS_MASK ;
if ( algo_type = = CRYPTO_ALG_TYPE_ACOMPRESS ) {
acomp = crypto_alloc_acomp ( driver , type , mask ) ;
if ( IS_ERR ( acomp ) ) {
pr_err ( " alg: acomp: Failed to load transform for %s: %ld \n " ,
driver , PTR_ERR ( acomp ) ) ;
return PTR_ERR ( acomp ) ;
}
err = test_acomp ( acomp , desc - > suite . comp . comp . vecs ,
desc - > suite . comp . decomp . vecs ,
desc - > suite . comp . comp . count ,
desc - > suite . comp . decomp . count ) ;
crypto_free_acomp ( acomp ) ;
} else {
comp = crypto_alloc_comp ( driver , type , mask ) ;
if ( IS_ERR ( comp ) ) {
pr_err ( " alg: comp: Failed to load transform for %s: %ld \n " ,
driver , PTR_ERR ( comp ) ) ;
return PTR_ERR ( comp ) ;
}
2008-07-31 13:08:25 +04:00
2016-10-21 15:19:54 +03:00
err = test_comp ( comp , desc - > suite . comp . comp . vecs ,
desc - > suite . comp . decomp . vecs ,
desc - > suite . comp . comp . count ,
desc - > suite . comp . decomp . count ) ;
2008-07-31 13:08:25 +04:00
2016-10-21 15:19:54 +03:00
crypto_free_comp ( comp ) ;
}
2008-07-31 13:08:25 +04:00
return err ;
}
static int alg_test_hash ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
struct crypto_ahash * tfm ;
int err ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_ahash ( driver , type , mask ) ;
2008-07-31 13:08:25 +04:00
if ( IS_ERR ( tfm ) ) {
printk ( KERN_ERR " alg: hash: Failed to load transform for %s: "
" %ld \n " , driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
2010-05-19 08:12:03 +04:00
err = test_hash ( tfm , desc - > suite . hash . vecs ,
desc - > suite . hash . count , true ) ;
if ( ! err )
err = test_hash ( tfm , desc - > suite . hash . vecs ,
desc - > suite . hash . count , false ) ;
2008-07-31 13:08:25 +04:00
crypto_free_ahash ( tfm ) ;
return err ;
}
2008-11-07 09:58:52 +03:00
static int alg_test_crc32c ( const struct alg_test_desc * desc ,
const char * driver , u32 type , u32 mask )
{
struct crypto_shash * tfm ;
u32 val ;
int err ;
err = alg_test_hash ( desc , driver , type , mask ) ;
if ( err )
goto out ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_shash ( driver , type , mask ) ;
2008-11-07 09:58:52 +03:00
if ( IS_ERR ( tfm ) ) {
printk ( KERN_ERR " alg: crc32c: Failed to load transform for %s: "
" %ld \n " , driver , PTR_ERR ( tfm ) ) ;
err = PTR_ERR ( tfm ) ;
goto out ;
}
do {
2012-07-02 15:48:30 +04:00
SHASH_DESC_ON_STACK ( shash , tfm ) ;
u32 * ctx = ( u32 * ) shash_desc_ctx ( shash ) ;
2008-11-07 09:58:52 +03:00
2012-07-02 15:48:30 +04:00
shash - > tfm = tfm ;
shash - > flags = 0 ;
2008-11-07 09:58:52 +03:00
2012-07-02 15:48:30 +04:00
* ctx = le32_to_cpu ( 420553207 ) ;
err = crypto_shash_final ( shash , ( u8 * ) & val ) ;
2008-11-07 09:58:52 +03:00
if ( err ) {
printk ( KERN_ERR " alg: crc32c: Operation failed for "
" %s: %d \n " , driver , err ) ;
break ;
}
if ( val ! = ~ 420553207 ) {
printk ( KERN_ERR " alg: crc32c: Test failed for %s: "
" %d \n " , driver , val ) ;
err = - EINVAL ;
}
} while ( 0 ) ;
crypto_free_shash ( tfm ) ;
out :
return err ;
}
2009-05-04 15:44:50 +04:00
static int alg_test_cprng ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
struct crypto_rng * rng ;
int err ;
2016-11-22 15:08:31 +03:00
rng = crypto_alloc_rng ( driver , type , mask ) ;
2009-05-04 15:44:50 +04:00
if ( IS_ERR ( rng ) ) {
printk ( KERN_ERR " alg: cprng: Failed to load transform for %s: "
" %ld \n " , driver , PTR_ERR ( rng ) ) ;
return PTR_ERR ( rng ) ;
}
err = test_cprng ( rng , desc - > suite . cprng . vecs , desc - > suite . cprng . count ) ;
crypto_free_rng ( rng ) ;
return err ;
}
2014-05-31 19:25:36 +04:00
static int drbg_cavs_test ( struct drbg_testvec * test , int pr ,
const char * driver , u32 type , u32 mask )
{
int ret = - EAGAIN ;
struct crypto_rng * drng ;
struct drbg_test_data test_data ;
struct drbg_string addtl , pers , testentropy ;
unsigned char * buf = kzalloc ( test - > expectedlen , GFP_KERNEL ) ;
if ( ! buf )
return - ENOMEM ;
2016-11-22 15:08:31 +03:00
drng = crypto_alloc_rng ( driver , type , mask ) ;
2014-05-31 19:25:36 +04:00
if ( IS_ERR ( drng ) ) {
2014-07-29 23:47:56 +04:00
printk ( KERN_ERR " alg: drbg: could not allocate DRNG handle for "
2014-05-31 19:25:36 +04:00
" %s \n " , driver ) ;
kzfree ( buf ) ;
return - ENOMEM ;
}
test_data . testentropy = & testentropy ;
drbg_string_fill ( & testentropy , test - > entropy , test - > entropylen ) ;
drbg_string_fill ( & pers , test - > pers , test - > perslen ) ;
ret = crypto_drbg_reset_test ( drng , & pers , & test_data ) ;
if ( ret ) {
printk ( KERN_ERR " alg: drbg: Failed to reset rng \n " ) ;
goto outbuf ;
}
drbg_string_fill ( & addtl , test - > addtla , test - > addtllen ) ;
if ( pr ) {
drbg_string_fill ( & testentropy , test - > entpra , test - > entprlen ) ;
ret = crypto_drbg_get_bytes_addtl_test ( drng ,
buf , test - > expectedlen , & addtl , & test_data ) ;
} else {
ret = crypto_drbg_get_bytes_addtl ( drng ,
buf , test - > expectedlen , & addtl ) ;
}
2015-03-10 19:00:36 +03:00
if ( ret < 0 ) {
2014-07-29 23:47:56 +04:00
printk ( KERN_ERR " alg: drbg: could not obtain random data for "
2014-05-31 19:25:36 +04:00
" driver %s \n " , driver ) ;
goto outbuf ;
}
drbg_string_fill ( & addtl , test - > addtlb , test - > addtllen ) ;
if ( pr ) {
drbg_string_fill ( & testentropy , test - > entprb , test - > entprlen ) ;
ret = crypto_drbg_get_bytes_addtl_test ( drng ,
buf , test - > expectedlen , & addtl , & test_data ) ;
} else {
ret = crypto_drbg_get_bytes_addtl ( drng ,
buf , test - > expectedlen , & addtl ) ;
}
2015-03-10 19:00:36 +03:00
if ( ret < 0 ) {
2014-07-29 23:47:56 +04:00
printk ( KERN_ERR " alg: drbg: could not obtain random data for "
2014-05-31 19:25:36 +04:00
" driver %s \n " , driver ) ;
goto outbuf ;
}
ret = memcmp ( test - > expected , buf , test - > expectedlen ) ;
outbuf :
crypto_free_rng ( drng ) ;
kzfree ( buf ) ;
return ret ;
}
static int alg_test_drbg ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
int err = 0 ;
int pr = 0 ;
int i = 0 ;
struct drbg_testvec * template = desc - > suite . drbg . vecs ;
unsigned int tcount = desc - > suite . drbg . count ;
if ( 0 = = memcmp ( driver , " drbg_pr_ " , 8 ) )
pr = 1 ;
for ( i = 0 ; i < tcount ; i + + ) {
err = drbg_cavs_test ( & template [ i ] , pr , driver , type , mask ) ;
if ( err ) {
printk ( KERN_ERR " alg: drbg: Test %d failed for %s \n " ,
i , driver ) ;
err = - EINVAL ;
break ;
}
}
return err ;
}
2016-06-22 19:49:14 +03:00
static int do_test_kpp ( struct crypto_kpp * tfm , struct kpp_testvec * vec ,
const char * alg )
{
struct kpp_request * req ;
void * input_buf = NULL ;
void * output_buf = NULL ;
struct tcrypt_result result ;
unsigned int out_len_max ;
int err = - ENOMEM ;
struct scatterlist src , dst ;
req = kpp_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req )
return err ;
init_completion ( & result . completion ) ;
err = crypto_kpp_set_secret ( tfm , vec - > secret , vec - > secret_size ) ;
if ( err < 0 )
goto free_req ;
out_len_max = crypto_kpp_maxsize ( tfm ) ;
