Merge tag 'dm-3.17-changes' of git://git.kernel.org/pub/scm/linux/kernel/git/device...
[pandora-kernel.git] / crypto / testmgr.c
1 /*
2  * Algorithm testing framework and tests.
3  *
4  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6  * Copyright (c) 2007 Nokia Siemens Networks
7  * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8  *
9  * Updated RFC4106 AES-GCM testing.
10  *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
11  *             Adrian Hoban <adrian.hoban@intel.com>
12  *             Gabriele Paoloni <gabriele.paoloni@intel.com>
13  *             Tadeusz Struk (tadeusz.struk@intel.com)
14  *    Copyright (c) 2010, Intel Corporation.
15  *
16  * This program is free software; you can redistribute it and/or modify it
17  * under the terms of the GNU General Public License as published by the Free
18  * Software Foundation; either version 2 of the License, or (at your option)
19  * any later version.
20  *
21  */
22
23 #include <crypto/hash.h>
24 #include <linux/err.h>
25 #include <linux/module.h>
26 #include <linux/scatterlist.h>
27 #include <linux/slab.h>
28 #include <linux/string.h>
29 #include <crypto/rng.h>
30 #include <crypto/drbg.h>
31
32 #include "internal.h"
33
34 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
35
36 /* a perfect nop */
37 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
38 {
39         return 0;
40 }
41
42 #else
43
44 #include "testmgr.h"
45
46 /*
47  * Need slab memory for testing (size in number of pages).
48  */
49 #define XBUFSIZE        8
50
51 /*
52  * Indexes into the xbuf to simulate cross-page access.
53  */
54 #define IDX1            32
55 #define IDX2            32400
56 #define IDX3            1
57 #define IDX4            8193
58 #define IDX5            22222
59 #define IDX6            17101
60 #define IDX7            27333
61 #define IDX8            3000
62
63 /*
64 * Used by test_cipher()
65 */
66 #define ENCRYPT 1
67 #define DECRYPT 0
68
69 struct tcrypt_result {
70         struct completion completion;
71         int err;
72 };
73
74 struct aead_test_suite {
75         struct {
76                 struct aead_testvec *vecs;
77                 unsigned int count;
78         } enc, dec;
79 };
80
81 struct cipher_test_suite {
82         struct {
83                 struct cipher_testvec *vecs;
84                 unsigned int count;
85         } enc, dec;
86 };
87
88 struct comp_test_suite {
89         struct {
90                 struct comp_testvec *vecs;
91                 unsigned int count;
92         } comp, decomp;
93 };
94
95 struct pcomp_test_suite {
96         struct {
97                 struct pcomp_testvec *vecs;
98                 unsigned int count;
99         } comp, decomp;
100 };
101
102 struct hash_test_suite {
103         struct hash_testvec *vecs;
104         unsigned int count;
105 };
106
107 struct cprng_test_suite {
108         struct cprng_testvec *vecs;
109         unsigned int count;
110 };
111
112 struct drbg_test_suite {
113         struct drbg_testvec *vecs;
114         unsigned int count;
115 };
116
117 struct alg_test_desc {
118         const char *alg;
119         int (*test)(const struct alg_test_desc *desc, const char *driver,
120                     u32 type, u32 mask);
121         int fips_allowed;       /* set if alg is allowed in fips mode */
122
123         union {
124                 struct aead_test_suite aead;
125                 struct cipher_test_suite cipher;
126                 struct comp_test_suite comp;
127                 struct pcomp_test_suite pcomp;
128                 struct hash_test_suite hash;
129                 struct cprng_test_suite cprng;
130                 struct drbg_test_suite drbg;
131         } suite;
132 };
133
134 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
135
136 static void hexdump(unsigned char *buf, unsigned int len)
137 {
138         print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
139                         16, 1,
140                         buf, len, false);
141 }
142
143 static void tcrypt_complete(struct crypto_async_request *req, int err)
144 {
145         struct tcrypt_result *res = req->data;
146
147         if (err == -EINPROGRESS)
148                 return;
149
150         res->err = err;
151         complete(&res->completion);
152 }
153
154 static int testmgr_alloc_buf(char *buf[XBUFSIZE])
155 {
156         int i;
157
158         for (i = 0; i < XBUFSIZE; i++) {
159                 buf[i] = (void *)__get_free_page(GFP_KERNEL);
160                 if (!buf[i])
161                         goto err_free_buf;
162         }
163
164         return 0;
165
166 err_free_buf:
167         while (i-- > 0)
168                 free_page((unsigned long)buf[i]);
169
170         return -ENOMEM;
171 }
172
173 static void testmgr_free_buf(char *buf[XBUFSIZE])
174 {
175         int i;
176
177         for (i = 0; i < XBUFSIZE; i++)
178                 free_page((unsigned long)buf[i]);
179 }
180
181 static int do_one_async_hash_op(struct ahash_request *req,
182                                 struct tcrypt_result *tr,
183                                 int ret)
184 {
185         if (ret == -EINPROGRESS || ret == -EBUSY) {
186                 ret = wait_for_completion_interruptible(&tr->completion);
187                 if (!ret)
188                         ret = tr->err;
189                 reinit_completion(&tr->completion);
190         }
191         return ret;
192 }
193
194 static int __test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
195                        unsigned int tcount, bool use_digest,
196                        const int align_offset)
197 {
198         const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm));
199         unsigned int i, j, k, temp;
200         struct scatterlist sg[8];
201         char *result;
202         char *key;
203         struct ahash_request *req;
204         struct tcrypt_result tresult;
205         void *hash_buff;
206         char *xbuf[XBUFSIZE];
207         int ret = -ENOMEM;
208
209         result = kmalloc(MAX_DIGEST_SIZE, GFP_KERNEL);
210         if (!result)
211                 return ret;
212         key = kmalloc(MAX_KEYLEN, GFP_KERNEL);
213         if (!key)
214                 goto out_nobuf;
215         if (testmgr_alloc_buf(xbuf))
216                 goto out_nobuf;
217
218         init_completion(&tresult.completion);
219
220         req = ahash_request_alloc(tfm, GFP_KERNEL);
221         if (!req) {
222                 printk(KERN_ERR "alg: hash: Failed to allocate request for "
223                        "%s\n", algo);
224                 goto out_noreq;
225         }
226         ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
227                                    tcrypt_complete, &tresult);
228
229         j = 0;
230         for (i = 0; i < tcount; i++) {
231                 if (template[i].np)
232                         continue;
233
234                 ret = -EINVAL;
235                 if (WARN_ON(align_offset + template[i].psize > PAGE_SIZE))
236                         goto out;
237
238                 j++;
239                 memset(result, 0, MAX_DIGEST_SIZE);
240
241                 hash_buff = xbuf[0];
242                 hash_buff += align_offset;
243
244                 memcpy(hash_buff, template[i].plaintext, template[i].psize);
245                 sg_init_one(&sg[0], hash_buff, template[i].psize);
246
247                 if (template[i].ksize) {
248                         crypto_ahash_clear_flags(tfm, ~0);
249                         if (template[i].ksize > MAX_KEYLEN) {
250                                 pr_err("alg: hash: setkey failed on test %d for %s: key size %d > %d\n",
251                                        j, algo, template[i].ksize, MAX_KEYLEN);
252                                 ret = -EINVAL;
253                                 goto out;
254                         }
255                         memcpy(key, template[i].key, template[i].ksize);
256                         ret = crypto_ahash_setkey(tfm, key, template[i].ksize);
257                         if (ret) {
258                                 printk(KERN_ERR "alg: hash: setkey failed on "
259                                        "test %d for %s: ret=%d\n", j, algo,
260                                        -ret);
261                                 goto out;
262                         }
263                 }
264
265                 ahash_request_set_crypt(req, sg, result, template[i].psize);
266                 if (use_digest) {
267                         ret = do_one_async_hash_op(req, &tresult,
268                                                    crypto_ahash_digest(req));
269                         if (ret) {
270                                 pr_err("alg: hash: digest failed on test %d "
271                                        "for %s: ret=%d\n", j, algo, -ret);
272                                 goto out;
273                         }
274                 } else {
275                         ret = do_one_async_hash_op(req, &tresult,
276                                                    crypto_ahash_init(req));
277                         if (ret) {
278                                 pr_err("alt: hash: init failed on test %d "
279                                        "for %s: ret=%d\n", j, algo, -ret);
280                                 goto out;
281                         }
282                         ret = do_one_async_hash_op(req, &tresult,
283                                                    crypto_ahash_update(req));
284                         if (ret) {
285                                 pr_err("alt: hash: update failed on test %d "
286                                        "for %s: ret=%d\n", j, algo, -ret);
287                                 goto out;
288                         }
289                         ret = do_one_async_hash_op(req, &tresult,
290                                                    crypto_ahash_final(req));
291                         if (ret) {
292                                 pr_err("alt: hash: final failed on test %d "
293                                        "for %s: ret=%d\n", j, algo, -ret);
294                                 goto out;
295                         }
296                 }
297
298                 if (memcmp(result, template[i].digest,
299                            crypto_ahash_digestsize(tfm))) {
300                         printk(KERN_ERR "alg: hash: Test %d failed for %s\n",
301                                j, algo);
302                         hexdump(result, crypto_ahash_digestsize(tfm));
303                         ret = -EINVAL;
304                         goto out;
305                 }
306         }
307
308         j = 0;
309         for (i = 0; i < tcount; i++) {
310                 /* alignment tests are only done with continuous buffers */
311                 if (align_offset != 0)
312                         break;
313
314                 if (template[i].np) {
315                         j++;
316                         memset(result, 0, MAX_DIGEST_SIZE);
317
318                         temp = 0;
319                         sg_init_table(sg, template[i].np);
320                         ret = -EINVAL;
321                         for (k = 0; k < template[i].np; k++) {
322                                 if (WARN_ON(offset_in_page(IDX[k]) +
323                                             template[i].tap[k] > PAGE_SIZE))
324                                         goto out;
325                                 sg_set_buf(&sg[k],
326                                            memcpy(xbuf[IDX[k] >> PAGE_SHIFT] +
327                                                   offset_in_page(IDX[k]),
328                                                   template[i].plaintext + temp,
329                                                   template[i].tap[k]),
330                                            template[i].tap[k]);
331                                 temp += template[i].tap[k];
332                         }
333
334                         if (template[i].ksize) {
335                                 if (template[i].ksize > MAX_KEYLEN) {
336                                         pr_err("alg: hash: setkey failed on test %d for %s: key size %d > %d\n",
337                                                j, algo, template[i].ksize,
338                                                MAX_KEYLEN);
339                                         ret = -EINVAL;
340                                         goto out;
341                                 }
342                                 crypto_ahash_clear_flags(tfm, ~0);
343                                 memcpy(key, template[i].key, template[i].ksize);
344                                 ret = crypto_ahash_setkey(tfm, key,
345                                                           template[i].ksize);
346
347                                 if (ret) {
348                                         printk(KERN_ERR "alg: hash: setkey "
349                                                "failed on chunking test %d "
350                                                "for %s: ret=%d\n", j, algo,
351                                                -ret);
352                                         goto out;
353                                 }
354                         }
355
356                         ahash_request_set_crypt(req, sg, result,
357                                                 template[i].psize);
358                         ret = crypto_ahash_digest(req);
359                         switch (ret) {
360                         case 0:
361                                 break;
362                         case -EINPROGRESS:
363                         case -EBUSY:
364                                 ret = wait_for_completion_interruptible(
365                                         &tresult.completion);
366                                 if (!ret && !(ret = tresult.err)) {
367                                         reinit_completion(&tresult.completion);
368                                         break;
369                                 }
370                                 /* fall through */
371                         default:
372                                 printk(KERN_ERR "alg: hash: digest failed "
373                                        "on chunking test %d for %s: "
374                                        "ret=%d\n", j, algo, -ret);
375                                 goto out;
376                         }
377
378                         if (memcmp(result, template[i].digest,
379                                    crypto_ahash_digestsize(tfm))) {
380                                 printk(KERN_ERR "alg: hash: Chunking test %d "
381                                        "failed for %s\n", j, algo);
382                                 hexdump(result, crypto_ahash_digestsize(tfm));
383                                 ret = -EINVAL;
384                                 goto out;
385                         }
386                 }
387         }
388
389         ret = 0;
390
391 out:
392         ahash_request_free(req);
393 out_noreq:
394         testmgr_free_buf(xbuf);
395 out_nobuf:
396         kfree(key);
397         kfree(result);
398         return ret;
399 }
400
401 static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
402                      unsigned int tcount, bool use_digest)
403 {
404         unsigned int alignmask;
405         int ret;
406
407         ret = __test_hash(tfm, template, tcount, use_digest, 0);
408         if (ret)
409                 return ret;
410
411         /* test unaligned buffers, check with one byte offset */
412         ret = __test_hash(tfm, template, tcount, use_digest, 1);
413         if (ret)
414                 return ret;
415
416         alignmask = crypto_tfm_alg_alignmask(&tfm->base);
417         if (alignmask) {
418                 /* Check if alignment mask for tfm is correctly set. */
419                 ret = __test_hash(tfm, template, tcount, use_digest,
420                                   alignmask + 1);
421                 if (ret)
422                         return ret;
423         }
424
425         return 0;
426 }
427
428 static int __test_aead(struct crypto_aead *tfm, int enc,
429                        struct aead_testvec *template, unsigned int tcount,
430                        const bool diff_dst, const int align_offset)
431 {
432         const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm));
433         unsigned int i, j, k, n, temp;
434         int ret = -ENOMEM;
435         char *q;
436         char *key;
437         struct aead_request *req;
438         struct scatterlist *sg;
439         struct scatterlist *asg;
440         struct scatterlist *sgout;
441         const char *e, *d;
442         struct tcrypt_result result;
443         unsigned int authsize;
444         void *input;
445         void *output;
446         void *assoc;
447         char *iv;
448         char *xbuf[XBUFSIZE];
449         char *xoutbuf[XBUFSIZE];
450         char *axbuf[XBUFSIZE];
451
452         iv = kzalloc(MAX_IVLEN, GFP_KERNEL);
453         if (!iv)
454                 return ret;
455         key = kmalloc(MAX_KEYLEN, GFP_KERNEL);
456         if (!key)
457                 goto out_noxbuf;
458         if (testmgr_alloc_buf(xbuf))
459                 goto out_noxbuf;
460         if (testmgr_alloc_buf(axbuf))
461                 goto out_noaxbuf;
462         if (diff_dst && testmgr_alloc_buf(xoutbuf))
463                 goto out_nooutbuf;
464
465         /* avoid "the frame size is larger than 1024 bytes" compiler warning */
466         sg = kmalloc(sizeof(*sg) * 8 * (diff_dst ? 3 : 2), GFP_KERNEL);
467         if (!sg)
468                 goto out_nosg;
469         asg = &sg[8];
470         sgout = &asg[8];
471
472         if (diff_dst)
473                 d = "-ddst";
474         else
475                 d = "";
476
477         if (enc == ENCRYPT)
478                 e = "encryption";
479         else
480                 e = "decryption";
481
482         init_completion(&result.completion);
483
484         req = aead_request_alloc(tfm, GFP_KERNEL);
485         if (!req) {
486                 pr_err("alg: aead%s: Failed to allocate request for %s\n",
487                        d, algo);
488                 goto out;
489         }
490
491         aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
492                                   tcrypt_complete, &result);
493
494         for (i = 0, j = 0; i < tcount; i++) {
495                 if (!template[i].np) {
496                         j++;
497
498                         /* some templates have no input data but they will
499                          * touch input
500                          */
501                         input = xbuf[0];
502                         input += align_offset;
503                         assoc = axbuf[0];
504
505                         ret = -EINVAL;
506                         if (WARN_ON(align_offset + template[i].ilen >
507                                     PAGE_SIZE || template[i].alen > PAGE_SIZE))
508                                 goto out;
509
510                         memcpy(input, template[i].input, template[i].ilen);
511                         memcpy(assoc, template[i].assoc, template[i].alen);
512                         if (template[i].iv)
513                                 memcpy(iv, template[i].iv, MAX_IVLEN);
514                         else
515                                 memset(iv, 0, MAX_IVLEN);
516
517                         crypto_aead_clear_flags(tfm, ~0);
518                         if (template[i].wk)
519                                 crypto_aead_set_flags(
520                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
521
522                         if (template[i].klen > MAX_KEYLEN) {
523                                 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
524                                        d, j, algo, template[i].klen,
525                                        MAX_KEYLEN);
526                                 ret = -EINVAL;
527                                 goto out;
528                         }
529                         memcpy(key, template[i].key, template[i].klen);
530
531                         ret = crypto_aead_setkey(tfm, key,
532                                                  template[i].klen);
533                         if (!ret == template[i].fail) {
534                                 pr_err("alg: aead%s: setkey failed on test %d for %s: flags=%x\n",
535                                        d, j, algo, crypto_aead_get_flags(tfm));
536                                 goto out;
537                         } else if (ret)
538                                 continue;
539
540                         authsize = abs(template[i].rlen - template[i].ilen);
541                         ret = crypto_aead_setauthsize(tfm, authsize);
542                         if (ret) {
543                                 pr_err("alg: aead%s: Failed to set authsize to %u on test %d for %s\n",
544                                        d, authsize, j, algo);
545                                 goto out;
546                         }
547
548                         if (diff_dst) {
549                                 output = xoutbuf[0];
550                                 output += align_offset;
551                                 sg_init_one(&sg[0], input, template[i].ilen);
552                                 sg_init_one(&sgout[0], output,
553                                             template[i].rlen);
554                         } else {
555                                 sg_init_one(&sg[0], input,
556                                             template[i].ilen +
557                                                 (enc ? authsize : 0));
558                                 output = input;
559                         }
560
561                         sg_init_one(&asg[0], assoc, template[i].alen);
562
563                         aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
564                                                template[i].ilen, iv);
565
566                         aead_request_set_assoc(req, asg, template[i].alen);
567
568                         ret = enc ?