output_buf = kzalloc ( out_len_max , GFP_KERNEL ) ;
if ( ! output_buf ) {
err = - ENOMEM ;
goto free_req ;
}
/* Use appropriate parameter as base */
kpp_request_set_input ( req , NULL , 0 ) ;
sg_init_one ( & dst , output_buf , out_len_max ) ;
kpp_request_set_output ( req , & dst , out_len_max ) ;
kpp_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
/* Compute public key */
err = wait_async_op ( & result , crypto_kpp_generate_public_key ( req ) ) ;
if ( err ) {
pr_err ( " alg: %s: generate public key test failed. err %d \n " ,
alg , err ) ;
goto free_output ;
}
/* Verify calculated public key */
if ( memcmp ( vec - > expected_a_public , sg_virt ( req - > dst ) ,
vec - > expected_a_public_size ) ) {
pr_err ( " alg: %s: generate public key test failed. Invalid output \n " ,
alg ) ;
err = - EINVAL ;
goto free_output ;
}
/* Calculate shared secret key by using counter part (b) public key. */
input_buf = kzalloc ( vec - > b_public_size , GFP_KERNEL ) ;
if ( ! input_buf ) {
err = - ENOMEM ;
goto free_output ;
}
memcpy ( input_buf , vec - > b_public , vec - > b_public_size ) ;
sg_init_one ( & src , input_buf , vec - > b_public_size ) ;
sg_init_one ( & dst , output_buf , out_len_max ) ;
kpp_request_set_input ( req , & src , vec - > b_public_size ) ;
kpp_request_set_output ( req , & dst , out_len_max ) ;
kpp_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
err = wait_async_op ( & result , crypto_kpp_compute_shared_secret ( req ) ) ;
if ( err ) {
pr_err ( " alg: %s: compute shard secret test failed. err %d \n " ,
alg , err ) ;
goto free_all ;
}
/*
* verify shared secret from which the user will derive
* secret key by executing whatever hash it has chosen
*/
if ( memcmp ( vec - > expected_ss , sg_virt ( req - > dst ) ,
vec - > expected_ss_size ) ) {
pr_err ( " alg: %s: compute shared secret test failed. Invalid output \n " ,
alg ) ;
err = - EINVAL ;
}
free_all :
kfree ( input_buf ) ;
free_output :
kfree ( output_buf ) ;
free_req :
kpp_request_free ( req ) ;
return err ;
}
static int test_kpp ( struct crypto_kpp * tfm , const char * alg ,
struct kpp_testvec * vecs , unsigned int tcount )
{
int ret , i ;
for ( i = 0 ; i < tcount ; i + + ) {
ret = do_test_kpp ( tfm , vecs + + , alg ) ;
if ( ret ) {
pr_err ( " alg: %s: test failed on vector %d, err=%d \n " ,
alg , i + 1 , ret ) ;
return ret ;
}
}
return 0 ;
}
static int alg_test_kpp ( const struct alg_test_desc * desc , const char * driver ,
u32 type , u32 mask )
{
struct crypto_kpp * tfm ;
int err = 0 ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_kpp ( driver , type , mask ) ;
2016-06-22 19:49:14 +03:00
if ( IS_ERR ( tfm ) ) {
pr_err ( " alg: kpp: Failed to load tfm for %s: %ld \n " ,
driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
if ( desc - > suite . kpp . vecs )
err = test_kpp ( tfm , desc - > alg , desc - > suite . kpp . vecs ,
desc - > suite . kpp . count ) ;
crypto_free_kpp ( tfm ) ;
return err ;
}
2016-06-29 14:32:20 +03:00
static int test_akcipher_one ( struct crypto_akcipher * tfm ,
struct akcipher_testvec * vecs )
2015-06-16 20:31:06 +03:00
{
2016-05-05 11:42:49 +03:00
char * xbuf [ XBUFSIZE ] ;
2015-06-16 20:31:06 +03:00
struct akcipher_request * req ;
void * outbuf_enc = NULL ;
void * outbuf_dec = NULL ;
struct tcrypt_result result ;
unsigned int out_len_max , out_len = 0 ;
int err = - ENOMEM ;
2015-10-08 19:26:55 +03:00
struct scatterlist src , dst , src_tab [ 2 ] ;
2015-06-16 20:31:06 +03:00
2016-05-05 11:42:49 +03:00
if ( testmgr_alloc_buf ( xbuf ) )
return err ;
2015-06-16 20:31:06 +03:00
req = akcipher_request_alloc ( tfm , GFP_KERNEL ) ;
if ( ! req )
2016-05-05 11:42:49 +03:00
goto free_xbuf ;
2015-06-16 20:31:06 +03:00
init_completion ( & result . completion ) ;
2015-10-08 19:26:55 +03:00
if ( vecs - > public_key_vec )
err = crypto_akcipher_set_pub_key ( tfm , vecs - > key ,
vecs - > key_len ) ;
else
err = crypto_akcipher_set_priv_key ( tfm , vecs - > key ,
vecs - > key_len ) ;
if ( err )
2015-06-16 20:31:06 +03:00
goto free_req ;
2016-07-04 12:52:34 +03:00
err = - ENOMEM ;
2015-10-08 19:26:55 +03:00
out_len_max = crypto_akcipher_maxsize ( tfm ) ;
2015-06-16 20:31:06 +03:00
outbuf_enc = kzalloc ( out_len_max , GFP_KERNEL ) ;
if ( ! outbuf_enc )
goto free_req ;
2016-05-05 11:42:49 +03:00
if ( WARN_ON ( vecs - > m_size > PAGE_SIZE ) )
goto free_all ;
memcpy ( xbuf [ 0 ] , vecs - > m , vecs - > m_size ) ;
2015-10-08 19:26:55 +03:00
sg_init_table ( src_tab , 2 ) ;
2016-05-05 11:42:49 +03:00
sg_set_buf ( & src_tab [ 0 ] , xbuf [ 0 ] , 8 ) ;
sg_set_buf ( & src_tab [ 1 ] , xbuf [ 0 ] + 8 , vecs - > m_size - 8 ) ;
2015-10-08 19:26:55 +03:00
sg_init_one ( & dst , outbuf_enc , out_len_max ) ;
akcipher_request_set_crypt ( req , src_tab , & dst , vecs - > m_size ,
out_len_max ) ;
2015-06-16 20:31:06 +03:00
akcipher_request_set_callback ( req , CRYPTO_TFM_REQ_MAY_BACKLOG ,
tcrypt_complete , & result ) ;
/* Run RSA encrypt - c = m^e mod n;*/
err = wait_async_op ( & result , crypto_akcipher_encrypt ( req ) ) ;
if ( err ) {
2016-06-29 14:32:20 +03:00
pr_err ( " alg: akcipher: encrypt test failed. err %d \n " , err ) ;
2015-06-16 20:31:06 +03:00
goto free_all ;
}
2015-10-08 19:26:55 +03:00
if ( req - > dst_len ! = vecs - > c_size ) {
2016-06-29 14:32:20 +03:00
pr_err ( " alg: akcipher: encrypt test failed. Invalid output len \n " ) ;
2015-06-16 20:31:06 +03:00
err = - EINVAL ;
goto free_all ;
}
/* verify that encrypted message is equal to expected */
2016-05-05 11:42:49 +03:00
if ( memcmp ( vecs - > c , outbuf_enc , vecs - > c_size ) ) {
2016-06-29 14:32:20 +03:00
pr_err ( " alg: akcipher: encrypt test failed. Invalid output \n " ) ;
hexdump ( outbuf_enc , vecs - > c_size ) ;
2015-06-16 20:31:06 +03:00
err = - EINVAL ;
goto free_all ;
}
/* Don't invoke decrypt for vectors with public key */
if ( vecs - > public_key_vec ) {
err = 0 ;
goto free_all ;
}
outbuf_dec = kzalloc ( out_len_max , GFP_KERNEL ) ;
if ( ! outbuf_dec ) {
err = - ENOMEM ;
goto free_all ;
}
2016-05-05 11:42:49 +03:00
if ( WARN_ON ( vecs - > c_size > PAGE_SIZE ) )
goto free_all ;
memcpy ( xbuf [ 0 ] , vecs - > c , vecs - > c_size ) ;
sg_init_one ( & src , xbuf [ 0 ] , vecs - > c_size ) ;
2015-10-08 19:26:55 +03:00
sg_init_one ( & dst , outbuf_dec , out_len_max ) ;
2015-06-16 20:31:06 +03:00
init_completion ( & result . completion ) ;
2015-10-08 19:26:55 +03:00
akcipher_request_set_crypt ( req , & src , & dst , vecs - > c_size , out_len_max ) ;
2015-06-16 20:31:06 +03:00
/* Run RSA decrypt - m = c^d mod n;*/
err = wait_async_op ( & result , crypto_akcipher_decrypt ( req ) ) ;
if ( err ) {
2016-06-29 14:32:20 +03:00
pr_err ( " alg: akcipher: decrypt test failed. err %d \n " , err ) ;
2015-06-16 20:31:06 +03:00
goto free_all ;
}
out_len = req - > dst_len ;
2016-06-29 14:32:20 +03:00
if ( out_len < vecs - > m_size ) {
pr_err ( " alg: akcipher: decrypt test failed. "
" Invalid output len %u \n " , out_len ) ;
2015-06-16 20:31:06 +03:00
err = - EINVAL ;
goto free_all ;
}
/* verify that decrypted message is equal to the original msg */
2016-06-29 14:32:20 +03:00
if ( memchr_inv ( outbuf_dec , 0 , out_len - vecs - > m_size ) | |
memcmp ( vecs - > m , outbuf_dec + out_len - vecs - > m_size ,
vecs - > m_size ) ) {
pr_err ( " alg: akcipher: decrypt test failed. Invalid output \n " ) ;
hexdump ( outbuf_dec , out_len ) ;
2015-06-16 20:31:06 +03:00
err = - EINVAL ;
}
free_all :
kfree ( outbuf_dec ) ;
kfree ( outbuf_enc ) ;
free_req :
akcipher_request_free ( req ) ;
2016-05-05 11:42:49 +03:00
free_xbuf :
testmgr_free_buf ( xbuf ) ;
2015-06-16 20:31:06 +03:00
return err ;
}
2016-06-29 14:32:20 +03:00
static int test_akcipher ( struct crypto_akcipher * tfm , const char * alg ,
struct akcipher_testvec * vecs , unsigned int tcount )
2015-06-16 20:31:06 +03:00
{
2016-07-18 13:20:10 +03:00
const char * algo =
crypto_tfm_alg_driver_name ( crypto_akcipher_tfm ( tfm ) ) ;
2015-06-16 20:31:06 +03:00
int ret , i ;
for ( i = 0 ; i < tcount ; i + + ) {
2016-06-29 14:32:20 +03:00
ret = test_akcipher_one ( tfm , vecs + + ) ;
if ( ! ret )
continue ;
2015-06-16 20:31:06 +03:00
2016-07-18 13:20:10 +03:00
pr_err ( " alg: akcipher: test %d failed for %s, err=%d \n " ,
i + 1 , algo , ret ) ;
2016-06-29 14:32:20 +03:00
return ret ;
}
2015-06-16 20:31:06 +03:00
return 0 ;
}
static int alg_test_akcipher ( const struct alg_test_desc * desc ,
const char * driver , u32 type , u32 mask )
{
struct crypto_akcipher * tfm ;
int err = 0 ;
2016-11-22 15:08:31 +03:00
tfm = crypto_alloc_akcipher ( driver , type , mask ) ;
2015-06-16 20:31:06 +03:00
if ( IS_ERR ( tfm ) ) {
pr_err ( " alg: akcipher: Failed to load tfm for %s: %ld \n " ,
driver , PTR_ERR ( tfm ) ) ;
return PTR_ERR ( tfm ) ;
}
if ( desc - > suite . akcipher . vecs )
err = test_akcipher ( tfm , desc - > alg , desc - > suite . akcipher . vecs ,
desc - > suite . akcipher . count ) ;
crypto_free_akcipher ( tfm ) ;
return err ;
}
2009-12-23 14:45:20 +03:00
static int alg_test_null ( const struct alg_test_desc * desc ,
const char * driver , u32 type , u32 mask )
{
return 0 ;
}
2008-07-31 13:08:25 +04:00
/* Please keep this list sorted by algorithm name. */
static const struct alg_test_desc alg_test_descs [ ] = {
{
2009-05-04 15:46:29 +04:00
. alg = " ansi_cprng " ,
. test = alg_test_cprng ,
. suite = {
. cprng = {
. vecs = ansi_cprng_aes_tv_template ,
. count = ANSI_CPRNG_AES_TEST_VECTORS
}
}
2014-03-14 19:46:51 +04:00
} , {
. alg = " authenc(hmac(md5),ecb(cipher_null)) " ,
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs = hmac_md5_ecb_cipher_null_enc_tv_template ,
. count = HMAC_MD5_ECB_CIPHER_NULL_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = hmac_md5_ecb_cipher_null_dec_tv_template ,
. count = HMAC_MD5_ECB_CIPHER_NULL_DEC_TEST_VECTORS
}
}
}
2012-07-03 20:16:54 +04:00
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha1),cbc(aes)) " ,
2012-07-03 20:16:54 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. vecs =
hmac_sha1_aes_cbc_enc_tv_temp ,
. count =
HMAC_SHA1_AES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha1),cbc(des)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha1_des_cbc_enc_tv_temp ,
. count =
HMAC_SHA1_DES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha1),cbc(des3_ede)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha1_des3_ede_cbc_enc_tv_temp ,
. count =
HMAC_SHA1_DES3_EDE_CBC_ENC_TEST_VEC
2012-07-03 20:16:54 +04:00
}
}
}
2016-02-06 13:53:07 +03:00
} , {
. alg = " authenc(hmac(sha1),ctr(aes)) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2014-03-14 19:46:51 +04:00
} , {
. alg = " authenc(hmac(sha1),ecb(cipher_null)) " ,
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. vecs =
hmac_sha1_ecb_cipher_null_enc_tv_temp ,
. count =
HMAC_SHA1_ECB_CIPHER_NULL_ENC_TEST_VEC
2014-03-14 19:46:51 +04:00
} ,
. dec = {
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. vecs =
hmac_sha1_ecb_cipher_null_dec_tv_temp ,
. count =
HMAC_SHA1_ECB_CIPHER_NULL_DEC_TEST_VEC
}
}
}
2016-02-19 15:34:28 +03:00
} , {
. alg = " authenc(hmac(sha1),rfc3686(ctr(aes))) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha224),cbc(des)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha224_des_cbc_enc_tv_temp ,
. count =
HMAC_SHA224_DES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha224),cbc(des3_ede)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha224_des3_ede_cbc_enc_tv_temp ,
. count =
HMAC_SHA224_DES3_EDE_CBC_ENC_TEST_VEC
2014-03-14 19:46:51 +04:00
}
}
}
2012-07-03 20:16:54 +04:00
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha256),cbc(aes)) " ,
2012-07-03 20:16:54 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
2012-07-03 20:16:54 +04:00
. suite = {
. aead = {
. enc = {
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. vecs =
hmac_sha256_aes_cbc_enc_tv_temp ,
. count =
HMAC_SHA256_AES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha256),cbc(des)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha256_des_cbc_enc_tv_temp ,
. count =
HMAC_SHA256_DES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha256),cbc(des3_ede)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha256_des3_ede_cbc_enc_tv_temp ,
. count =
HMAC_SHA256_DES3_EDE_CBC_ENC_TEST_VEC
}
}
}
2016-02-06 13:53:07 +03:00
} , {
. alg = " authenc(hmac(sha256),ctr(aes)) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2016-02-19 15:34:28 +03:00
} , {
. alg = " authenc(hmac(sha256),rfc3686(ctr(aes))) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha384),cbc(des)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha384_des_cbc_enc_tv_temp ,
. count =
HMAC_SHA384_DES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha384),cbc(des3_ede)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha384_des3_ede_cbc_enc_tv_temp ,
. count =
HMAC_SHA384_DES3_EDE_CBC_ENC_TEST_VEC
2012-07-03 20:16:54 +04:00
}
}
}
2016-02-06 13:53:07 +03:00
} , {
. alg = " authenc(hmac(sha384),ctr(aes)) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2016-02-19 15:34:28 +03:00
} , {
. alg = " authenc(hmac(sha384),rfc3686(ctr(aes))) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2012-07-03 20:16:54 +04:00
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha512),cbc(aes)) " ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
2012-07-03 20:16:54 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. vecs =
hmac_sha512_aes_cbc_enc_tv_temp ,
. count =
HMAC_SHA512_AES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha512),cbc(des)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha512_des_cbc_enc_tv_temp ,
. count =
HMAC_SHA512_DES_CBC_ENC_TEST_VEC
}
}
}
} , {
2015-07-30 12:53:23 +03:00
. alg = " authenc(hmac(sha512),cbc(des3_ede)) " ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. test = alg_test_aead ,
2016-02-05 16:23:33 +03:00
. fips_allowed = 1 ,
crypto: testmgr - add aead cbc des, des3_ede tests
Test vectors were taken from existing test for
CBC(DES3_EDE). Associated data has been added to test vectors.