569                                 crypto_aead_encrypt(req) :
570                                 crypto_aead_decrypt(req);
571
572                         switch (ret) {
573                         case 0:
574                                 if (template[i].novrfy) {
575                                         /* verification was supposed to fail */
576                                         pr_err("alg: aead%s: %s failed on test %d for %s: ret was 0, expected -EBADMSG\n",
577                                                d, e, j, algo);
578                                         /* so really, we got a bad message */
579                                         ret = -EBADMSG;
580                                         goto out;
581                                 }
582                                 break;
583                         case -EINPROGRESS:
584                         case -EBUSY:
585                                 ret = wait_for_completion_interruptible(
586                                         &result.completion);
587                                 if (!ret && !(ret = result.err)) {
588                                         reinit_completion(&result.completion);
589                                         break;
590                                 }
591                         case -EBADMSG:
592                                 if (template[i].novrfy)
593                                         /* verification failure was expected */
594                                         continue;
595                                 /* fall through */
596                         default:
597                                 pr_err("alg: aead%s: %s failed on test %d for %s: ret=%d\n",
598                                        d, e, j, algo, -ret);
599                                 goto out;
600                         }
601
602                         q = output;
603                         if (memcmp(q, template[i].result, template[i].rlen)) {
604                                 pr_err("alg: aead%s: Test %d failed on %s for %s\n",
605                                        d, j, e, algo);
606                                 hexdump(q, template[i].rlen);
607                                 ret = -EINVAL;
608                                 goto out;
609                         }
610                 }
611         }
612
613         for (i = 0, j = 0; i < tcount; i++) {
614                 /* alignment tests are only done with continuous buffers */
615                 if (align_offset != 0)
616                         break;
617
618                 if (template[i].np) {
619                         j++;
620
621                         if (template[i].iv)
622                                 memcpy(iv, template[i].iv, MAX_IVLEN);
623                         else
624                                 memset(iv, 0, MAX_IVLEN);
625
626                         crypto_aead_clear_flags(tfm, ~0);
627                         if (template[i].wk)
628                                 crypto_aead_set_flags(
629                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
630                         if (template[i].klen > MAX_KEYLEN) {
631                                 pr_err("alg: aead%s: setkey failed on test %d for %s: key size %d > %d\n",
632                                        d, j, algo, template[i].klen,
633                                        MAX_KEYLEN);
634                                 ret = -EINVAL;
635                                 goto out;
636                         }
637                         memcpy(key, template[i].key, template[i].klen);
638
639                         ret = crypto_aead_setkey(tfm, key, template[i].klen);
640                         if (!ret == template[i].fail) {
641                                 pr_err("alg: aead%s: setkey failed on chunk test %d for %s: flags=%x\n",
642                                        d, j, algo, crypto_aead_get_flags(tfm));
643                                 goto out;
644                         } else if (ret)
645                                 continue;
646
647                         authsize = abs(template[i].rlen - template[i].ilen);
648
649                         ret = -EINVAL;
650                         sg_init_table(sg, template[i].np);
651                         if (diff_dst)
652                                 sg_init_table(sgout, template[i].np);
653                         for (k = 0, temp = 0; k < template[i].np; k++) {
654                                 if (WARN_ON(offset_in_page(IDX[k]) +
655                                             template[i].tap[k] > PAGE_SIZE))
656                                         goto out;
657
658                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
659                                     offset_in_page(IDX[k]);
660
661                                 memcpy(q, template[i].input + temp,
662                                        template[i].tap[k]);
663
664                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
665
666                                 if (diff_dst) {
667                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
668                                             offset_in_page(IDX[k]);
669
670                                         memset(q, 0, template[i].tap[k]);
671
672                                         sg_set_buf(&sgout[k], q,
673                                                    template[i].tap[k]);
674                                 }
675
676                                 n = template[i].tap[k];
677                                 if (k == template[i].np - 1 && enc)
678                                         n += authsize;
679                                 if (offset_in_page(q) + n < PAGE_SIZE)
680                                         q[n] = 0;
681
682                                 temp += template[i].tap[k];
683                         }
684
685                         ret = crypto_aead_setauthsize(tfm, authsize);
686                         if (ret) {
687                                 pr_err("alg: aead%s: Failed to set authsize to %u on chunk test %d for %s\n",
688                                        d, authsize, j, algo);
689                                 goto out;
690                         }
691
692                         if (enc) {
693                                 if (WARN_ON(sg[k - 1].offset +
694                                             sg[k - 1].length + authsize >
695                                             PAGE_SIZE)) {
696                                         ret = -EINVAL;
697                                         goto out;
698                                 }
699
700                                 if (diff_dst)
701                                         sgout[k - 1].length += authsize;
702                                 else
703                                         sg[k - 1].length += authsize;
704                         }
705
706                         sg_init_table(asg, template[i].anp);
707                         ret = -EINVAL;
708                         for (k = 0, temp = 0; k < template[i].anp; k++) {
709                                 if (WARN_ON(offset_in_page(IDX[k]) +
710                                             template[i].atap[k] > PAGE_SIZE))
711                                         goto out;
712                                 sg_set_buf(&asg[k],
713                                            memcpy(axbuf[IDX[k] >> PAGE_SHIFT] +
714                                                   offset_in_page(IDX[k]),
715                                                   template[i].assoc + temp,
716                                                   template[i].atap[k]),
717                                            template[i].atap[k]);
718                                 temp += template[i].atap[k];
719                         }
720
721                         aead_request_set_crypt(req, sg, (diff_dst) ? sgout : sg,
722                                                template[i].ilen,
723                                                iv);
724
725                         aead_request_set_assoc(req, asg, template[i].alen);
726
727                         ret = enc ?
728                                 crypto_aead_encrypt(req) :
729                                 crypto_aead_decrypt(req);
730
731                         switch (ret) {
732                         case 0:
733                                 if (template[i].novrfy) {
734                                         /* verification was supposed to fail */
735                                         pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret was 0, expected -EBADMSG\n",
736                                                d, e, j, algo);
737                                         /* so really, we got a bad message */
738                                         ret = -EBADMSG;
739                                         goto out;
740                                 }
741                                 break;
742                         case -EINPROGRESS:
743                         case -EBUSY:
744                                 ret = wait_for_completion_interruptible(
745                                         &result.completion);
746                                 if (!ret && !(ret = result.err)) {
747                                         reinit_completion(&result.completion);
748                                         break;
749                                 }
750                         case -EBADMSG:
751                                 if (template[i].novrfy)
752                                         /* verification failure was expected */
753                                         continue;
754                                 /* fall through */
755                         default:
756                                 pr_err("alg: aead%s: %s failed on chunk test %d for %s: ret=%d\n",
757                                        d, e, j, algo, -ret);
758                                 goto out;
759                         }
760
761                         ret = -EINVAL;
762                         for (k = 0, temp = 0; k < template[i].np; k++) {
763                                 if (diff_dst)
764                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
765                                             offset_in_page(IDX[k]);
766                                 else
767                                         q = xbuf[IDX[k] >> PAGE_SHIFT] +
768                                             offset_in_page(IDX[k]);
769
770                                 n = template[i].tap[k];
771                                 if (k == template[i].np - 1)
772                                         n += enc ? authsize : -authsize;
773
774                                 if (memcmp(q, template[i].result + temp, n)) {
775                                         pr_err("alg: aead%s: Chunk test %d failed on %s at page %u for %s\n",
776                                                d, j, e, k, algo);
777                                         hexdump(q, n);
778                                         goto out;
779                                 }
780
781                                 q += n;
782                                 if (k == template[i].np - 1 && !enc) {
783                                         if (!diff_dst &&
784                                                 memcmp(q, template[i].input +
785                                                       temp + n, authsize))
786                                                 n = authsize;
787                                         else
788                                                 n = 0;
789                                 } else {
790                                         for (n = 0; offset_in_page(q + n) &&
791                                                     q[n]; n++)
792                                                 ;
793                                 }
794                                 if (n) {
795                                         pr_err("alg: aead%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
796                                                d, j, e, k, algo, n);
797                                         hexdump(q, n);
798                                         goto out;
799                                 }
800
801                                 temp += template[i].tap[k];
802                         }
803                 }
804         }
805
806         ret = 0;
807
808 out:
809         aead_request_free(req);
810         kfree(sg);
811 out_nosg:
812         if (diff_dst)
813                 testmgr_free_buf(xoutbuf);
814 out_nooutbuf:
815         testmgr_free_buf(axbuf);
816 out_noaxbuf:
817         testmgr_free_buf(xbuf);
818 out_noxbuf:
819         kfree(key);
820         kfree(iv);
821         return ret;
822 }
823
824 static int test_aead(struct crypto_aead *tfm, int enc,
825                      struct aead_testvec *template, unsigned int tcount)
826 {
827         unsigned int alignmask;
828         int ret;
829
830         /* test 'dst == src' case */
831         ret = __test_aead(tfm, enc, template, tcount, false, 0);
832         if (ret)
833                 return ret;
834
835         /* test 'dst != src' case */
836         ret = __test_aead(tfm, enc, template, tcount, true, 0);
837         if (ret)
838                 return ret;
839
840         /* test unaligned buffers, check with one byte offset */
841         ret = __test_aead(tfm, enc, template, tcount, true, 1);
842         if (ret)
843                 return ret;
844
845         alignmask = crypto_tfm_alg_alignmask(&tfm->base);
846         if (alignmask) {
847                 /* Check if alignment mask for tfm is correctly set. */
848                 ret = __test_aead(tfm, enc, template, tcount, true,
849                                   alignmask + 1);
850                 if (ret)
851                         return ret;
852         }
853
854         return 0;
855 }
856
857 static int test_cipher(struct crypto_cipher *tfm, int enc,
858                        struct cipher_testvec *template, unsigned int tcount)
859 {
860         const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm));
861         unsigned int i, j, k;
862         char *q;
863         const char *e;
864         void *data;
865         char *xbuf[XBUFSIZE];
866         int ret = -ENOMEM;
867
868         if (testmgr_alloc_buf(xbuf))
869                 goto out_nobuf;
870
871         if (enc == ENCRYPT)
872                 e = "encryption";
873         else
874                 e = "decryption";
875
876         j = 0;
877         for (i = 0; i < tcount; i++) {
878                 if (template[i].np)
879                         continue;
880
881                 j++;
882
883                 ret = -EINVAL;
884                 if (WARN_ON(template[i].ilen > PAGE_SIZE))
885                         goto out;
886
887                 data = xbuf[0];
888                 memcpy(data, template[i].input, template[i].ilen);
889
890                 crypto_cipher_clear_flags(tfm, ~0);
891                 if (template[i].wk)
892                         crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
893
894                 ret = crypto_cipher_setkey(tfm, template[i].key,
895                                            template[i].klen);
896                 if (!ret == template[i].fail) {
897                         printk(KERN_ERR "alg: cipher: setkey failed "
898                                "on test %d for %s: flags=%x\n", j,
899                                algo, crypto_cipher_get_flags(tfm));
900                         goto out;
901                 } else if (ret)
902                         continue;
903
904                 for (k = 0; k < template[i].ilen;
905                      k += crypto_cipher_blocksize(tfm)) {
906                         if (enc)
907                                 crypto_cipher_encrypt_one(tfm, data + k,
908                                                           data + k);
909                         else
910                                 crypto_cipher_decrypt_one(tfm, data + k,
911                                                           data + k);
912                 }
913
914                 q = data;
915                 if (memcmp(q, template[i].result, template[i].rlen)) {
916                         printk(KERN_ERR "alg: cipher: Test %d failed "
917                                "on %s for %s\n", j, e, algo);
918                         hexdump(q, template[i].rlen);
919                         ret = -EINVAL;
920                         goto out;
921                 }
922         }
923
924         ret = 0;
925
926 out:
927         testmgr_free_buf(xbuf);
928 out_nobuf:
929         return ret;
930 }
931
932 static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc,
933                            struct cipher_testvec *template, unsigned int tcount,
934                            const bool diff_dst, const int align_offset)
935 {
936         const char *algo =
937                 crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm));
938         unsigned int i, j, k, n, temp;
939         char *q;
940         struct ablkcipher_request *req;
941         struct scatterlist sg[8];
942         struct scatterlist sgout[8];
943         const char *e, *d;
944         struct tcrypt_result result;
945         void *data;
946         char iv[MAX_IVLEN];
947         char *xbuf[XBUFSIZE];
948         char *xoutbuf[XBUFSIZE];
949         int ret = -ENOMEM;
950
951         if (testmgr_alloc_buf(xbuf))
952                 goto out_nobuf;
953
954         if (diff_dst && testmgr_alloc_buf(xoutbuf))
955                 goto out_nooutbuf;
956
957         if (diff_dst)
958                 d = "-ddst";
959         else
960                 d = "";
961
962         if (enc == ENCRYPT)
963                 e = "encryption";
964         else
965                 e = "decryption";
966
967         init_completion(&result.completion);
968
969         req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
970         if (!req) {
971                 pr_err("alg: skcipher%s: Failed to allocate request for %s\n",
972                        d, algo);
973                 goto out;
974         }
975
976         ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
977                                         tcrypt_complete, &result);
978
979         j = 0;
980         for (i = 0; i < tcount; i++) {
981                 if (template[i].iv)
982                         memcpy(iv, template[i].iv, MAX_IVLEN);
983                 else
984                         memset(iv, 0, MAX_IVLEN);
985
986                 if (!(template[i].np) || (template[i].also_non_np)) {
987                         j++;
988
989                         ret = -EINVAL;
990                         if (WARN_ON(align_offset + template[i].ilen >
991                                     PAGE_SIZE))
992                                 goto out;
993
994                         data = xbuf[0];
995                         data += align_offset;
996                         memcpy(data, template[i].input, template[i].ilen);
997
998                         crypto_ablkcipher_clear_flags(tfm, ~0);
999                         if (template[i].wk)
1000                                 crypto_ablkcipher_set_flags(
1001                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
1002
1003                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
1004                                                        template[i].klen);
1005                         if (!ret == template[i].fail) {
1006                                 pr_err("alg: skcipher%s: setkey failed on test %d for %s: flags=%x\n",
1007                                        d, j, algo,
1008                                        crypto_ablkcipher_get_flags(tfm));
1009                                 goto out;
1010                         } else if (ret)
1011                                 continue;
1012
1013                         sg_init_one(&sg[0], data, template[i].ilen);
1014                         if (diff_dst) {
1015                                 data = xoutbuf[0];
1016                                 data += align_offset;
1017                                 sg_init_one(&sgout[0], data, template[i].ilen);
1018                         }
1019
1020                         ablkcipher_request_set_crypt(req, sg,
1021                                                      (diff_dst) ? sgout : sg,
1022                                                      template[i].ilen, iv);
1023                         ret = enc ?