HMAC computed with Crypto++ has been used. Following algos have
been covered.
(a) "authenc(hmac(sha1),cbc(des))"
(b) "authenc(hmac(sha1),cbc(des3_ede))"
(c) "authenc(hmac(sha224),cbc(des))"
(d) "authenc(hmac(sha224),cbc(des3_ede))"
(e) "authenc(hmac(sha256),cbc(des))"
(f) "authenc(hmac(sha256),cbc(des3_ede))"
(g) "authenc(hmac(sha384),cbc(des))"
(h) "authenc(hmac(sha384),cbc(des3_ede))"
(i) "authenc(hmac(sha512),cbc(des))"
(j) "authenc(hmac(sha512),cbc(des3_ede))"
Signed-off-by: Vakul Garg <vakul@freescale.com>
[NiteshNarayanLal@freescale.com: added hooks for the missing algorithms test and tested the patch]
Signed-off-by: Nitesh Lal <NiteshNarayanLal@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-05-21 15:39:08 +04:00
. suite = {
. aead = {
. enc = {
. vecs =
hmac_sha512_des3_ede_cbc_enc_tv_temp ,
. count =
HMAC_SHA512_DES3_EDE_CBC_ENC_TEST_VEC
2012-07-03 20:16:54 +04:00
}
}
}
2016-02-06 13:53:07 +03:00
} , {
. alg = " authenc(hmac(sha512),ctr(aes)) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2016-02-19 15:34:28 +03:00
} , {
. alg = " authenc(hmac(sha512),rfc3686(ctr(aes))) " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
2009-05-04 15:46:29 +04:00
} , {
2008-07-31 13:08:25 +04:00
. alg = " cbc(aes) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = aes_cbc_enc_tv_template ,
. count = AES_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_cbc_dec_tv_template ,
. count = AES_CBC_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " cbc(anubis) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = anubis_cbc_enc_tv_template ,
. count = ANUBIS_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = anubis_cbc_dec_tv_template ,
. count = ANUBIS_CBC_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " cbc(blowfish) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = bf_cbc_enc_tv_template ,
. count = BF_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = bf_cbc_dec_tv_template ,
. count = BF_CBC_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " cbc(camellia) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = camellia_cbc_enc_tv_template ,
. count = CAMELLIA_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = camellia_cbc_dec_tv_template ,
. count = CAMELLIA_CBC_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:37:21 +04:00
} , {
. alg = " cbc(cast5) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast5_cbc_enc_tv_template ,
. count = CAST5_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast5_cbc_dec_tv_template ,
. count = CAST5_CBC_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:38:29 +04:00
} , {
. alg = " cbc(cast6) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast6_cbc_enc_tv_template ,
. count = CAST6_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast6_cbc_dec_tv_template ,
. count = CAST6_CBC_DEC_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " cbc(des) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = des_cbc_enc_tv_template ,
. count = DES_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des_cbc_dec_tv_template ,
. count = DES_CBC_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " cbc(des3_ede) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = des3_ede_cbc_enc_tv_template ,
. count = DES3_EDE_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des3_ede_cbc_dec_tv_template ,
. count = DES3_EDE_CBC_DEC_TEST_VECTORS
}
}
}
2011-10-18 01:02:53 +04:00
} , {
. alg = " cbc(serpent) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = serpent_cbc_enc_tv_template ,
. count = SERPENT_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = serpent_cbc_dec_tv_template ,
. count = SERPENT_CBC_DEC_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " cbc(twofish) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = tf_cbc_enc_tv_template ,
. count = TF_CBC_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tf_cbc_dec_tv_template ,
. count = TF_CBC_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ccm(aes) " ,
. test = alg_test_aead ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. aead = {
. enc = {
. vecs = aes_ccm_enc_tv_template ,
. count = AES_CCM_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_ccm_dec_tv_template ,
. count = AES_CCM_DEC_TEST_VECTORS
}
}
}
2015-06-01 14:43:57 +03:00
} , {
. alg = " chacha20 " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = chacha20_enc_tv_template ,
. count = CHACHA20_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = chacha20_enc_tv_template ,
. count = CHACHA20_ENC_TEST_VECTORS
} ,
}
}
2013-04-08 11:48:44 +04:00
} , {
. alg = " cmac(aes) " ,
2015-08-19 09:42:07 +03:00
. fips_allowed = 1 ,
2013-04-08 11:48:44 +04:00
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = aes_cmac128_tv_template ,
. count = CMAC_AES_TEST_VECTORS
}
}
} , {
. alg = " cmac(des3_ede) " ,
2015-08-19 09:42:07 +03:00
. fips_allowed = 1 ,
2013-04-08 11:48:44 +04:00
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = des3_ede_cmac64_tv_template ,
. count = CMAC_DES3_EDE_TEST_VECTORS
}
}
2013-04-07 17:43:56 +04:00
} , {
. alg = " compress_null " ,
. test = alg_test_null ,
2015-05-04 12:00:17 +03:00
} , {
. alg = " crc32 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = crc32_tv_template ,
. count = CRC32_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " crc32c " ,
2008-11-07 09:58:52 +03:00
. test = alg_test_crc32c ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = crc32c_tv_template ,
. count = CRC32C_TEST_VECTORS
}
}
2013-09-07 06:56:26 +04:00
} , {
. alg = " crct10dif " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = crct10dif_tv_template ,
. count = CRCT10DIF_TEST_VECTORS
}
}
2009-05-06 13:29:17 +04:00
} , {
. alg = " ctr(aes) " ,
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2009-05-06 13:29:17 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = aes_ctr_enc_tv_template ,
. count = AES_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_ctr_dec_tv_template ,
. count = AES_CTR_DEC_TEST_VECTORS
}
}
}
2011-10-11 00:03:03 +04:00
} , {
. alg = " ctr(blowfish) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = bf_ctr_enc_tv_template ,
. count = BF_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = bf_ctr_dec_tv_template ,
. count = BF_CTR_DEC_TEST_VECTORS
}
}
}
2012-03-05 22:26:21 +04:00
} , {
. alg = " ctr(camellia) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = camellia_ctr_enc_tv_template ,
. count = CAMELLIA_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = camellia_ctr_dec_tv_template ,
. count = CAMELLIA_CTR_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:37:21 +04:00
} , {
. alg = " ctr(cast5) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast5_ctr_enc_tv_template ,
. count = CAST5_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast5_ctr_dec_tv_template ,
. count = CAST5_CTR_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:38:29 +04:00
} , {
. alg = " ctr(cast6) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast6_ctr_enc_tv_template ,