1024                                 crypto_ablkcipher_encrypt(req) :
1025                                 crypto_ablkcipher_decrypt(req);
1026
1027                         switch (ret) {
1028                         case 0:
1029                                 break;
1030                         case -EINPROGRESS:
1031                         case -EBUSY:
1032                                 ret = wait_for_completion_interruptible(
1033                                         &result.completion);
1034                                 if (!ret && !((ret = result.err))) {
1035                                         reinit_completion(&result.completion);
1036                                         break;
1037                                 }
1038                                 /* fall through */
1039                         default:
1040                                 pr_err("alg: skcipher%s: %s failed on test %d for %s: ret=%d\n",
1041                                        d, e, j, algo, -ret);
1042                                 goto out;
1043                         }
1044
1045                         q = data;
1046                         if (memcmp(q, template[i].result, template[i].rlen)) {
1047                                 pr_err("alg: skcipher%s: Test %d failed on %s for %s\n",
1048                                        d, j, e, algo);
1049                                 hexdump(q, template[i].rlen);
1050                                 ret = -EINVAL;
1051                                 goto out;
1052                         }
1053                 }
1054         }
1055
1056         j = 0;
1057         for (i = 0; i < tcount; i++) {
1058                 /* alignment tests are only done with continuous buffers */
1059                 if (align_offset != 0)
1060                         break;
1061
1062                 if (template[i].iv)
1063                         memcpy(iv, template[i].iv, MAX_IVLEN);
1064                 else
1065                         memset(iv, 0, MAX_IVLEN);
1066
1067                 if (template[i].np) {
1068                         j++;
1069
1070                         crypto_ablkcipher_clear_flags(tfm, ~0);
1071                         if (template[i].wk)
1072                                 crypto_ablkcipher_set_flags(
1073                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
1074
1075                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
1076                                                        template[i].klen);
1077                         if (!ret == template[i].fail) {
1078                                 pr_err("alg: skcipher%s: setkey failed on chunk test %d for %s: flags=%x\n",
1079                                        d, j, algo,
1080                                        crypto_ablkcipher_get_flags(tfm));
1081                                 goto out;
1082                         } else if (ret)
1083                                 continue;
1084
1085                         temp = 0;
1086                         ret = -EINVAL;
1087                         sg_init_table(sg, template[i].np);
1088                         if (diff_dst)
1089                                 sg_init_table(sgout, template[i].np);
1090                         for (k = 0; k < template[i].np; k++) {
1091                                 if (WARN_ON(offset_in_page(IDX[k]) +
1092                                             template[i].tap[k] > PAGE_SIZE))
1093                                         goto out;
1094
1095                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
1096                                     offset_in_page(IDX[k]);
1097
1098                                 memcpy(q, template[i].input + temp,
1099                                        template[i].tap[k]);
1100
1101                                 if (offset_in_page(q) + template[i].tap[k] <
1102                                     PAGE_SIZE)
1103                                         q[template[i].tap[k]] = 0;
1104
1105                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
1106                                 if (diff_dst) {
1107                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
1108                                             offset_in_page(IDX[k]);
1109
1110                                         sg_set_buf(&sgout[k], q,
1111                                                    template[i].tap[k]);
1112
1113                                         memset(q, 0, template[i].tap[k]);
1114                                         if (offset_in_page(q) +
1115                                             template[i].tap[k] < PAGE_SIZE)
1116                                                 q[template[i].tap[k]] = 0;
1117                                 }
1118
1119                                 temp += template[i].tap[k];
1120                         }
1121
1122                         ablkcipher_request_set_crypt(req, sg,
1123                                         (diff_dst) ? sgout : sg,
1124                                         template[i].ilen, iv);
1125
1126                         ret = enc ?
1127                                 crypto_ablkcipher_encrypt(req) :
1128                                 crypto_ablkcipher_decrypt(req);
1129
1130                         switch (ret) {
1131                         case 0:
1132                                 break;
1133                         case -EINPROGRESS:
1134                         case -EBUSY:
1135                                 ret = wait_for_completion_interruptible(
1136                                         &result.completion);
1137                                 if (!ret && !((ret = result.err))) {
1138                                         reinit_completion(&result.completion);
1139                                         break;
1140                                 }
1141                                 /* fall through */
1142                         default:
1143                                 pr_err("alg: skcipher%s: %s failed on chunk test %d for %s: ret=%d\n",
1144                                        d, e, j, algo, -ret);
1145                                 goto out;
1146                         }
1147
1148                         temp = 0;
1149                         ret = -EINVAL;
1150                         for (k = 0; k < template[i].np; k++) {
1151                                 if (diff_dst)
1152                                         q = xoutbuf[IDX[k] >> PAGE_SHIFT] +
1153                                             offset_in_page(IDX[k]);
1154                                 else
1155                                         q = xbuf[IDX[k] >> PAGE_SHIFT] +
1156                                             offset_in_page(IDX[k]);
1157
1158                                 if (memcmp(q, template[i].result + temp,
1159                                            template[i].tap[k])) {
1160                                         pr_err("alg: skcipher%s: Chunk test %d failed on %s at page %u for %s\n",
1161                                                d, j, e, k, algo);
1162                                         hexdump(q, template[i].tap[k]);
1163                                         goto out;
1164                                 }
1165
1166                                 q += template[i].tap[k];
1167                                 for (n = 0; offset_in_page(q + n) && q[n]; n++)
1168                                         ;
1169                                 if (n) {
1170                                         pr_err("alg: skcipher%s: Result buffer corruption in chunk test %d on %s at page %u for %s: %u bytes:\n",
1171                                                d, j, e, k, algo, n);
1172                                         hexdump(q, n);
1173                                         goto out;
1174                                 }
1175                                 temp += template[i].tap[k];
1176                         }
1177                 }
1178         }
1179
1180         ret = 0;
1181
1182 out:
1183         ablkcipher_request_free(req);
1184         if (diff_dst)
1185                 testmgr_free_buf(xoutbuf);
1186 out_nooutbuf:
1187         testmgr_free_buf(xbuf);
1188 out_nobuf:
1189         return ret;
1190 }
1191
1192 static int test_skcipher(struct crypto_ablkcipher *tfm, int enc,
1193                          struct cipher_testvec *template, unsigned int tcount)
1194 {
1195         unsigned int alignmask;
1196         int ret;
1197
1198         /* test 'dst == src' case */
1199         ret = __test_skcipher(tfm, enc, template, tcount, false, 0);
1200         if (ret)
1201                 return ret;
1202
1203         /* test 'dst != src' case */
1204         ret = __test_skcipher(tfm, enc, template, tcount, true, 0);
1205         if (ret)
1206                 return ret;
1207
1208         /* test unaligned buffers, check with one byte offset */
1209         ret = __test_skcipher(tfm, enc, template, tcount, true, 1);
1210         if (ret)
1211                 return ret;
1212
1213         alignmask = crypto_tfm_alg_alignmask(&tfm->base);
1214         if (alignmask) {
1215                 /* Check if alignment mask for tfm is correctly set. */
1216                 ret = __test_skcipher(tfm, enc, template, tcount, true,
1217                                       alignmask + 1);
1218                 if (ret)
1219                         return ret;
1220         }
1221
1222         return 0;
1223 }
1224
1225 static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate,
1226                      struct comp_testvec *dtemplate, int ctcount, int dtcount)
1227 {
1228         const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm));
1229         unsigned int i;
1230         char result[COMP_BUF_SIZE];
1231         int ret;
1232
1233         for (i = 0; i < ctcount; i++) {
1234                 int ilen;
1235                 unsigned int dlen = COMP_BUF_SIZE;
1236
1237                 memset(result, 0, sizeof (result));
1238
1239                 ilen = ctemplate[i].inlen;
1240                 ret = crypto_comp_compress(tfm, ctemplate[i].input,
1241                                            ilen, result, &dlen);
1242                 if (ret) {
1243                         printk(KERN_ERR "alg: comp: compression failed "
1244                                "on test %d for %s: ret=%d\n", i + 1, algo,
1245                                -ret);
1246                         goto out;
1247                 }
1248
1249                 if (dlen != ctemplate[i].outlen) {
1250                         printk(KERN_ERR "alg: comp: Compression test %d "
1251                                "failed for %s: output len = %d\n", i + 1, algo,
1252                                dlen);
1253                         ret = -EINVAL;
1254                         goto out;
1255                 }
1256
1257                 if (memcmp(result, ctemplate[i].output, dlen)) {
1258                         printk(KERN_ERR "alg: comp: Compression test %d "
1259                                "failed for %s\n", i + 1, algo);
1260                         hexdump(result, dlen);
1261                         ret = -EINVAL;
1262                         goto out;
1263                 }
1264         }
1265
1266         for (i = 0; i < dtcount; i++) {
1267                 int ilen;
1268                 unsigned int dlen = COMP_BUF_SIZE;
1269
1270                 memset(result, 0, sizeof (result));
1271
1272                 ilen = dtemplate[i].inlen;
1273                 ret = crypto_comp_decompress(tfm, dtemplate[i].input,
1274                                              ilen, result, &dlen);
1275                 if (ret) {
1276                         printk(KERN_ERR "alg: comp: decompression failed "
1277                                "on test %d for %s: ret=%d\n", i + 1, algo,
1278                                -ret);
1279                         goto out;
1280                 }
1281
1282                 if (dlen != dtemplate[i].outlen) {
1283                         printk(KERN_ERR "alg: comp: Decompression test %d "
1284                                "failed for %s: output len = %d\n", i + 1, algo,
1285                                dlen);
1286                         ret = -EINVAL;
1287                         goto out;
1288                 }
1289
1290                 if (memcmp(result, dtemplate[i].output, dlen)) {
1291                         printk(KERN_ERR "alg: comp: Decompression test %d "
1292                                "failed for %s\n", i + 1, algo);
1293                         hexdump(result, dlen);
1294                         ret = -EINVAL;
1295                         goto out;
1296                 }
1297         }
1298
1299         ret = 0;
1300
1301 out:
1302         return ret;
1303 }
1304
1305 static int test_pcomp(struct crypto_pcomp *tfm,
1306                       struct pcomp_testvec *ctemplate,
1307                       struct pcomp_testvec *dtemplate, int ctcount,
1308                       int dtcount)
1309 {
1310         const char *algo = crypto_tfm_alg_driver_name(crypto_pcomp_tfm(tfm));
1311         unsigned int i;
1312         char result[COMP_BUF_SIZE];
1313         int res;
1314
1315         for (i = 0; i < ctcount; i++) {
1316                 struct comp_request req;
1317                 unsigned int produced = 0;
1318
1319                 res = crypto_compress_setup(tfm, ctemplate[i].params,
1320                                             ctemplate[i].paramsize);
1321                 if (res) {
1322                         pr_err("alg: pcomp: compression setup failed on test "
1323                                "%d for %s: error=%d\n", i + 1, algo, res);
1324                         return res;
1325                 }
1326
1327                 res = crypto_compress_init(tfm);
1328                 if (res) {
1329                         pr_err("alg: pcomp: compression init failed on test "
1330                                "%d for %s: error=%d\n", i + 1, algo, res);
1331                         return res;
1332                 }
1333
1334                 memset(result, 0, sizeof(result));
1335
1336                 req.next_in = ctemplate[i].input;
1337                 req.avail_in = ctemplate[i].inlen / 2;
1338                 req.next_out = result;
1339                 req.avail_out = ctemplate[i].outlen / 2;
1340
1341                 res = crypto_compress_update(tfm, &req);
1342                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1343                         pr_err("alg: pcomp: compression update failed on test "
1344                                "%d for %s: error=%d\n", i + 1, algo, res);
1345                         return res;
1346                 }
1347                 if (res > 0)
1348                         produced += res;
1349
1350                 /* Add remaining input data */
1351                 req.avail_in += (ctemplate[i].inlen + 1) / 2;
1352
1353                 res = crypto_compress_update(tfm, &req);
1354                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1355                         pr_err("alg: pcomp: compression update failed on test "
1356                                "%d for %s: error=%d\n", i + 1, algo, res);
1357                         return res;
1358                 }
1359                 if (res > 0)
1360                         produced += res;
1361
1362                 /* Provide remaining output space */
1363                 req.avail_out += COMP_BUF_SIZE - ctemplate[i].outlen / 2;
1364
1365                 res = crypto_compress_final(tfm, &req);
1366                 if (res < 0) {
1367                         pr_err("alg: pcomp: compression final failed on test "
1368                                "%d for %s: error=%d\n", i + 1, algo, res);
1369                         return res;
1370                 }
1371                 produced += res;
1372
1373                 if (COMP_BUF_SIZE - req.avail_out != ctemplate[i].outlen) {
1374                         pr_err("alg: comp: Compression test %d failed for %s: "
1375                                "output len = %d (expected %d)\n", i + 1, algo,
1376                                COMP_BUF_SIZE - req.avail_out,
1377                                ctemplate[i].outlen);
1378                         return -EINVAL;
1379                 }
1380
1381                 if (produced != ctemplate[i].outlen) {
1382                         pr_err("alg: comp: Compression test %d failed for %s: "
1383                                "returned len = %u (expected %d)\n", i + 1,
1384                                algo, produced, ctemplate[i].outlen);
1385                         return -EINVAL;
1386                 }
1387
1388                 if (memcmp(result, ctemplate[i].output, ctemplate[i].outlen)) {
1389                         pr_err("alg: pcomp: Compression test %d failed for "
1390                                "%s\n", i + 1, algo);
1391                         hexdump(result, ctemplate[i].outlen);
1392                         return -EINVAL;
1393                 }
1394         }
1395
1396         for (i = 0; i < dtcount; i++) {
1397                 struct comp_request req;
1398                 unsigned int produced = 0;
1399
1400                 res = crypto_decompress_setup(tfm, dtemplate[i].params,
1401                                               dtemplate[i].paramsize);
1402                 if (res) {
1403                         pr_err("alg: pcomp: decompression setup failed on "
1404                                "test %d for %s: error=%d\n", i + 1, algo, res);
1405                         return res;
1406                 }
1407
1408                 res = crypto_decompress_init(tfm);
1409                 if (res) {
1410                         pr_err("alg: pcomp: decompression init failed on test "
1411                                "%d for %s: error=%d\n", i + 1, algo, res);
1412                         return res;
1413                 }
1414
1415                 memset(result, 0, sizeof(result));
1416
1417                 req.next_in = dtemplate[i].input;
1418                 req.avail_in = dtemplate[i].inlen / 2;
1419                 req.next_out = result;
1420                 req.avail_out = dtemplate[i].outlen / 2;
1421
1422                 res = crypto_decompress_update(tfm, &req);
1423                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1424                         pr_err("alg: pcomp: decompression update failed on "
1425                                "test %d for %s: error=%d\n", i + 1, algo, res);
1426                         return res;
1427                 }
1428                 if (res > 0)
1429                         produced += res;
1430
1431                 /* Add remaining input data */
1432                 req.avail_in += (dtemplate[i].inlen + 1) / 2;
1433
1434                 res = crypto_decompress_update(tfm, &req);
1435                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1436                         pr_err("alg: pcomp: decompression update failed on "
1437                                "test %d for %s: error=%d\n", i + 1, algo, res);
1438                         return res;
1439                 }
1440                 if (res > 0)
1441                         produced += res;
1442
1443                 /* Provide remaining output space */
1444                 req.avail_out += COMP_BUF_SIZE - dtemplate[i].outlen / 2;
1445
1446                 res = crypto_decompress_final(tfm, &req);
1447                 if (res < 0 && (res != -EAGAIN || req.avail_in)) {
1448                         pr_err("alg: pcomp: decompression final failed on "
1449                                "test %d for %s: error=%d\n", i + 1, algo, res);
1450                         return res;
1451                 }
1452                 if (res > 0)
1453                         produced += res;
1454
1455                 if (COMP_BUF_SIZE - req.avail_out != dtemplate[i].outlen) {
1456                         pr_err("alg: comp: Decompression test %d failed for "
1457                                "%s: output len = %d (expected %d)\n", i + 1,
1458                                algo, COMP_BUF_SIZE - req.avail_out,
1459                                dtemplate[i].outlen);
1460                         return -EINVAL;
1461                 }
1462
1463                 if (produced != dtemplate[i].outlen) {
1464                         pr_err("alg: comp: Decompression test %d failed for "
1465                                "%s: returned len = %u (expected %d)\n", i + 1,
1466                                algo, produced, dtemplate[i].outlen);
1467                         return -EINVAL;
1468                 }
1469
1470                 if (memcmp(result, dtemplate[i].output, dtemplate[i].outlen)) {
1471                         pr_err("alg: pcomp: Decompression test %d failed for "
1472                                "%s\n", i + 1, algo);
1473                         hexdump(result, dtemplate[i].outlen);
1474                         return -EINVAL;
1475                 }
1476         }
1477
1478         return 0;
1479 }
1480
1481
1482 static int test_cprng(struct crypto_rng *tfm, struct cprng_testvec *template,
1483                       unsigned int tcount)
1484 {
1485         const char *algo = crypto_tfm_alg_driver_name(crypto_rng_tfm(tfm));
1486         int err = 0, i, j, seedsize;
1487         u8 *seed;
1488         char result[32];
1489
1490         seedsize = crypto_rng_seedsize(tfm);
1491
1492         seed = kmalloc(seedsize, GFP_KERNEL);
1493         if (!seed) {
1494                 printk(KERN_ERR "alg: cprng: Failed to allocate seed space "
1495                        "for %s\n", algo);
1496                 return -ENOMEM;
1497         }
1498
1499         for (i = 0; i < tcount; i++) {
1500                 memset(result, 0, 32);
1501
1502                 memcpy(seed, template[i].v, template[i].vlen);
1503                 memcpy(seed + template[i].vlen, template[i].key,
1504                        template[i].klen);
1505                 memcpy(seed + template[i].vlen + template[i].klen,
1506                        template[i].dt, template[i].dtlen);
1507
1508                 err = crypto_rng_reset(tfm, seed, seedsize);
1509                 if (err) {
1510                         printk(KERN_ERR "alg: cprng: Failed to reset rng "
1511                                "for %s\n", algo);
1512                         goto out;
1513                 }
1514
1515                 for (j = 0; j < template[i].loops; j++) {
1516                         err = crypto_rng_get_bytes(tfm, result,
1517                                                    template[i].rlen);
1518                         if (err != template[i].rlen) {
1519                                 printk(KERN_ERR "alg: cprng: Failed to obtain "
1520                                        "the correct amount of random data for "
1521                                        "%s (requested %d, got %d)\n", algo,
1522                                        template[i].rlen, err);
1523                                 goto out;
1524                         }
1525                 }
1526
1527                 err = memcmp(result, template[i].result,
1528                              template[i].rlen);
1529                 if (err) {
1530                         printk(KERN_ERR "alg: cprng: Test %d failed for %s\n",
1531                                i, algo);
1532                         hexdump(result, template[i].rlen);
1533                         err = -EINVAL;
1534                         goto out;
1535                 }
1536         }
1537
1538 out:
1539         kfree(seed);
1540         return err;
1541 }
1542
1543 static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
1544                          u32 type, u32 mask)
1545 {
1546         struct crypto_aead *tfm;
1547         int err = 0;
1548
1549         tfm = crypto_alloc_aead(driver, type, mask);
1550         if (IS_ERR(tfm)) {
1551                 printk(KERN_ERR "alg: aead: Failed to load transform for %s: "
1552                        "%ld\n", driver, PTR_ERR(tfm));
1553                 return PTR_ERR(tfm);
1554         }
1555
1556         if (desc->suite.aead.enc.vecs) {
1557                 err = test_aead(tfm, ENCRYPT, desc->suite.aead.enc.vecs,
1558                                 desc->suite.aead.enc.count);
1559                 if (err)
1560                         goto out;
1561         }
1562
1563         if (!err && desc->suite.aead.dec.vecs)
1564                 err = test_aead(tfm, DECRYPT, desc->suite.aead.dec.vecs,
1565                                 desc->suite.aead.dec.count);
1566
1567 out:
1568         crypto_free_aead(tfm);
1569         return err;
1570 }
1571
1572 static int alg_test_cipher(const struct alg_test_desc *desc,
1573                            const char *driver, u32 type, u32 mask)
1574 {
1575         struct crypto_cipher *tfm;
1576         int err = 0;
1577
1578         tfm = crypto_alloc_cipher(driver, type, mask);
1579         if (IS_ERR(tfm)) {
1580                 printk(KERN_ERR "alg: cipher: Failed to load transform for "
1581                        "%s: %ld\n", driver, PTR_ERR(tfm));
1582                 return PTR_ERR(tfm);
1583         }
1584
1585         if (desc->suite.cipher.enc.vecs) {
1586                 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1587                                   desc->suite.cipher.enc.count);
1588                 if (err)
1589                         goto out;
1590         }
1591
1592         if (desc->suite.cipher.dec.vecs)
1593                 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1594                                   desc->suite.cipher.dec.count);
1595
1596 out:
1597         crypto_free_cipher(tfm);
1598         return err;
1599 }
1600
1601 static int alg_test_skcipher(const struct alg_test_desc *desc,
1602                              const char *driver, u32 type, u32 mask)
1603 {
1604         struct crypto_ablkcipher *tfm;
1605         int err = 0;
1606
1607         tfm = crypto_alloc_ablkcipher(driver, type, mask);
1608         if (IS_ERR(tfm)) {
1609                 printk(KERN_ERR "alg: skcipher: Failed to load transform for "
1610                        "%s: %ld\n", driver, PTR_ERR(tfm));
1611                 return PTR_ERR(tfm);
1612         }
1613
1614         if (desc->suite.cipher.enc.vecs) {
1615                 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
1616                                     desc->suite.cipher.enc.count);
1617                 if (err)
1618                         goto out;
1619         }
1620
1621         if (desc->suite.cipher.dec.vecs)
1622                 err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
1623                                     desc->suite.cipher.dec.count);
1624
1625 out:
1626         crypto_free_ablkcipher(tfm);
1627         return err;
1628 }
1629
1630 static int alg_test_comp(const struct alg_test_desc *desc, const char *driver,
1631                          u32 type, u32 mask)
1632 {
1633         struct crypto_comp *tfm;
1634         int err;
1635
1636         tfm = crypto_alloc_comp(driver, type, mask);
1637         if (IS_ERR(tfm)) {
1638                 printk(KERN_ERR "alg: comp: Failed to load transform for %s: "
1639                        "%ld\n", driver, PTR_ERR(tfm));
1640                 return PTR_ERR(tfm);
1641         }
1642
1643         err = test_comp(tfm, desc->suite.comp.comp.vecs,
1644                         desc->suite.comp.decomp.vecs,
1645                         desc->suite.comp.comp.count,
1646                         desc->suite.comp.decomp.count);
1647
1648         crypto_free_comp(tfm);
1649         return err;
1650 }
1651
1652 static int alg_test_pcomp(const struct alg_test_desc *desc, const char *driver,
1653                           u32 type, u32 mask)
1654 {
1655         struct crypto_pcomp *tfm;
1656         int err;
1657
1658         tfm = crypto_alloc_pcomp(driver, type, mask);
1659         if (IS_ERR(tfm)) {
1660                 pr_err("alg: pcomp: Failed to load transform for %s: %ld\n",
1661                        driver, PTR_ERR(tfm));
1662                 return PTR_ERR(tfm);
1663         }
1664
1665         err = test_pcomp(tfm, desc->suite.pcomp.comp.vecs,
1666                          desc->suite.pcomp.decomp.vecs,
1667                          desc->suite.pcomp.comp.count,
1668                          desc->suite.pcomp.decomp.count);
1669
1670         crypto_free_pcomp(tfm);
1671         return err;
1672 }
1673
1674 static int alg_test_hash(const struct alg_test_desc *desc, const char *driver,
1675                          u32 type, u32 mask)
1676 {
1677         struct crypto_ahash *tfm;
1678         int err;
1679
1680         tfm = crypto_alloc_ahash(driver, type, mask);
1681         if (IS_ERR(tfm)) {
1682                 printk(KERN_ERR "alg: hash: Failed to load transform for %s: "
1683                        "%ld\n", driver, PTR_ERR(tfm));
1684                 return PTR_ERR(tfm);
1685         }
1686
1687         err = test_hash(tfm, desc->suite.hash.vecs,
1688                         desc->suite.hash.count, true);
1689         if (!err)
1690                 err = test_hash(tfm, desc->suite.hash.vecs,
1691                                 desc->suite.hash.count, false);
1692
1693         crypto_free_ahash(tfm);
1694         return err;
1695 }
1696
1697 static int alg_test_crc32c(const struct alg_test_desc *desc,
1698                            const char *driver, u32 type, u32 mask)
1699 {
1700         struct crypto_shash *tfm;
1701         u32 val;
1702         int err;
1703
1704         err = alg_test_hash(desc, driver, type, mask);
1705         if (err)
1706                 goto out;
1707
1708         tfm = crypto_alloc_shash(driver, type, mask);
1709         if (IS_ERR(tfm)) {
1710                 printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: "
1711                        "%ld\n", driver, PTR_ERR(tfm));
1712                 err = PTR_ERR(tfm);
1713                 goto out;
1714         }
1715
1716         do {
1717                 struct {
1718                         struct shash_desc shash;
1719                         char ctx[crypto_shash_descsize(tfm)];
1720                 } sdesc;
1721
1722                 sdesc.shash.tfm = tfm;
1723                 sdesc.shash.flags = 0;
1724
1725                 *(u32 *)sdesc.ctx = le32_to_cpu(420553207);
1726                 err = crypto_shash_final(&sdesc.shash, (u8 *)&val);
1727                 if (err) {
1728                         printk(KERN_ERR "alg: crc32c: Operation failed for "
1729                                "%s: %d\n", driver, err);
1730                         break;
1731                 }
1732
1733                 if (val != ~420553207) {
1734                         printk(KERN_ERR "alg: crc32c: Test failed for %s: "
1735                                "%d\n", driver, val);
1736                         err = -EINVAL;
1737                 }
1738         } while (0);
1739
1740         crypto_free_shash(tfm);
1741
1742 out:
1743         return err;
1744 }
1745
1746 static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver,
1747                           u32 type, u32 mask)
1748 {
1749         struct crypto_rng *rng;
1750         int err;
1751
1752         rng = crypto_alloc_rng(driver, type, mask);
1753         if (IS_ERR(rng)) {
1754                 printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
1755                        "%ld\n", driver, PTR_ERR(rng));
1756                 return PTR_ERR(rng);
1757         }
1758
1759         err = test_cprng(rng, desc->suite.cprng.vecs, desc->suite.cprng.count);
1760
1761         crypto_free_rng(rng);
1762
1763         return err;
1764 }
1765
1766
1767 static int drbg_cavs_test(struct drbg_testvec *test, int pr,
1768                           const char *driver, u32 type, u32 mask)
1769 {
1770         int ret = -EAGAIN;
1771         struct crypto_rng *drng;
1772         struct drbg_test_data test_data;
1773         struct drbg_string addtl, pers, testentropy;
1774         unsigned char *buf = kzalloc(test->expectedlen, GFP_KERNEL);
1775
1776         if (!buf)
1777                 return -ENOMEM;
1778
1779         drng = crypto_alloc_rng(driver, type, mask);
1780         if (IS_ERR(drng)) {
1781                 printk(KERN_ERR "alg: drbg: could not allocate DRNG handle for "
1782                        "%s\n", driver);
1783                 kzfree(buf);
1784                 return -ENOMEM;
1785         }
1786
1787         test_data.testentropy = &testentropy;
1788         drbg_string_fill(&testentropy, test->entropy, test->entropylen);
1789         drbg_string_fill(&pers, test->pers, test->perslen);
1790         ret = crypto_drbg_reset_test(drng, &pers, &test_data);
1791         if (ret) {
1792                 printk(KERN_ERR "alg: drbg: Failed to reset rng\n");
1793                 goto outbuf;
1794         }
1795
1796         drbg_string_fill(&addtl, test->addtla, test->addtllen);
1797         if (pr) {
1798                 drbg_string_fill(&testentropy, test->entpra, test->entprlen);
1799                 ret = crypto_drbg_get_bytes_addtl_test(drng,
1800                         buf, test->expectedlen, &addtl, &test_data);
1801         } else {
1802                 ret = crypto_drbg_get_bytes_addtl(drng,
1803                         buf, test->expectedlen, &addtl);
1804         }
1805         if (ret <= 0) {
1806                 printk(KERN_ERR "alg: drbg: could not obtain random data for "
1807                        "driver %s\n", driver);
1808                 goto outbuf;
1809         }
1810
1811         drbg_string_fill(&addtl, test->addtlb, test->addtllen);
1812         if (pr) {
1813                 drbg_string_fill(&testentropy, test->entprb, test->entprlen);
1814                 ret = crypto_drbg_get_bytes_addtl_test(drng,
1815                         buf, test->expectedlen, &addtl, &test_data);
1816         } else {
1817                 ret = crypto_drbg_get_bytes_addtl(drng,
1818                         buf, test->expectedlen, &addtl);
1819         }
1820         if (ret <= 0) {
1821                 printk(KERN_ERR "alg: drbg: could not obtain random data for "
1822                        "driver %s\n", driver);
1823                 goto outbuf;
1824         }
1825
1826         ret = memcmp(test->expected, buf, test->expectedlen);
1827
1828 outbuf:
1829         crypto_free_rng(drng);
1830         kzfree(buf);
1831         return ret;
1832 }
1833
1834
1835 static int alg_test_drbg(const struct alg_test_desc *desc, const char *driver,
1836                          u32 type, u32 mask)
1837 {
1838         int err = 0;
1839         int pr = 0;
1840         int i = 0;
1841         struct drbg_testvec *template = desc->suite.drbg.vecs;
1842         unsigned int tcount = desc->suite.drbg.count;
1843
1844         if (0 == memcmp(driver, "drbg_pr_", 8))
1845                 pr = 1;
1846
1847         for (i = 0; i < tcount; i++) {
1848                 err = drbg_cavs_test(&template[i], pr, driver, type, mask);
1849                 if (err) {
1850                         printk(KERN_ERR "alg: drbg: Test %d failed for %s\n",
1851                                i, driver);
1852                         err = -EINVAL;
1853                         break;
1854                 }