. count = CAST6_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast6_ctr_dec_tv_template ,
. count = CAST6_CTR_DEC_TEST_VECTORS
}
}
}
2012-10-20 15:53:07 +04:00
} , {
. alg = " ctr(des) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = des_ctr_enc_tv_template ,
. count = DES_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des_ctr_dec_tv_template ,
. count = DES_CTR_DEC_TEST_VECTORS
}
}
}
2012-10-20 15:53:12 +04:00
} , {
. alg = " ctr(des3_ede) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = des3_ede_ctr_enc_tv_template ,
. count = DES3_EDE_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des3_ede_ctr_dec_tv_template ,
. count = DES3_EDE_CTR_DEC_TEST_VECTORS
}
}
}
2011-10-18 01:02:53 +04:00
} , {
. alg = " ctr(serpent) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = serpent_ctr_enc_tv_template ,
. count = SERPENT_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = serpent_ctr_dec_tv_template ,
. count = SERPENT_CTR_DEC_TEST_VECTORS
}
}
}
2011-10-11 00:03:12 +04:00
} , {
. alg = " ctr(twofish) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = tf_ctr_enc_tv_template ,
. count = TF_CTR_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tf_ctr_dec_tv_template ,
. count = TF_CTR_DEC_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " cts(cbc(aes)) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = cts_mode_enc_tv_template ,
. count = CTS_MODE_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cts_mode_dec_tv_template ,
. count = CTS_MODE_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " deflate " ,
. test = alg_test_comp ,
2012-12-06 13:16:28 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. comp = {
. comp = {
. vecs = deflate_comp_tv_template ,
. count = DEFLATE_COMP_TEST_VECTORS
} ,
. decomp = {
. vecs = deflate_decomp_tv_template ,
. count = DEFLATE_DECOMP_TEST_VECTORS
}
}
}
2016-06-22 19:49:14 +03:00
} , {
. alg = " dh " ,
. test = alg_test_kpp ,
. fips_allowed = 1 ,
. suite = {
. kpp = {
. vecs = dh_tv_template ,
. count = DH_TEST_VECTORS
}
}
2013-04-07 17:43:56 +04:00
} , {
. alg = " digest_null " ,
. test = alg_test_null ,
2014-05-31 19:25:36 +04:00
} , {
. alg = " drbg_nopr_ctr_aes128 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_nopr_ctr_aes128_tv_template ,
. count = ARRAY_SIZE ( drbg_nopr_ctr_aes128_tv_template )
}
}
} , {
. alg = " drbg_nopr_ctr_aes192 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_nopr_ctr_aes192_tv_template ,
. count = ARRAY_SIZE ( drbg_nopr_ctr_aes192_tv_template )
}
}
} , {
. alg = " drbg_nopr_ctr_aes256 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_nopr_ctr_aes256_tv_template ,
. count = ARRAY_SIZE ( drbg_nopr_ctr_aes256_tv_template )
}
}
} , {
/*
* There is no need to specifically test the DRBG with every
* backend cipher - - covered by drbg_nopr_hmac_sha256 test
*/
. alg = " drbg_nopr_hmac_sha1 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_nopr_hmac_sha256 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_nopr_hmac_sha256_tv_template ,
. count =
ARRAY_SIZE ( drbg_nopr_hmac_sha256_tv_template )
}
}
} , {
/* covered by drbg_nopr_hmac_sha256 test */
. alg = " drbg_nopr_hmac_sha384 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_nopr_hmac_sha512 " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
} , {
. alg = " drbg_nopr_sha1 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_nopr_sha256 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_nopr_sha256_tv_template ,
. count = ARRAY_SIZE ( drbg_nopr_sha256_tv_template )
}
}
} , {
/* covered by drbg_nopr_sha256 test */
. alg = " drbg_nopr_sha384 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_nopr_sha512 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_ctr_aes128 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_pr_ctr_aes128_tv_template ,
. count = ARRAY_SIZE ( drbg_pr_ctr_aes128_tv_template )
}
}
} , {
/* covered by drbg_pr_ctr_aes128 test */
. alg = " drbg_pr_ctr_aes192 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_ctr_aes256 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_hmac_sha1 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_hmac_sha256 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_pr_hmac_sha256_tv_template ,
. count = ARRAY_SIZE ( drbg_pr_hmac_sha256_tv_template )
}
}
} , {
/* covered by drbg_pr_hmac_sha256 test */
. alg = " drbg_pr_hmac_sha384 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_hmac_sha512 " ,
. test = alg_test_null ,
. fips_allowed = 1 ,
} , {
. alg = " drbg_pr_sha1 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_sha256 " ,
. test = alg_test_drbg ,
. fips_allowed = 1 ,
. suite = {
. drbg = {
. vecs = drbg_pr_sha256_tv_template ,
. count = ARRAY_SIZE ( drbg_pr_sha256_tv_template )
}
}
} , {
/* covered by drbg_pr_sha256 test */
. alg = " drbg_pr_sha384 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
} , {
. alg = " drbg_pr_sha512 " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
2008-07-31 13:08:25 +04:00
} , {
. alg = " ecb(aes) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = aes_enc_tv_template ,
. count = AES_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_dec_tv_template ,
. count = AES_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(anubis) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = anubis_enc_tv_template ,
. count = ANUBIS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = anubis_dec_tv_template ,
. count = ANUBIS_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(arc4) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = arc4_enc_tv_template ,
. count = ARC4_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = arc4_dec_tv_template ,
. count = ARC4_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(blowfish) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = bf_enc_tv_template ,
. count = BF_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = bf_dec_tv_template ,
. count = BF_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(camellia) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = camellia_enc_tv_template ,
. count = CAMELLIA_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = camellia_dec_tv_template ,
. count = CAMELLIA_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(cast5) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = cast5_enc_tv_template ,
. count = CAST5_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast5_dec_tv_template ,
. count = CAST5_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(cast6) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = cast6_enc_tv_template ,
. count = CAST6_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast6_dec_tv_template ,
. count = CAST6_DEC_TEST_VECTORS
}
}
}
2013-04-07 17:43:56 +04:00
} , {
. alg = " ecb(cipher_null) " ,
. test = alg_test_null ,
2008-07-31 13:08:25 +04:00
} , {
. alg = " ecb(des) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = des_enc_tv_template ,