1855         }
1856         return err;
1857
1858 }
1859
1860 static int alg_test_null(const struct alg_test_desc *desc,
1861                              const char *driver, u32 type, u32 mask)
1862 {
1863         return 0;
1864 }
1865
1866 /* Please keep this list sorted by algorithm name. */
1867 static const struct alg_test_desc alg_test_descs[] = {
1868         {
1869                 .alg = "__cbc-cast5-avx",
1870                 .test = alg_test_null,
1871         }, {
1872                 .alg = "__cbc-cast6-avx",
1873                 .test = alg_test_null,
1874         }, {
1875                 .alg = "__cbc-serpent-avx",
1876                 .test = alg_test_null,
1877         }, {
1878                 .alg = "__cbc-serpent-avx2",
1879                 .test = alg_test_null,
1880         }, {
1881                 .alg = "__cbc-serpent-sse2",
1882                 .test = alg_test_null,
1883         }, {
1884                 .alg = "__cbc-twofish-avx",
1885                 .test = alg_test_null,
1886         }, {
1887                 .alg = "__driver-cbc-aes-aesni",
1888                 .test = alg_test_null,
1889                 .fips_allowed = 1,
1890         }, {
1891                 .alg = "__driver-cbc-camellia-aesni",
1892                 .test = alg_test_null,
1893         }, {
1894                 .alg = "__driver-cbc-camellia-aesni-avx2",
1895                 .test = alg_test_null,
1896         }, {
1897                 .alg = "__driver-cbc-cast5-avx",
1898                 .test = alg_test_null,
1899         }, {
1900                 .alg = "__driver-cbc-cast6-avx",
1901                 .test = alg_test_null,
1902         }, {
1903                 .alg = "__driver-cbc-serpent-avx",
1904                 .test = alg_test_null,
1905         }, {
1906                 .alg = "__driver-cbc-serpent-avx2",
1907                 .test = alg_test_null,
1908         }, {
1909                 .alg = "__driver-cbc-serpent-sse2",
1910                 .test = alg_test_null,
1911         }, {
1912                 .alg = "__driver-cbc-twofish-avx",
1913                 .test = alg_test_null,
1914         }, {
1915                 .alg = "__driver-ecb-aes-aesni",
1916                 .test = alg_test_null,
1917                 .fips_allowed = 1,
1918         }, {
1919                 .alg = "__driver-ecb-camellia-aesni",
1920                 .test = alg_test_null,
1921         }, {
1922                 .alg = "__driver-ecb-camellia-aesni-avx2",
1923                 .test = alg_test_null,
1924         }, {
1925                 .alg = "__driver-ecb-cast5-avx",
1926                 .test = alg_test_null,
1927         }, {
1928                 .alg = "__driver-ecb-cast6-avx",
1929                 .test = alg_test_null,
1930         }, {
1931                 .alg = "__driver-ecb-serpent-avx",
1932                 .test = alg_test_null,
1933         }, {
1934                 .alg = "__driver-ecb-serpent-avx2",
1935                 .test = alg_test_null,
1936         }, {
1937                 .alg = "__driver-ecb-serpent-sse2",
1938                 .test = alg_test_null,
1939         }, {
1940                 .alg = "__driver-ecb-twofish-avx",
1941                 .test = alg_test_null,
1942         }, {
1943                 .alg = "__ghash-pclmulqdqni",
1944                 .test = alg_test_null,
1945                 .fips_allowed = 1,
1946         }, {
1947                 .alg = "ansi_cprng",
1948                 .test = alg_test_cprng,
1949                 .fips_allowed = 1,
1950                 .suite = {
1951                         .cprng = {
1952                                 .vecs = ansi_cprng_aes_tv_template,
1953                                 .count = ANSI_CPRNG_AES_TEST_VECTORS
1954                         }
1955                 }
1956         }, {
1957                 .alg = "authenc(hmac(md5),ecb(cipher_null))",
1958                 .test = alg_test_aead,
1959                 .fips_allowed = 1,
1960                 .suite = {
1961                         .aead = {
1962                                 .enc = {
1963                                         .vecs = hmac_md5_ecb_cipher_null_enc_tv_template,
1964                                         .count = HMAC_MD5_ECB_CIPHER_NULL_ENC_TEST_VECTORS
1965                                 },
1966                                 .dec = {
1967                                         .vecs = hmac_md5_ecb_cipher_null_dec_tv_template,
1968                                         .count = HMAC_MD5_ECB_CIPHER_NULL_DEC_TEST_VECTORS
1969                                 }
1970                         }
1971                 }
1972         }, {
1973                 .alg = "authenc(hmac(sha1),cbc(aes))",
1974                 .test = alg_test_aead,
1975                 .fips_allowed = 1,
1976                 .suite = {
1977                         .aead = {
1978                                 .enc = {
1979                                         .vecs =
1980                                         hmac_sha1_aes_cbc_enc_tv_temp,
1981                                         .count =
1982                                         HMAC_SHA1_AES_CBC_ENC_TEST_VEC
1983                                 }
1984                         }
1985                 }
1986         }, {
1987                 .alg = "authenc(hmac(sha1),cbc(des))",
1988                 .test = alg_test_aead,
1989                 .fips_allowed = 1,
1990                 .suite = {
1991                         .aead = {
1992                                 .enc = {
1993                                         .vecs =
1994                                         hmac_sha1_des_cbc_enc_tv_temp,
1995                                         .count =
1996                                         HMAC_SHA1_DES_CBC_ENC_TEST_VEC
1997                                 }
1998                         }
1999                 }
2000         }, {
2001                 .alg = "authenc(hmac(sha1),cbc(des3_ede))",
2002                 .test = alg_test_aead,
2003                 .fips_allowed = 1,
2004                 .suite = {
2005                         .aead = {
2006                                 .enc = {
2007                                         .vecs =
2008                                         hmac_sha1_des3_ede_cbc_enc_tv_temp,
2009                                         .count =
2010                                         HMAC_SHA1_DES3_EDE_CBC_ENC_TEST_VEC
2011                                 }
2012                         }
2013                 }
2014         }, {
2015                 .alg = "authenc(hmac(sha1),ecb(cipher_null))",
2016                 .test = alg_test_aead,
2017                 .fips_allowed = 1,
2018                 .suite = {
2019                         .aead = {
2020                                 .enc = {
2021                                         .vecs =
2022                                         hmac_sha1_ecb_cipher_null_enc_tv_temp,
2023                                         .count =
2024                                         HMAC_SHA1_ECB_CIPHER_NULL_ENC_TEST_VEC
2025                                 },
2026                                 .dec = {
2027                                         .vecs =
2028                                         hmac_sha1_ecb_cipher_null_dec_tv_temp,
2029                                         .count =
2030                                         HMAC_SHA1_ECB_CIPHER_NULL_DEC_TEST_VEC
2031                                 }
2032                         }
2033                 }
2034         }, {
2035                 .alg = "authenc(hmac(sha224),cbc(des))",
2036                 .test = alg_test_aead,
2037                 .fips_allowed = 1,
2038                 .suite = {
2039                         .aead = {
2040                                 .enc = {
2041                                         .vecs =
2042                                         hmac_sha224_des_cbc_enc_tv_temp,
2043                                         .count =
2044                                         HMAC_SHA224_DES_CBC_ENC_TEST_VEC
2045                                 }
2046                         }
2047                 }
2048         }, {
2049                 .alg = "authenc(hmac(sha224),cbc(des3_ede))",
2050                 .test = alg_test_aead,
2051                 .fips_allowed = 1,
2052                 .suite = {
2053                         .aead = {
2054                                 .enc = {
2055                                         .vecs =
2056                                         hmac_sha224_des3_ede_cbc_enc_tv_temp,
2057                                         .count =
2058                                         HMAC_SHA224_DES3_EDE_CBC_ENC_TEST_VEC
2059                                 }
2060                         }
2061                 }
2062         }, {
2063                 .alg = "authenc(hmac(sha256),cbc(aes))",
2064                 .test = alg_test_aead,
2065                 .fips_allowed = 1,
2066                 .suite = {
2067                         .aead = {
2068                                 .enc = {
2069                                         .vecs =
2070                                         hmac_sha256_aes_cbc_enc_tv_temp,
2071                                         .count =
2072                                         HMAC_SHA256_AES_CBC_ENC_TEST_VEC
2073                                 }
2074                         }
2075                 }
2076         }, {
2077                 .alg = "authenc(hmac(sha256),cbc(des))",
2078                 .test = alg_test_aead,
2079                 .fips_allowed = 1,
2080                 .suite = {
2081                         .aead = {
2082                                 .enc = {
2083                                         .vecs =
2084                                         hmac_sha256_des_cbc_enc_tv_temp,
2085                                         .count =
2086                                         HMAC_SHA256_DES_CBC_ENC_TEST_VEC
2087                                 }
2088                         }
2089                 }
2090         }, {
2091                 .alg = "authenc(hmac(sha256),cbc(des3_ede))",
2092                 .test = alg_test_aead,
2093                 .fips_allowed = 1,
2094                 .suite = {
2095                         .aead = {
2096                                 .enc = {
2097                                         .vecs =
2098                                         hmac_sha256_des3_ede_cbc_enc_tv_temp,
2099                                         .count =
2100                                         HMAC_SHA256_DES3_EDE_CBC_ENC_TEST_VEC
2101                                 }
2102                         }
2103                 }
2104         }, {
2105                 .alg = "authenc(hmac(sha384),cbc(des))",
2106                 .test = alg_test_aead,
2107                 .fips_allowed = 1,
2108                 .suite = {
2109                         .aead = {
2110                                 .enc = {
2111                                         .vecs =
2112                                         hmac_sha384_des_cbc_enc_tv_temp,
2113                                         .count =
2114                                         HMAC_SHA384_DES_CBC_ENC_TEST_VEC
2115                                 }
2116                         }
2117                 }
2118         }, {
2119                 .alg = "authenc(hmac(sha384),cbc(des3_ede))",
2120                 .test = alg_test_aead,
2121                 .fips_allowed = 1,
2122                 .suite = {
2123                         .aead = {
2124                                 .enc = {
2125                                         .vecs =
2126                                         hmac_sha384_des3_ede_cbc_enc_tv_temp,
2127                                         .count =
2128                                         HMAC_SHA384_DES3_EDE_CBC_ENC_TEST_VEC
2129                                 }
2130                         }
2131                 }
2132         }, {
2133                 .alg = "authenc(hmac(sha512),cbc(aes))",
2134                 .test = alg_test_aead,
2135                 .fips_allowed = 1,
2136                 .suite = {
2137                         .aead = {
2138                                 .enc = {
2139                                         .vecs =
2140                                         hmac_sha512_aes_cbc_enc_tv_temp,
2141                                         .count =
2142                                         HMAC_SHA512_AES_CBC_ENC_TEST_VEC
2143                                 }
2144                         }
2145                 }
2146         }, {
2147                 .alg = "authenc(hmac(sha512),cbc(des))",
2148                 .test = alg_test_aead,
2149                 .fips_allowed = 1,
2150                 .suite = {
2151                         .aead = {
2152                                 .enc = {
2153                                         .vecs =
2154                                         hmac_sha512_des_cbc_enc_tv_temp,
2155                                         .count =
2156                                         HMAC_SHA512_DES_CBC_ENC_TEST_VEC
2157                                 }
2158                         }
2159                 }
2160         }, {
2161                 .alg = "authenc(hmac(sha512),cbc(des3_ede))",
2162                 .test = alg_test_aead,
2163                 .fips_allowed = 1,
2164                 .suite = {
2165                         .aead = {
2166                                 .enc = {
2167                                         .vecs =
2168                                         hmac_sha512_des3_ede_cbc_enc_tv_temp,
2169                                         .count =
2170                                         HMAC_SHA512_DES3_EDE_CBC_ENC_TEST_VEC
2171                                 }
2172                         }
2173                 }
2174         }, {
2175                 .alg = "cbc(aes)",
2176                 .test = alg_test_skcipher,
2177                 .fips_allowed = 1,
2178                 .suite = {
2179                         .cipher = {
2180                                 .enc = {
2181                                         .vecs = aes_cbc_enc_tv_template,
2182                                         .count = AES_CBC_ENC_TEST_VECTORS
2183                                 },
2184                                 .dec = {
2185                                         .vecs = aes_cbc_dec_tv_template,
2186                                         .count = AES_CBC_DEC_TEST_VECTORS
2187                                 }
2188                         }
2189                 }
2190         }, {
2191                 .alg = "cbc(anubis)",
2192                 .test = alg_test_skcipher,
2193                 .suite = {
2194                         .cipher = {
2195                                 .enc = {
2196                                         .vecs = anubis_cbc_enc_tv_template,
2197                                         .count = ANUBIS_CBC_ENC_TEST_VECTORS
2198                                 },
2199                                 .dec = {
2200                                         .vecs = anubis_cbc_dec_tv_template,
2201                                         .count = ANUBIS_CBC_DEC_TEST_VECTORS
2202                                 }
2203                         }
2204                 }
2205         }, {
2206                 .alg = "cbc(blowfish)",
2207                 .test = alg_test_skcipher,
2208                 .suite = {
2209                         .cipher = {
2210                                 .enc = {
2211                                         .vecs = bf_cbc_enc_tv_template,
2212                                         .count = BF_CBC_ENC_TEST_VECTORS
2213                                 },
2214                                 .dec = {
2215                                         .vecs = bf_cbc_dec_tv_template,
2216                                         .count = BF_CBC_DEC_TEST_VECTORS
2217                                 }
2218                         }
2219                 }
2220         }, {
2221                 .alg = "cbc(camellia)",
2222                 .test = alg_test_skcipher,
2223                 .suite = {
2224                         .cipher = {
2225                                 .enc = {
2226                                         .vecs = camellia_cbc_enc_tv_template,
2227                                         .count = CAMELLIA_CBC_ENC_TEST_VECTORS
2228                                 },
2229                                 .dec = {
2230                                         .vecs = camellia_cbc_dec_tv_template,
2231                                         .count = CAMELLIA_CBC_DEC_TEST_VECTORS
2232                                 }
2233                         }
2234                 }
2235         }, {
2236                 .alg = "cbc(cast5)",
2237                 .test = alg_test_skcipher,
2238                 .suite = {
2239                         .cipher = {
2240                                 .enc = {
2241                                         .vecs = cast5_cbc_enc_tv_template,
2242                                         .count = CAST5_CBC_ENC_TEST_VECTORS
2243                                 },
2244                                 .dec = {
2245                                         .vecs = cast5_cbc_dec_tv_template,
2246                                         .count = CAST5_CBC_DEC_TEST_VECTORS
2247                                 }
2248                         }
2249                 }
2250         }, {
2251                 .alg = "cbc(cast6)",
2252                 .test = alg_test_skcipher,
2253                 .suite = {
2254                         .cipher = {
2255                                 .enc = {
2256                                         .vecs = cast6_cbc_enc_tv_template,
2257                                         .count = CAST6_CBC_ENC_TEST_VECTORS
2258                                 },
2259                                 .dec = {
2260                                         .vecs = cast6_cbc_dec_tv_template,
2261                                         .count = CAST6_CBC_DEC_TEST_VECTORS
2262                                 }
2263                         }
2264                 }
2265         }, {
2266                 .alg = "cbc(des)",
2267                 .test = alg_test_skcipher,
2268                 .suite = {
2269                         .cipher = {
2270                                 .enc = {
2271                                         .vecs = des_cbc_enc_tv_template,
2272                                         .count = DES_CBC_ENC_TEST_VECTORS
2273                                 },
2274                                 .dec = {
2275                                         .vecs = des_cbc_dec_tv_template,
2276                                         .count = DES_CBC_DEC_TEST_VECTORS
2277                                 }
2278                         }
2279                 }
2280         }, {
2281                 .alg = "cbc(des3_ede)",
2282                 .test = alg_test_skcipher,
2283                 .fips_allowed = 1,
2284                 .suite = {
2285                         .cipher = {
2286                                 .enc = {
2287                                         .vecs = des3_ede_cbc_enc_tv_template,
2288                                         .count = DES3_EDE_CBC_ENC_TEST_VECTORS
2289                                 },
2290                                 .dec = {
2291                                         .vecs = des3_ede_cbc_dec_tv_template,
2292                                         .count = DES3_EDE_CBC_DEC_TEST_VECTORS
2293                                 }
2294                         }
2295                 }
2296         }, {
2297                 .alg = "cbc(serpent)",
2298                 .test = alg_test_skcipher,
2299                 .suite = {
2300                         .cipher = {
2301                                 .enc = {
2302                                         .vecs = serpent_cbc_enc_tv_template,
2303                                         .count = SERPENT_CBC_ENC_TEST_VECTORS
2304                                 },
2305                                 .dec = {
2306                                         .vecs = serpent_cbc_dec_tv_template,
2307                                         .count = SERPENT_CBC_DEC_TEST_VECTORS
2308                                 }
2309                         }
2310                 }
2311         }, {
2312                 .alg = "cbc(twofish)",
2313                 .test = alg_test_skcipher,
2314                 .suite = {
2315                         .cipher = {
2316                                 .enc = {
2317                                         .vecs = tf_cbc_enc_tv_template,
2318                                         .count = TF_CBC_ENC_TEST_VECTORS
2319                                 },
2320                                 .dec = {
2321                                         .vecs = tf_cbc_dec_tv_template,
2322                                         .count = TF_CBC_DEC_TEST_VECTORS
2323                                 }
2324                         }
2325                 }
2326         }, {
2327                 .alg = "ccm(aes)",
2328                 .test = alg_test_aead,
2329                 .fips_allowed = 1,
2330                 .suite = {
2331                         .aead = {
2332                                 .enc = {
2333                                         .vecs = aes_ccm_enc_tv_template,
2334                                         .count = AES_CCM_ENC_TEST_VECTORS
2335                                 },
2336                                 .dec = {
2337                                         .vecs = aes_ccm_dec_tv_template,
2338                                         .count = AES_CCM_DEC_TEST_VECTORS
2339                                 }
2340                         }
2341                 }
2342         }, {
2343                 .alg = "cmac(aes)",
2344                 .test = alg_test_hash,
2345                 .suite = {
2346                         .hash = {
2347                                 .vecs = aes_cmac128_tv_template,
2348                                 .count = CMAC_AES_TEST_VECTORS
2349                         }
2350                 }
2351         }, {
2352                 .alg = "cmac(des3_ede)",
2353                 .test = alg_test_hash,
2354                 .suite = {
2355                         .hash = {
2356                                 .vecs = des3_ede_cmac64_tv_template,
2357                                 .count = CMAC_DES3_EDE_TEST_VECTORS
2358                         }
2359                 }
2360         }, {
2361                 .alg = "compress_null",
2362                 .test = alg_test_null,
2363         }, {
2364                 .alg = "crc32c",
2365                 .test = alg_test_crc32c,
2366                 .fips_allowed = 1,
2367                 .suite = {
2368                         .hash = {
2369                                 .vecs = crc32c_tv_template,
2370                                 .count = CRC32C_TEST_VECTORS
2371                         }
2372                 }
2373         }, {
2374                 .alg = "crct10dif",
2375                 .test = alg_test_hash,
2376                 .fips_allowed = 1,
2377                 .suite = {
2378                         .hash = {
2379                                 .vecs = crct10dif_tv_template,
2380                                 .count = CRCT10DIF_TEST_VECTORS
2381                         }
2382                 }
2383         }, {
2384                 .alg = "cryptd(__driver-cbc-aes-aesni)",
2385                 .test = alg_test_null,
2386                 .fips_allowed = 1,
2387         }, {
2388                 .alg = "cryptd(__driver-cbc-camellia-aesni)",
2389                 .test = alg_test_null,
2390         }, {
2391                 .alg = "cryptd(__driver-cbc-camellia-aesni-avx2)",
2392                 .test = alg_test_null,
2393         }, {
2394                 .alg = "cryptd(__driver-cbc-serpent-avx2)",
2395                 .test = alg_test_null,
2396         }, {
2397                 .alg = "cryptd(__driver-ecb-aes-aesni)",
2398                 .test = alg_test_null,
2399                 .fips_allowed = 1,
2400         }, {
2401                 .alg = "cryptd(__driver-ecb-camellia-aesni)",
2402                 .test = alg_test_null,
2403         }, {
2404                 .alg = "cryptd(__driver-ecb-camellia-aesni-avx2)",
2405                 .test = alg_test_null,
2406         }, {
2407                 .alg = "cryptd(__driver-ecb-cast5-avx)",
2408                 .test = alg_test_null,
2409         }, {
2410                 .alg = "cryptd(__driver-ecb-cast6-avx)",
2411                 .test = alg_test_null,
2412         }, {
2413                 .alg = "cryptd(__driver-ecb-serpent-avx)",
2414                 .test = alg_test_null,
2415         }, {
2416                 .alg = "cryptd(__driver-ecb-serpent-avx2)",
2417                 .test = alg_test_null,
2418         }, {
2419                 .alg = "cryptd(__driver-ecb-serpent-sse2)",
2420                 .test = alg_test_null,
2421         }, {
2422                 .alg = "cryptd(__driver-ecb-twofish-avx)",
2423                 .test = alg_test_null,
2424         }, {
2425                 .alg = "cryptd(__driver-gcm-aes-aesni)",
2426                 .test = alg_test_null,
2427                 .fips_allowed = 1,
2428         }, {
2429                 .alg = "cryptd(__ghash-pclmulqdqni)",
2430                 .test = alg_test_null,
2431                 .fips_allowed = 1,
2432         }, {
2433                 .alg = "ctr(aes)",
2434                 .test = alg_test_skcipher,
2435                 .fips_allowed = 1,
2436                 .suite = {
2437                         .cipher = {
2438                                 .enc = {
2439                                         .vecs = aes_ctr_enc_tv_template,
2440                                         .count = AES_CTR_ENC_TEST_VECTORS
2441                                 },
2442                                 .dec = {
2443                                         .vecs = aes_ctr_dec_tv_template,
2444                                         .count = AES_CTR_DEC_TEST_VECTORS
2445                                 }
2446                         }
2447                 }
2448         }, {
2449                 .alg = "ctr(blowfish)",
2450                 .test = alg_test_skcipher,
2451                 .suite = {
2452                         .cipher = {
2453                                 .enc = {
2454                                         .vecs = bf_ctr_enc_tv_template,
2455                                         .count = BF_CTR_ENC_TEST_VECTORS
2456                                 },
2457                                 .dec = {
2458                                         .vecs = bf_ctr_dec_tv_template,
2459                                         .count = BF_CTR_DEC_TEST_VECTORS
2460                                 }
2461                         }
2462                 }
2463         }, {
2464                 .alg = "ctr(camellia)",
2465                 .test = alg_test_skcipher,
2466                 .suite = {
2467                         .cipher = {
2468                                 .enc = {
2469                                         .vecs = camellia_ctr_enc_tv_template,
2470                                         .count = CAMELLIA_CTR_ENC_TEST_VECTORS
2471                                 },
2472                                 .dec = {
2473                                         .vecs = camellia_ctr_dec_tv_template,
2474                                         .count = CAMELLIA_CTR_DEC_TEST_VECTORS
2475                                 }
2476                         }
2477                 }
2478         }, {
2479                 .alg = "ctr(cast5)",
2480                 .test = alg_test_skcipher,
2481                 .suite = {
2482                         .cipher = {
2483                                 .enc = {
2484                                         .vecs = cast5_ctr_enc_tv_template,
2485                                         .count = CAST5_CTR_ENC_TEST_VECTORS
2486                                 },
2487                                 .dec = {
2488                                         .vecs = cast5_ctr_dec_tv_template,
2489                                         .count = CAST5_CTR_DEC_TEST_VECTORS
2490                                 }
2491                         }
2492                 }
2493         }, {
2494                 .alg = "ctr(cast6)",
2495                 .test = alg_test_skcipher,
2496                 .suite = {
2497                         .cipher = {
2498                                 .enc = {
2499                                         .vecs = cast6_ctr_enc_tv_template,
2500                                         .count = CAST6_CTR_ENC_TEST_VECTORS
2501                                 },
2502                                 .dec = {
2503                                         .vecs = cast6_ctr_dec_tv_template,
2504                                         .count = CAST6_CTR_DEC_TEST_VECTORS
2505                                 }
2506                         }
2507                 }
2508         }, {
2509                 .alg = "ctr(des)",
2510                 .test = alg_test_skcipher,
2511                 .suite = {
2512                         .cipher = {
2513                                 .enc = {
2514                                         .vecs = des_ctr_enc_tv_template,
2515                                         .count = DES_CTR_ENC_TEST_VECTORS
2516                                 },
2517                                 .dec = {
2518                                         .vecs = des_ctr_dec_tv_template,
2519                                         .count = DES_CTR_DEC_TEST_VECTORS
2520                                 }
2521                         }
2522                 }
2523         }, {
2524                 .alg = "ctr(des3_ede)",
2525                 .test = alg_test_skcipher,
2526                 .suite = {
2527                         .cipher = {
2528                                 .enc = {
2529                                         .vecs = des3_ede_ctr_enc_tv_template,
2530                                         .count = DES3_EDE_CTR_ENC_TEST_VECTORS
2531                                 },
2532                                 .dec = {
2533                                         .vecs = des3_ede_ctr_dec_tv_template,
2534                                         .count = DES3_EDE_CTR_DEC_TEST_VECTORS
2535                                 }
2536                         }
2537                 }
2538         }, {
2539                 .alg = "ctr(serpent)",
2540                 .test = alg_test_skcipher,
2541                 .suite = {
2542                         .cipher = {
2543                                 .enc = {
2544                                         .vecs = serpent_ctr_enc_tv_template,
2545                                         .count = SERPENT_CTR_ENC_TEST_VECTORS
2546                                 },
2547                                 .dec = {
2548                                         .vecs = serpent_ctr_dec_tv_template,
2549                                         .count = SERPENT_CTR_DEC_TEST_VECTORS
2550                                 }
2551                         }
2552                 }
2553         }, {
2554                 .alg = "ctr(twofish)",
2555                 .test = alg_test_skcipher,
2556                 .suite = {
2557                         .cipher = {
2558                                 .enc = {
2559                                         .vecs = tf_ctr_enc_tv_template,
2560                                         .count = TF_CTR_ENC_TEST_VECTORS
2561                                 },
2562                                 .dec = {
2563                                         .vecs = tf_ctr_dec_tv_template,
2564                                         .count = TF_CTR_DEC_TEST_VECTORS
2565                                 }
2566                         }
2567                 }
2568         }, {
2569                 .alg = "cts(cbc(aes))",
2570                 .test = alg_test_skcipher,
2571                 .suite = {
2572                         .cipher = {
2573                                 .enc = {
2574                                         .vecs = cts_mode_enc_tv_template,
2575                                         .count = CTS_MODE_ENC_TEST_VECTORS
2576                                 },
2577                                 .dec = {
2578                                         .vecs = cts_mode_dec_tv_template,
2579                                         .count = CTS_MODE_DEC_TEST_VECTORS
2580                                 }
2581                         }
2582                 }
2583         }, {
2584                 .alg = "deflate",
2585                 .test = alg_test_comp,
2586                 .fips_allowed = 1,
2587                 .suite = {
2588                         .comp = {
2589                                 .comp = {
2590                                         .vecs = deflate_comp_tv_template,
2591                                         .count = DEFLATE_COMP_TEST_VECTORS
2592                                 },
2593                                 .decomp = {
2594                                         .vecs = deflate_decomp_tv_template,
2595                                         .count = DEFLATE_DECOMP_TEST_VECTORS
2596                                 }
2597                         }
2598                 }
2599         }, {
2600                 .alg = "digest_null",
2601                 .test = alg_test_null,
2602         }, {
2603                 .alg = "drbg_nopr_ctr_aes128",
2604                 .test = alg_test_drbg,
2605                 .fips_allowed = 1,
2606                 .suite = {
2607                         .drbg = {
2608                                 .vecs = drbg_nopr_ctr_aes128_tv_template,
2609                                 .count = ARRAY_SIZE(drbg_nopr_ctr_aes128_tv_template)
2610                         }
2611                 }
2612         }, {
2613                 .alg = "drbg_nopr_ctr_aes192",
2614                 .test = alg_test_drbg,
2615                 .fips_allowed = 1,
2616                 .suite = {
2617                         .drbg = {
2618                                 .vecs = drbg_nopr_ctr_aes192_tv_template,
2619                                 .count = ARRAY_SIZE(drbg_nopr_ctr_aes192_tv_template)
2620                         }
2621                 }
2622         }, {
2623                 .alg = "drbg_nopr_ctr_aes256",
2624                 .test = alg_test_drbg,
2625                 .fips_allowed = 1,
2626                 .suite = {
2627                         .drbg = {
2628                                 .vecs = drbg_nopr_ctr_aes256_tv_template,
2629                                 .count = ARRAY_SIZE(drbg_nopr_ctr_aes256_tv_template)
2630                         }
2631                 }
2632         }, {
2633                 /*
2634                  * There is no need to specifically test the DRBG with every
2635                  * backend cipher -- covered by drbg_nopr_hmac_sha256 test