. count = DES_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des_dec_tv_template ,
. count = DES_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(des3_ede) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = des3_ede_enc_tv_template ,
. count = DES3_EDE_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = des3_ede_dec_tv_template ,
. count = DES3_EDE_DEC_TEST_VECTORS
}
}
}
2013-01-19 15:31:36 +04:00
} , {
. alg = " ecb(fcrypt) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = fcrypt_pcbc_enc_tv_template ,
. count = 1
} ,
. dec = {
. vecs = fcrypt_pcbc_dec_tv_template ,
. count = 1
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " ecb(khazad) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = khazad_enc_tv_template ,
. count = KHAZAD_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = khazad_dec_tv_template ,
. count = KHAZAD_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(seed) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = seed_enc_tv_template ,
. count = SEED_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = seed_dec_tv_template ,
. count = SEED_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(serpent) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = serpent_enc_tv_template ,
. count = SERPENT_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = serpent_dec_tv_template ,
. count = SERPENT_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(tea) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = tea_enc_tv_template ,
. count = TEA_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tea_dec_tv_template ,
. count = TEA_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(tnepres) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = tnepres_enc_tv_template ,
. count = TNEPRES_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tnepres_dec_tv_template ,
. count = TNEPRES_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(twofish) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = tf_enc_tv_template ,
. count = TF_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tf_dec_tv_template ,
. count = TF_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(xeta) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = xeta_enc_tv_template ,
. count = XETA_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = xeta_dec_tv_template ,
. count = XETA_DEC_TEST_VECTORS
}
}
}
} , {
. alg = " ecb(xtea) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = xtea_enc_tv_template ,
. count = XTEA_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = xtea_dec_tv_template ,
. count = XTEA_DEC_TEST_VECTORS
}
}
}
2016-06-22 19:49:15 +03:00
} , {
. alg = " ecdh " ,
. test = alg_test_kpp ,
. fips_allowed = 1 ,
. suite = {
. kpp = {
. vecs = ecdh_tv_template ,
. count = ECDH_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " gcm(aes) " ,
. test = alg_test_aead ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. aead = {
. enc = {
. vecs = aes_gcm_enc_tv_template ,
. count = AES_GCM_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_gcm_dec_tv_template ,
. count = AES_GCM_DEC_TEST_VECTORS
}
}
}
2009-11-23 15:23:04 +03:00
} , {
. alg = " ghash " ,
. test = alg_test_hash ,
crypto: testmgr - mark ghash as fips_allowed
A self-test failure in fips mode means a panic. Well, gcm(aes)
self-tests currently fail in fips mode, as gcm is dependent on ghash,
which semi-recently got self-test vectors added, but wasn't marked as a
fips_allowed algorithm. Because of gcm's dependence on what is now seen
as a non-fips_allowed algorithm, its self-tests refuse to run.
Previously, ghash got a pass in fips mode, due to the lack of any test
vectors at all, and thus gcm self-tests were able to run. After this
patch, a 'modprobe tcrypt mode=35' no longer panics in fips mode, and
successful self-test of gcm(aes) is reported.
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2011-01-29 07:14:35 +03:00
. fips_allowed = 1 ,
2009-11-23 15:23:04 +03:00
. suite = {
. hash = {
. vecs = ghash_tv_template ,
. count = GHASH_TEST_VECTORS
}
}
2012-05-25 13:54:13 +04:00
} , {
. alg = " hmac(crc32) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = bfin_crc_tv_template ,
. count = BFIN_CRC_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " hmac(md5) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = hmac_md5_tv_template ,
. count = HMAC_MD5_TEST_VECTORS
}
}
} , {
. alg = " hmac(rmd128) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = hmac_rmd128_tv_template ,
. count = HMAC_RMD128_TEST_VECTORS
}
}
} , {
. alg = " hmac(rmd160) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = hmac_rmd160_tv_template ,
. count = HMAC_RMD160_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha1) " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = hmac_sha1_tv_template ,
. count = HMAC_SHA1_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha224) " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = hmac_sha224_tv_template ,
. count = HMAC_SHA224_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha256) " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = hmac_sha256_tv_template ,
. count = HMAC_SHA256_TEST_VECTORS
}
}
2016-07-01 08:46:54 +03:00
} , {
. alg = " hmac(sha3-224) " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = hmac_sha3_224_tv_template ,
. count = HMAC_SHA3_224_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha3-256) " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = hmac_sha3_256_tv_template ,
. count = HMAC_SHA3_256_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha3-384) " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = hmac_sha3_384_tv_template ,
. count = HMAC_SHA3_384_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha3-512) " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = hmac_sha3_512_tv_template ,
. count = HMAC_SHA3_512_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " hmac(sha384) " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = hmac_sha384_tv_template ,
. count = HMAC_SHA384_TEST_VECTORS
}
}
} , {
. alg = " hmac(sha512) " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = hmac_sha512_tv_template ,
. count = HMAC_SHA512_TEST_VECTORS
}
}
2015-05-25 16:10:20 +03:00
} , {
. alg = " jitterentropy_rng " ,
. fips_allowed = 1 ,
. test = alg_test_null ,
2015-09-21 21:59:56 +03:00
} , {
. alg = " kw(aes) " ,
. test = alg_test_skcipher ,
. fips_allowed = 1 ,
. suite = {
. cipher = {
. enc = {
. vecs = aes_kw_enc_tv_template ,
. count = ARRAY_SIZE ( aes_kw_enc_tv_template )
} ,
. dec = {
. vecs = aes_kw_dec_tv_template ,
. count = ARRAY_SIZE ( aes_kw_dec_tv_template )
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " lrw(aes) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = aes_lrw_enc_tv_template ,
. count = AES_LRW_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_lrw_dec_tv_template ,
. count = AES_LRW_DEC_TEST_VECTORS
}
}
}
2012-03-05 22:26:21 +04:00
} , {