2636                  */
2637                 .alg = "drbg_nopr_hmac_sha1",
2638                 .fips_allowed = 1,
2639                 .test = alg_test_null,
2640         }, {
2641                 .alg = "drbg_nopr_hmac_sha256",
2642                 .test = alg_test_drbg,
2643                 .fips_allowed = 1,
2644                 .suite = {
2645                         .drbg = {
2646                                 .vecs = drbg_nopr_hmac_sha256_tv_template,
2647                                 .count =
2648                                 ARRAY_SIZE(drbg_nopr_hmac_sha256_tv_template)
2649                         }
2650                 }
2651         }, {
2652                 /* covered by drbg_nopr_hmac_sha256 test */
2653                 .alg = "drbg_nopr_hmac_sha384",
2654                 .fips_allowed = 1,
2655                 .test = alg_test_null,
2656         }, {
2657                 .alg = "drbg_nopr_hmac_sha512",
2658                 .test = alg_test_null,
2659                 .fips_allowed = 1,
2660         }, {
2661                 .alg = "drbg_nopr_sha1",
2662                 .fips_allowed = 1,
2663                 .test = alg_test_null,
2664         }, {
2665                 .alg = "drbg_nopr_sha256",
2666                 .test = alg_test_drbg,
2667                 .fips_allowed = 1,
2668                 .suite = {
2669                         .drbg = {
2670                                 .vecs = drbg_nopr_sha256_tv_template,
2671                                 .count = ARRAY_SIZE(drbg_nopr_sha256_tv_template)
2672                         }
2673                 }
2674         }, {
2675                 /* covered by drbg_nopr_sha256 test */
2676                 .alg = "drbg_nopr_sha384",
2677                 .fips_allowed = 1,
2678                 .test = alg_test_null,
2679         }, {
2680                 .alg = "drbg_nopr_sha512",
2681                 .fips_allowed = 1,
2682                 .test = alg_test_null,
2683         }, {
2684                 .alg = "drbg_pr_ctr_aes128",
2685                 .test = alg_test_drbg,
2686                 .fips_allowed = 1,
2687                 .suite = {
2688                         .drbg = {
2689                                 .vecs = drbg_pr_ctr_aes128_tv_template,
2690                                 .count = ARRAY_SIZE(drbg_pr_ctr_aes128_tv_template)
2691                         }
2692                 }
2693         }, {
2694                 /* covered by drbg_pr_ctr_aes128 test */
2695                 .alg = "drbg_pr_ctr_aes192",
2696                 .fips_allowed = 1,
2697                 .test = alg_test_null,
2698         }, {
2699                 .alg = "drbg_pr_ctr_aes256",
2700                 .fips_allowed = 1,
2701                 .test = alg_test_null,
2702         }, {
2703                 .alg = "drbg_pr_hmac_sha1",
2704                 .fips_allowed = 1,
2705                 .test = alg_test_null,
2706         }, {
2707                 .alg = "drbg_pr_hmac_sha256",
2708                 .test = alg_test_drbg,
2709                 .fips_allowed = 1,
2710                 .suite = {
2711                         .drbg = {
2712                                 .vecs = drbg_pr_hmac_sha256_tv_template,
2713                                 .count = ARRAY_SIZE(drbg_pr_hmac_sha256_tv_template)
2714                         }
2715                 }
2716         }, {
2717                 /* covered by drbg_pr_hmac_sha256 test */
2718                 .alg = "drbg_pr_hmac_sha384",
2719                 .fips_allowed = 1,
2720                 .test = alg_test_null,
2721         }, {
2722                 .alg = "drbg_pr_hmac_sha512",
2723                 .test = alg_test_null,
2724                 .fips_allowed = 1,
2725         }, {
2726                 .alg = "drbg_pr_sha1",
2727                 .fips_allowed = 1,
2728                 .test = alg_test_null,
2729         }, {
2730                 .alg = "drbg_pr_sha256",
2731                 .test = alg_test_drbg,
2732                 .fips_allowed = 1,
2733                 .suite = {
2734                         .drbg = {
2735                                 .vecs = drbg_pr_sha256_tv_template,
2736                                 .count = ARRAY_SIZE(drbg_pr_sha256_tv_template)
2737                         }
2738                 }
2739         }, {
2740                 /* covered by drbg_pr_sha256 test */
2741                 .alg = "drbg_pr_sha384",
2742                 .fips_allowed = 1,
2743                 .test = alg_test_null,
2744         }, {
2745                 .alg = "drbg_pr_sha512",
2746                 .fips_allowed = 1,
2747                 .test = alg_test_null,
2748         }, {
2749                 .alg = "ecb(__aes-aesni)",
2750                 .test = alg_test_null,
2751                 .fips_allowed = 1,
2752         }, {
2753                 .alg = "ecb(aes)",
2754                 .test = alg_test_skcipher,
2755                 .fips_allowed = 1,
2756                 .suite = {
2757                         .cipher = {
2758                                 .enc = {
2759                                         .vecs = aes_enc_tv_template,
2760                                         .count = AES_ENC_TEST_VECTORS
2761                                 },
2762                                 .dec = {
2763                                         .vecs = aes_dec_tv_template,
2764                                         .count = AES_DEC_TEST_VECTORS
2765                                 }
2766                         }
2767                 }
2768         }, {
2769                 .alg = "ecb(anubis)",
2770                 .test = alg_test_skcipher,
2771                 .suite = {
2772                         .cipher = {
2773                                 .enc = {
2774                                         .vecs = anubis_enc_tv_template,
2775                                         .count = ANUBIS_ENC_TEST_VECTORS
2776                                 },
2777                                 .dec = {
2778                                         .vecs = anubis_dec_tv_template,
2779                                         .count = ANUBIS_DEC_TEST_VECTORS
2780                                 }
2781                         }
2782                 }
2783         }, {
2784                 .alg = "ecb(arc4)",
2785                 .test = alg_test_skcipher,
2786                 .suite = {
2787                         .cipher = {
2788                                 .enc = {
2789                                         .vecs = arc4_enc_tv_template,
2790                                         .count = ARC4_ENC_TEST_VECTORS
2791                                 },
2792                                 .dec = {
2793                                         .vecs = arc4_dec_tv_template,
2794                                         .count = ARC4_DEC_TEST_VECTORS
2795                                 }
2796                         }
2797                 }
2798         }, {
2799                 .alg = "ecb(blowfish)",
2800                 .test = alg_test_skcipher,
2801                 .suite = {
2802                         .cipher = {
2803                                 .enc = {
2804                                         .vecs = bf_enc_tv_template,
2805                                         .count = BF_ENC_TEST_VECTORS
2806                                 },
2807                                 .dec = {
2808                                         .vecs = bf_dec_tv_template,
2809                                         .count = BF_DEC_TEST_VECTORS
2810                                 }
2811                         }
2812                 }
2813         }, {
2814                 .alg = "ecb(camellia)",
2815                 .test = alg_test_skcipher,
2816                 .suite = {
2817                         .cipher = {
2818                                 .enc = {
2819                                         .vecs = camellia_enc_tv_template,
2820                                         .count = CAMELLIA_ENC_TEST_VECTORS
2821                                 },
2822                                 .dec = {
2823                                         .vecs = camellia_dec_tv_template,
2824                                         .count = CAMELLIA_DEC_TEST_VECTORS
2825                                 }
2826                         }
2827                 }
2828         }, {
2829                 .alg = "ecb(cast5)",
2830                 .test = alg_test_skcipher,
2831                 .suite = {
2832                         .cipher = {
2833                                 .enc = {
2834                                         .vecs = cast5_enc_tv_template,
2835                                         .count = CAST5_ENC_TEST_VECTORS
2836                                 },
2837                                 .dec = {
2838                                         .vecs = cast5_dec_tv_template,
2839                                         .count = CAST5_DEC_TEST_VECTORS
2840                                 }
2841                         }
2842                 }
2843         }, {
2844                 .alg = "ecb(cast6)",
2845                 .test = alg_test_skcipher,
2846                 .suite = {
2847                         .cipher = {
2848                                 .enc = {
2849                                         .vecs = cast6_enc_tv_template,
2850                                         .count = CAST6_ENC_TEST_VECTORS
2851                                 },
2852                                 .dec = {
2853                                         .vecs = cast6_dec_tv_template,
2854                                         .count = CAST6_DEC_TEST_VECTORS
2855                                 }
2856                         }
2857                 }
2858         }, {
2859                 .alg = "ecb(cipher_null)",
2860                 .test = alg_test_null,
2861         }, {
2862                 .alg = "ecb(des)",
2863                 .test = alg_test_skcipher,
2864                 .fips_allowed = 1,
2865                 .suite = {
2866                         .cipher = {
2867                                 .enc = {
2868                                         .vecs = des_enc_tv_template,
2869                                         .count = DES_ENC_TEST_VECTORS
2870                                 },
2871                                 .dec = {
2872                                         .vecs = des_dec_tv_template,
2873                                         .count = DES_DEC_TEST_VECTORS
2874                                 }
2875                         }
2876                 }
2877         }, {
2878                 .alg = "ecb(des3_ede)",
2879                 .test = alg_test_skcipher,
2880                 .fips_allowed = 1,
2881                 .suite = {
2882                         .cipher = {
2883                                 .enc = {
2884                                         .vecs = des3_ede_enc_tv_template,
2885                                         .count = DES3_EDE_ENC_TEST_VECTORS
2886                                 },
2887                                 .dec = {
2888                                         .vecs = des3_ede_dec_tv_template,
2889                                         .count = DES3_EDE_DEC_TEST_VECTORS
2890                                 }
2891                         }
2892                 }
2893         }, {
2894                 .alg = "ecb(fcrypt)",
2895                 .test = alg_test_skcipher,
2896                 .suite = {
2897                         .cipher = {
2898                                 .enc = {
2899                                         .vecs = fcrypt_pcbc_enc_tv_template,
2900                                         .count = 1
2901                                 },
2902                                 .dec = {
2903                                         .vecs = fcrypt_pcbc_dec_tv_template,
2904                                         .count = 1
2905                                 }
2906                         }
2907                 }
2908         }, {
2909                 .alg = "ecb(khazad)",
2910                 .test = alg_test_skcipher,
2911                 .suite = {
2912                         .cipher = {
2913                                 .enc = {
2914                                         .vecs = khazad_enc_tv_template,
2915                                         .count = KHAZAD_ENC_TEST_VECTORS
2916                                 },
2917                                 .dec = {
2918                                         .vecs = khazad_dec_tv_template,
2919                                         .count = KHAZAD_DEC_TEST_VECTORS
2920                                 }
2921                         }
2922                 }
2923         }, {
2924                 .alg = "ecb(seed)",
2925                 .test = alg_test_skcipher,
2926                 .suite = {
2927                         .cipher = {
2928                                 .enc = {
2929                                         .vecs = seed_enc_tv_template,
2930                                         .count = SEED_ENC_TEST_VECTORS
2931                                 },
2932                                 .dec = {
2933                                         .vecs = seed_dec_tv_template,
2934                                         .count = SEED_DEC_TEST_VECTORS
2935                                 }
2936                         }
2937                 }
2938         }, {
2939                 .alg = "ecb(serpent)",
2940                 .test = alg_test_skcipher,
2941                 .suite = {
2942                         .cipher = {
2943                                 .enc = {
2944                                         .vecs = serpent_enc_tv_template,
2945                                         .count = SERPENT_ENC_TEST_VECTORS
2946                                 },
2947                                 .dec = {
2948                                         .vecs = serpent_dec_tv_template,
2949                                         .count = SERPENT_DEC_TEST_VECTORS
2950                                 }
2951                         }
2952                 }
2953         }, {
2954                 .alg = "ecb(tea)",
2955                 .test = alg_test_skcipher,
2956                 .suite = {
2957                         .cipher = {
2958                                 .enc = {
2959                                         .vecs = tea_enc_tv_template,
2960                                         .count = TEA_ENC_TEST_VECTORS
2961                                 },
2962                                 .dec = {
2963                                         .vecs = tea_dec_tv_template,
2964                                         .count = TEA_DEC_TEST_VECTORS
2965                                 }
2966                         }
2967                 }
2968         }, {
2969                 .alg = "ecb(tnepres)",
2970                 .test = alg_test_skcipher,
2971                 .suite = {
2972                         .cipher = {
2973                                 .enc = {
2974                                         .vecs = tnepres_enc_tv_template,
2975                                         .count = TNEPRES_ENC_TEST_VECTORS
2976                                 },
2977                                 .dec = {
2978                                         .vecs = tnepres_dec_tv_template,
2979                                         .count = TNEPRES_DEC_TEST_VECTORS
2980                                 }
2981                         }
2982                 }
2983         }, {
2984                 .alg = "ecb(twofish)",
2985                 .test = alg_test_skcipher,
2986                 .suite = {
2987                         .cipher = {
2988                                 .enc = {
2989                                         .vecs = tf_enc_tv_template,
2990                                         .count = TF_ENC_TEST_VECTORS
2991                                 },
2992                                 .dec = {
2993                                         .vecs = tf_dec_tv_template,
2994                                         .count = TF_DEC_TEST_VECTORS
2995                                 }
2996                         }
2997                 }
2998         }, {
2999                 .alg = "ecb(xeta)",
3000                 .test = alg_test_skcipher,
3001                 .suite = {
3002                         .cipher = {
3003                                 .enc = {
3004                                         .vecs = xeta_enc_tv_template,
3005                                         .count = XETA_ENC_TEST_VECTORS
3006                                 },
3007                                 .dec = {
3008                                         .vecs = xeta_dec_tv_template,
3009                                         .count = XETA_DEC_TEST_VECTORS
3010                                 }
3011                         }
3012                 }
3013         }, {
3014                 .alg = "ecb(xtea)",
3015                 .test = alg_test_skcipher,
3016                 .suite = {
3017                         .cipher = {
3018                                 .enc = {
3019                                         .vecs = xtea_enc_tv_template,
3020                                         .count = XTEA_ENC_TEST_VECTORS
3021                                 },
3022                                 .dec = {
3023                                         .vecs = xtea_dec_tv_template,
3024                                         .count = XTEA_DEC_TEST_VECTORS