. alg = " lrw(camellia) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = camellia_lrw_enc_tv_template ,
. count = CAMELLIA_LRW_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = camellia_lrw_dec_tv_template ,
. count = CAMELLIA_LRW_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:38:29 +04:00
} , {
. alg = " lrw(cast6) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast6_lrw_enc_tv_template ,
. count = CAST6_LRW_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast6_lrw_dec_tv_template ,
. count = CAST6_LRW_DEC_TEST_VECTORS
}
}
}
2011-10-18 14:32:34 +04:00
} , {
. alg = " lrw(serpent) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = serpent_lrw_enc_tv_template ,
. count = SERPENT_LRW_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = serpent_lrw_dec_tv_template ,
. count = SERPENT_LRW_DEC_TEST_VECTORS
}
}
}
2011-10-18 14:32:50 +04:00
} , {
. alg = " lrw(twofish) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = tf_lrw_enc_tv_template ,
. count = TF_LRW_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tf_lrw_dec_tv_template ,
. count = TF_LRW_DEC_TEST_VECTORS
}
}
}
2014-08-22 12:44:36 +04:00
} , {
. alg = " lz4 " ,
. test = alg_test_comp ,
. fips_allowed = 1 ,
. suite = {
. comp = {
. comp = {
. vecs = lz4_comp_tv_template ,
. count = LZ4_COMP_TEST_VECTORS
} ,
. decomp = {
. vecs = lz4_decomp_tv_template ,
. count = LZ4_DECOMP_TEST_VECTORS
}
}
}
} , {
. alg = " lz4hc " ,
. test = alg_test_comp ,
. fips_allowed = 1 ,
. suite = {
. comp = {
. comp = {
. vecs = lz4hc_comp_tv_template ,
. count = LZ4HC_COMP_TEST_VECTORS
} ,
. decomp = {
. vecs = lz4hc_decomp_tv_template ,
. count = LZ4HC_DECOMP_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " lzo " ,
. test = alg_test_comp ,
2012-12-06 13:16:28 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. comp = {
. comp = {
. vecs = lzo_comp_tv_template ,
. count = LZO_COMP_TEST_VECTORS
} ,
. decomp = {
. vecs = lzo_decomp_tv_template ,
. count = LZO_DECOMP_TEST_VECTORS
}
}
}
} , {
. alg = " md4 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = md4_tv_template ,
. count = MD4_TEST_VECTORS
}
}
} , {
. alg = " md5 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = md5_tv_template ,
. count = MD5_TEST_VECTORS
}
}
} , {
. alg = " michael_mic " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = michael_mic_tv_template ,
. count = MICHAEL_MIC_TEST_VECTORS
}
}
2011-05-04 09:04:10 +04:00
} , {
. alg = " ofb(aes) " ,
. test = alg_test_skcipher ,
. fips_allowed = 1 ,
. suite = {
. cipher = {
. enc = {
. vecs = aes_ofb_enc_tv_template ,
. count = AES_OFB_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_ofb_dec_tv_template ,
. count = AES_OFB_DEC_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " pcbc(fcrypt) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = fcrypt_pcbc_enc_tv_template ,
. count = FCRYPT_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = fcrypt_pcbc_dec_tv_template ,
. count = FCRYPT_DEC_TEST_VECTORS
}
}
}
2015-06-01 14:43:59 +03:00
} , {
. alg = " poly1305 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = poly1305_tv_template ,
. count = POLY1305_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " rfc3686(ctr(aes)) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
2009-05-06 13:29:17 +04:00
. vecs = aes_ctr_rfc3686_enc_tv_template ,
. count = AES_CTR_3686_ENC_TEST_VECTORS
2008-07-31 13:08:25 +04:00
} ,
. dec = {
2009-05-06 13:29:17 +04:00
. vecs = aes_ctr_rfc3686_dec_tv_template ,
. count = AES_CTR_3686_DEC_TEST_VECTORS
2008-07-31 13:08:25 +04:00
}
}
}
2009-05-04 15:23:40 +04:00
} , {
2015-07-09 02:17:34 +03:00
. alg = " rfc4106(gcm(aes)) " ,
2010-11-04 22:02:04 +03:00
. test = alg_test_aead ,
2015-01-23 20:42:15 +03:00
. fips_allowed = 1 ,
2010-11-04 22:02:04 +03:00
. suite = {
. aead = {
. enc = {
. vecs = aes_gcm_rfc4106_enc_tv_template ,
. count = AES_GCM_4106_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_gcm_rfc4106_dec_tv_template ,
. count = AES_GCM_4106_DEC_TEST_VECTORS
}
}
}
} , {
2015-07-14 11:53:22 +03:00
. alg = " rfc4309(ccm(aes)) " ,
2009-05-04 15:23:40 +04:00
. test = alg_test_aead ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2009-05-04 15:23:40 +04:00
. suite = {
. aead = {
. enc = {
. vecs = aes_ccm_rfc4309_enc_tv_template ,
. count = AES_CCM_4309_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_ccm_rfc4309_dec_tv_template ,
. count = AES_CCM_4309_DEC_TEST_VECTORS
}
}
}
2013-04-07 17:43:51 +04:00
} , {
2015-06-16 08:54:24 +03:00
. alg = " rfc4543(gcm(aes)) " ,
2013-04-07 17:43:51 +04:00
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs = aes_gcm_rfc4543_enc_tv_template ,
. count = AES_GCM_4543_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_gcm_rfc4543_dec_tv_template ,
. count = AES_GCM_4543_DEC_TEST_VECTORS
} ,
}
}
2015-06-01 14:44:01 +03:00
} , {
. alg = " rfc7539(chacha20,poly1305) " ,
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs = rfc7539_enc_tv_template ,
. count = RFC7539_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = rfc7539_dec_tv_template ,
. count = RFC7539_DEC_TEST_VECTORS
} ,
}
}
2015-06-01 14:44:03 +03:00
} , {
. alg = " rfc7539esp(chacha20,poly1305) " ,
. test = alg_test_aead ,
. suite = {
. aead = {
. enc = {
. vecs = rfc7539esp_enc_tv_template ,
. count = RFC7539ESP_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = rfc7539esp_dec_tv_template ,
. count = RFC7539ESP_DEC_TEST_VECTORS
} ,
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " rmd128 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = rmd128_tv_template ,
. count = RMD128_TEST_VECTORS
}
}
} , {
. alg = " rmd160 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = rmd160_tv_template ,
. count = RMD160_TEST_VECTORS
}
}
} , {
. alg = " rmd256 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = rmd256_tv_template ,
. count = RMD256_TEST_VECTORS
}
}
} , {
. alg = " rmd320 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = rmd320_tv_template ,
. count = RMD320_TEST_VECTORS
}
}
2015-06-16 20:31:06 +03:00
} , {
. alg = " rsa " ,
. test = alg_test_akcipher ,
. fips_allowed = 1 ,
. suite = {
. akcipher = {
. vecs = rsa_tv_template ,
. count = RSA_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " salsa20 " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = salsa20_stream_enc_tv_template ,
. count = SALSA20_STREAM_ENC_TEST_VECTORS
}
}
}
} , {
. alg = " sha1 " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = sha1_tv_template ,
. count = SHA1_TEST_VECTORS
}
}
} , {
. alg = " sha224 " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = sha224_tv_template ,
. count = SHA224_TEST_VECTORS
}
}
} , {
. alg = " sha256 " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = sha256_tv_template ,
. count = SHA256_TEST_VECTORS
}
}
2016-06-17 08:00:36 +03:00
} , {
. alg = " sha3-224 " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = sha3_224_tv_template ,
. count = SHA3_224_TEST_VECTORS
}
}
} , {
. alg = " sha3-256 " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = sha3_256_tv_template ,
. count = SHA3_256_TEST_VECTORS
}
}
} , {
. alg = " sha3-384 " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = sha3_384_tv_template ,
. count = SHA3_384_TEST_VECTORS
}
}
} , {
. alg = " sha3-512 " ,
. test = alg_test_hash ,
. fips_allowed = 1 ,
. suite = {
. hash = {
. vecs = sha3_512_tv_template ,
. count = SHA3_512_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " sha384 " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = sha384_tv_template ,
. count = SHA384_TEST_VECTORS
}
}
} , {
. alg = " sha512 " ,
. test = alg_test_hash ,
2009-05-15 09:16:03 +04:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. hash = {
. vecs = sha512_tv_template ,
. count = SHA512_TEST_VECTORS
}
}
} , {
. alg = " tgr128 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = tgr128_tv_template ,
. count = TGR128_TEST_VECTORS
}
}
} , {
. alg = " tgr160 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = tgr160_tv_template ,
. count = TGR160_TEST_VECTORS
}
}
} , {
. alg = " tgr192 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = tgr192_tv_template ,
. count = TGR192_TEST_VECTORS
}
}
2009-09-02 14:05:22 +04:00
} , {
. alg = " vmac(aes) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = aes_vmac128_tv_template ,
. count = VMAC_AES_TEST_VECTORS
}
}
2008-07-31 13:08:25 +04:00
} , {
. alg = " wp256 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = wp256_tv_template ,
. count = WP256_TEST_VECTORS
}
}
} , {
. alg = " wp384 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = wp384_tv_template ,
. count = WP384_TEST_VECTORS
}
}
} , {
. alg = " wp512 " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = wp512_tv_template ,
. count = WP512_TEST_VECTORS
}
}
} , {
. alg = " xcbc(aes) " ,
. test = alg_test_hash ,
. suite = {
. hash = {
. vecs = aes_xcbc128_tv_template ,
. count = XCBC_AES_TEST_VECTORS
}
}
} , {
. alg = " xts(aes) " ,
2008-08-17 11:01:56 +04:00
. test = alg_test_skcipher ,
2011-01-29 07:14:01 +03:00
. fips_allowed = 1 ,
2008-07-31 13:08:25 +04:00
. suite = {
. cipher = {
. enc = {
. vecs = aes_xts_enc_tv_template ,
. count = AES_XTS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = aes_xts_dec_tv_template ,
. count = AES_XTS_DEC_TEST_VECTORS
}
}
}
2012-03-05 22:26:21 +04:00
} , {
. alg = " xts(camellia) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = camellia_xts_enc_tv_template ,
. count = CAMELLIA_XTS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = camellia_xts_dec_tv_template ,
. count = CAMELLIA_XTS_DEC_TEST_VECTORS
}
}
}
2012-07-11 21:38:29 +04:00
} , {
. alg = " xts(cast6) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = cast6_xts_enc_tv_template ,
. count = CAST6_XTS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = cast6_xts_dec_tv_template ,
. count = CAST6_XTS_DEC_TEST_VECTORS
}
}
}
2011-10-18 14:33:17 +04:00
} , {
. alg = " xts(serpent) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = serpent_xts_enc_tv_template ,
. count = SERPENT_XTS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = serpent_xts_dec_tv_template ,
. count = SERPENT_XTS_DEC_TEST_VECTORS
}
}
}
2011-10-18 14:33:33 +04:00
} , {
. alg = " xts(twofish) " ,
. test = alg_test_skcipher ,
. suite = {
. cipher = {
. enc = {
. vecs = tf_xts_enc_tv_template ,
. count = TF_XTS_ENC_TEST_VECTORS
} ,
. dec = {
. vecs = tf_xts_dec_tv_template ,
. count = TF_XTS_DEC_TEST_VECTORS
}
}
}
2008-07-31 13:08:25 +04:00
}
} ;
2013-06-13 18:37:40 +04:00
static bool alg_test_descs_checked ;
static void alg_test_descs_check_order ( void )
{
int i ;
/* only check once */
if ( alg_test_descs_checked )
return ;
alg_test_descs_checked = true ;
for ( i = 1 ; i < ARRAY_SIZE ( alg_test_descs ) ; i + + ) {
int diff = strcmp ( alg_test_descs [ i - 1 ] . alg ,
alg_test_descs [ i ] . alg ) ;
if ( WARN_ON ( diff > 0 ) ) {
pr_warn ( " testmgr: alg_test_descs entries in wrong order: '%s' before '%s' \n " ,
alg_test_descs [ i - 1 ] . alg ,
alg_test_descs [ i ] . alg ) ;
}
if ( WARN_ON ( diff = = 0 ) ) {
pr_warn ( " testmgr: duplicate alg_test_descs entry: '%s' \n " ,
alg_test_descs [ i ] . alg ) ;
}
}
}
2008-08-17 11:01:56 +04:00
static int alg_find_test ( const char * alg )
2008-07-31 13:08:25 +04:00
{
int start = 0 ;
int end = ARRAY_SIZE ( alg_test_descs ) ;
while ( start < end ) {
int i = ( start + end ) / 2 ;
int diff = strcmp ( alg_test_descs [ i ] . alg , alg ) ;
if ( diff > 0 ) {
end = i ;
continue ;
}
if ( diff < 0 ) {
start = i + 1 ;
continue ;
}
2008-08-17 11:01:56 +04:00
return i ;
}
return - 1 ;
}
int alg_test ( const char * driver , const char * alg , u32 type , u32 mask )
{
int i ;
2009-07-02 12:32:12 +04:00
int j ;
2008-10-12 16:36:51 +04:00
int rc ;
2008-08-17 11:01:56 +04:00
2016-05-03 12:00:17 +03:00
if ( ! fips_enabled & & notests ) {
printk_once ( KERN_INFO " alg: self-tests disabled \n " ) ;
return 0 ;
}
2013-06-13 18:37:40 +04:00
alg_test_descs_check_order ( ) ;
2008-08-17 11:01:56 +04:00
if ( ( type & CRYPTO_ALG_TYPE_MASK ) = = CRYPTO_ALG_TYPE_CIPHER ) {
char nalg [ CRYPTO_MAX_ALG_NAME ] ;
if ( snprintf ( nalg , sizeof ( nalg ) , " ecb(%s) " , alg ) > =
sizeof ( nalg ) )
return - ENAMETOOLONG ;
i = alg_find_test ( nalg ) ;
if ( i < 0 )
goto notest ;
2009-05-15 09:17:05 +04:00
if ( fips_enabled & & ! alg_test_descs [ i ] . fips_allowed )
goto non_fips_alg ;
2009-05-04 15:49:23 +04:00
rc = alg_test_cipher ( alg_test_descs + i , driver , type , mask ) ;
goto test_done ;
2008-07-31 13:08:25 +04:00
}
2008-08-17 11:01:56 +04:00
i = alg_find_test ( alg ) ;
2009-07-02 12:32:12 +04:00
j = alg_find_test ( driver ) ;
if ( i < 0 & & j < 0 )
2008-08-17 11:01:56 +04:00
goto notest ;
2009-07-02 12:32:12 +04:00
if ( fips_enabled & & ( ( i > = 0 & & ! alg_test_descs [ i ] . fips_allowed ) | |
( j > = 0 & & ! alg_test_descs [ j ] . fips_allowed ) ) )
2009-05-15 09:17:05 +04:00
goto non_fips_alg ;
2009-07-02 12:32:12 +04:00
rc = 0 ;
if ( i > = 0 )
rc | = alg_test_descs [ i ] . test ( alg_test_descs + i , driver ,
type , mask ) ;
2013-07-18 19:57:07 +04:00
if ( j > = 0 & & j ! = i )
2009-07-02 12:32:12 +04:00
rc | = alg_test_descs [ j ] . test ( alg_test_descs + j , driver ,
type , mask ) ;
2009-05-04 15:49:23 +04:00
test_done :
2008-10-12 16:36:51 +04:00
if ( fips_enabled & & rc )
panic ( " %s: %s alg self test failed in fips mode! \n " , driver , alg ) ;
2009-05-04 15:51:17 +04:00
if ( fips_enabled & & ! rc )
2014-10-06 19:37:54 +04:00
pr_info ( " alg: self-tests for %s (%s) passed \n " , driver , alg ) ;
2009-05-04 15:51:17 +04:00
2008-10-12 16:36:51 +04:00
return rc ;
2008-08-17 11:01:56 +04:00
notest :
2008-07-31 13:08:25 +04:00
printk ( KERN_INFO " alg: No test for %s (%s) \n " , alg , driver ) ;
return 0 ;
2009-05-15 09:17:05 +04:00
non_fips_alg :
return - EINVAL ;
2008-07-31 13:08:25 +04:00
}
2010-06-03 14:53:43 +04:00
2010-08-06 05:40:28 +04:00
# endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */
2010-06-03 14:53:43 +04:00
2008-07-31 13:08:25 +04:00
EXPORT_SYMBOL_GPL ( alg_test ) ;