3025                                 }
3026                         }
3027                 }
3028         }, {
3029                 .alg = "gcm(aes)",
3030                 .test = alg_test_aead,
3031                 .fips_allowed = 1,
3032                 .suite = {
3033                         .aead = {
3034                                 .enc = {
3035                                         .vecs = aes_gcm_enc_tv_template,
3036                                         .count = AES_GCM_ENC_TEST_VECTORS
3037                                 },
3038                                 .dec = {
3039                                         .vecs = aes_gcm_dec_tv_template,
3040                                         .count = AES_GCM_DEC_TEST_VECTORS
3041                                 }
3042                         }
3043                 }
3044         }, {
3045                 .alg = "ghash",
3046                 .test = alg_test_hash,
3047                 .fips_allowed = 1,
3048                 .suite = {
3049                         .hash = {
3050                                 .vecs = ghash_tv_template,
3051                                 .count = GHASH_TEST_VECTORS
3052                         }
3053                 }
3054         }, {
3055                 .alg = "hmac(crc32)",
3056                 .test = alg_test_hash,
3057                 .suite = {
3058                         .hash = {
3059                                 .vecs = bfin_crc_tv_template,
3060                                 .count = BFIN_CRC_TEST_VECTORS
3061                         }
3062                 }
3063         }, {
3064                 .alg = "hmac(md5)",
3065                 .test = alg_test_hash,
3066                 .suite = {
3067                         .hash = {
3068                                 .vecs = hmac_md5_tv_template,
3069                                 .count = HMAC_MD5_TEST_VECTORS
3070                         }
3071                 }
3072         }, {
3073                 .alg = "hmac(rmd128)",
3074                 .test = alg_test_hash,
3075                 .suite = {
3076                         .hash = {
3077                                 .vecs = hmac_rmd128_tv_template,
3078                                 .count = HMAC_RMD128_TEST_VECTORS
3079                         }
3080                 }
3081         }, {
3082                 .alg = "hmac(rmd160)",
3083                 .test = alg_test_hash,
3084                 .suite = {
3085                         .hash = {
3086                                 .vecs = hmac_rmd160_tv_template,
3087                                 .count = HMAC_RMD160_TEST_VECTORS
3088                         }
3089                 }
3090         }, {
3091                 .alg = "hmac(sha1)",
3092                 .test = alg_test_hash,
3093                 .fips_allowed = 1,
3094                 .suite = {
3095                         .hash = {
3096                                 .vecs = hmac_sha1_tv_template,
3097                                 .count = HMAC_SHA1_TEST_VECTORS
3098                         }
3099                 }
3100         }, {
3101                 .alg = "hmac(sha224)",
3102                 .test = alg_test_hash,
3103                 .fips_allowed = 1,
3104                 .suite = {
3105                         .hash = {
3106                                 .vecs = hmac_sha224_tv_template,
3107                                 .count = HMAC_SHA224_TEST_VECTORS
3108                         }
3109                 }
3110         }, {
3111                 .alg = "hmac(sha256)",
3112                 .test = alg_test_hash,
3113                 .fips_allowed = 1,
3114                 .suite = {
3115                         .hash = {
3116                                 .vecs = hmac_sha256_tv_template,
3117                                 .count = HMAC_SHA256_TEST_VECTORS
3118                         }
3119                 }
3120         }, {
3121                 .alg = "hmac(sha384)",
3122                 .test = alg_test_hash,
3123                 .fips_allowed = 1,
3124                 .suite = {
3125                         .hash = {
3126                                 .vecs = hmac_sha384_tv_template,
3127                                 .count = HMAC_SHA384_TEST_VECTORS
3128                         }
3129                 }
3130         }, {
3131                 .alg = "hmac(sha512)",
3132                 .test = alg_test_hash,
3133                 .fips_allowed = 1,
3134                 .suite = {
3135                         .hash = {
3136                                 .vecs = hmac_sha512_tv_template,
3137                                 .count = HMAC_SHA512_TEST_VECTORS
3138                         }
3139                 }
3140         }, {
3141                 .alg = "lrw(aes)",
3142                 .test = alg_test_skcipher,
3143                 .suite = {
3144                         .cipher = {
3145                                 .enc = {
3146                                         .vecs = aes_lrw_enc_tv_template,
3147                                         .count = AES_LRW_ENC_TEST_VECTORS
3148                                 },
3149                                 .dec = {
3150                                         .vecs = aes_lrw_dec_tv_template,
3151                                         .count = AES_LRW_DEC_TEST_VECTORS
3152                                 }
3153                         }
3154                 }
3155         }, {
3156                 .alg = "lrw(camellia)",
3157                 .test = alg_test_skcipher,
3158                 .suite = {
3159                         .cipher = {
3160                                 .enc = {
3161                                         .vecs = camellia_lrw_enc_tv_template,
3162                                         .count = CAMELLIA_LRW_ENC_TEST_VECTORS
3163                                 },
3164                                 .dec = {
3165                                         .vecs = camellia_lrw_dec_tv_template,
3166                                         .count = CAMELLIA_LRW_DEC_TEST_VECTORS
3167                                 }
3168                         }
3169                 }
3170         }, {
3171                 .alg = "lrw(cast6)",
3172                 .test = alg_test_skcipher,
3173                 .suite = {
3174                         .cipher = {
3175                                 .enc = {
3176                                         .vecs = cast6_lrw_enc_tv_template,
3177                                         .count = CAST6_LRW_ENC_TEST_VECTORS
3178                                 },
3179                                 .dec = {
3180                                         .vecs = cast6_lrw_dec_tv_template,
3181                                         .count = CAST6_LRW_DEC_TEST_VECTORS
3182                                 }
3183                         }
3184                 }
3185         }, {
3186                 .alg = "lrw(serpent)",
3187                 .test = alg_test_skcipher,
3188                 .suite = {
3189                         .cipher = {
3190                                 .enc = {
3191                                         .vecs = serpent_lrw_enc_tv_template,
3192                                         .count = SERPENT_LRW_ENC_TEST_VECTORS
3193                                 },
3194                                 .dec = {
3195                                         .vecs = serpent_lrw_dec_tv_template,
3196                                         .count = SERPENT_LRW_DEC_TEST_VECTORS
3197                                 }
3198                         }
3199                 }
3200         }, {
3201                 .alg = "lrw(twofish)",
3202                 .test = alg_test_skcipher,
3203                 .suite = {
3204                         .cipher = {
3205                                 .enc = {
3206                                         .vecs = tf_lrw_enc_tv_template,
3207                                         .count = TF_LRW_ENC_TEST_VECTORS
3208                                 },
3209                                 .dec = {
3210                                         .vecs = tf_lrw_dec_tv_template,
3211                                         .count = TF_LRW_DEC_TEST_VECTORS
3212                                 }
3213                         }
3214                 }
3215         }, {
3216                 .alg = "lzo",
3217                 .test = alg_test_comp,
3218                 .fips_allowed = 1,
3219                 .suite = {
3220                         .comp = {
3221                                 .comp = {
3222                                         .vecs = lzo_comp_tv_template,
3223                                         .count = LZO_COMP_TEST_VECTORS
3224                                 },
3225                                 .decomp = {
3226                                         .vecs = lzo_decomp_tv_template,
3227                                         .count = LZO_DECOMP_TEST_VECTORS
3228                                 }
3229                         }
3230                 }
3231         }, {
3232                 .alg = "md4",
3233                 .test = alg_test_hash,
3234                 .suite = {
3235                         .hash = {
3236                                 .vecs = md4_tv_template,
3237                                 .count = MD4_TEST_VECTORS
3238                         }
3239                 }
3240         }, {
3241                 .alg = "md5",
3242                 .test = alg_test_hash,
3243                 .suite = {
3244                         .hash = {
3245                                 .vecs = md5_tv_template,
3246                                 .count = MD5_TEST_VECTORS
3247                         }
3248                 }
3249         }, {
3250                 .alg = "michael_mic",
3251                 .test = alg_test_hash,
3252                 .suite = {
3253                         .hash = {
3254                                 .vecs = michael_mic_tv_template,
3255                                 .count = MICHAEL_MIC_TEST_VECTORS
3256                         }
3257                 }
3258         }, {
3259                 .alg = "ofb(aes)",
3260                 .test = alg_test_skcipher,
3261                 .fips_allowed = 1,
3262                 .suite = {
3263                         .cipher = {
3264                                 .enc = {
3265                                         .vecs = aes_ofb_enc_tv_template,
3266                                         .count = AES_OFB_ENC_TEST_VECTORS
3267                                 },
3268                                 .dec = {
3269                                         .vecs = aes_ofb_dec_tv_template,
3270                                         .count = AES_OFB_DEC_TEST_VECTORS
3271                                 }
3272                         }
3273                 }
3274         }, {
3275                 .alg = "pcbc(fcrypt)",
3276                 .test = alg_test_skcipher,
3277                 .suite = {
3278                         .cipher = {
3279                                 .enc = {
3280                                         .vecs = fcrypt_pcbc_enc_tv_template,
3281                                         .count = FCRYPT_ENC_TEST_VECTORS
3282                                 },
3283                                 .dec = {
3284                                         .vecs = fcrypt_pcbc_dec_tv_template,
3285                                         .count = FCRYPT_DEC_TEST_VECTORS
3286                                 }
3287                         }
3288                 }
3289         }, {
3290                 .alg = "rfc3686(ctr(aes))",
3291                 .test = alg_test_skcipher,
3292                 .fips_allowed = 1,
3293                 .suite = {
3294                         .cipher = {
3295                                 .enc = {
3296                                         .vecs = aes_ctr_rfc3686_enc_tv_template,
3297                                         .count = AES_CTR_3686_ENC_TEST_VECTORS
3298                                 },
3299                                 .dec = {
3300                                         .vecs = aes_ctr_rfc3686_dec_tv_template,
3301                                         .count = AES_CTR_3686_DEC_TEST_VECTORS
3302                                 }
3303                         }
3304                 }
3305         }, {
3306                 .alg = "rfc4106(gcm(aes))",
3307                 .test = alg_test_aead,
3308                 .suite = {
3309                         .aead = {
3310                                 .enc = {
3311                                         .vecs = aes_gcm_rfc4106_enc_tv_template,
3312                                         .count = AES_GCM_4106_ENC_TEST_VECTORS
3313                                 },
3314                                 .dec = {
3315                                         .vecs = aes_gcm_rfc4106_dec_tv_template,
3316                                         .count = AES_GCM_4106_DEC_TEST_VECTORS
3317                                 }
3318                         }
3319                 }
3320         }, {
3321                 .alg = "rfc4309(ccm(aes))",
3322                 .test = alg_test_aead,
3323                 .fips_allowed = 1,
3324                 .suite = {
3325                         .aead = {
3326                                 .enc = {
3327                                         .vecs = aes_ccm_rfc4309_enc_tv_template,
3328                                         .count = AES_CCM_4309_ENC_TEST_VECTORS
3329                                 },
3330                                 .dec = {
3331                                         .vecs = aes_ccm_rfc4309_dec_tv_template,
3332                                         .count = AES_CCM_4309_DEC_TEST_VECTORS
3333                                 }
3334                         }
3335                 }
3336         }, {
3337                 .alg = "rfc4543(gcm(aes))",
3338                 .test = alg_test_aead,
3339                 .suite = {
3340                         .aead = {
3341                                 .enc = {
3342                                         .vecs = aes_gcm_rfc4543_enc_tv_template,
3343                                         .count = AES_GCM_4543_ENC_TEST_VECTORS
3344                                 },
3345                                 .dec = {
3346                                         .vecs = aes_gcm_rfc4543_dec_tv_template,
3347                                         .count = AES_GCM_4543_DEC_TEST_VECTORS
3348                                 },
3349                         }
3350                 }
3351         }, {
3352                 .alg = "rmd128",
3353                 .test = alg_test_hash,
3354                 .suite = {
3355                         .hash = {
3356                                 .vecs = rmd128_tv_template,
3357                                 .count = RMD128_TEST_VECTORS
3358                         }
3359                 }
3360         }, {
3361                 .alg = "rmd160",
3362                 .test = alg_test_hash,
3363                 .suite = {
3364                         .hash = {
3365                                 .vecs = rmd160_tv_template,
3366                                 .count = RMD160_TEST_VECTORS
3367                         }
3368                 }
3369         }, {
3370                 .alg = "rmd256",
3371                 .test = alg_test_hash,
3372                 .suite = {
3373                         .hash = {
3374                                 .vecs = rmd256_tv_template,
3375                                 .count = RMD256_TEST_VECTORS
3376                         }
3377                 }
3378         }, {
3379                 .alg = "rmd320",
3380                 .test = alg_test_hash,
3381                 .suite = {
3382                         .hash = {
3383                                 .vecs = rmd320_tv_template,
3384                                 .count = RMD320_TEST_VECTORS
3385                         }
3386                 }
3387         }, {
3388                 .alg = "salsa20",
3389                 .test = alg_test_skcipher,
3390                 .suite = {
3391                         .cipher = {
3392                                 .enc = {
3393                                         .vecs = salsa20_stream_enc_tv_template,
3394                                         .count = SALSA20_STREAM_ENC_TEST_VECTORS
3395                                 }
3396                         }
3397                 }
3398         }, {
3399                 .alg = "sha1",
3400                 .test = alg_test_hash,
3401                 .fips_allowed = 1,
3402                 .suite = {
3403                         .hash = {
3404                                 .vecs = sha1_tv_template,
3405                                 .count = SHA1_TEST_VECTORS
3406                         }
3407                 }
3408         }, {
3409                 .alg = "sha224",
3410                 .test = alg_test_hash,
3411                 .fips_allowed = 1,
3412                 .suite = {
3413                         .hash = {
3414                                 .vecs = sha224_tv_template,
3415                                 .count = SHA224_TEST_VECTORS
3416                         }
3417                 }
3418         }, {
3419                 .alg = "sha256",
3420                 .test = alg_test_hash,
3421                 .fips_allowed = 1,
3422                 .suite = {
3423                         .hash = {
3424                                 .vecs = sha256_tv_template,
3425                                 .count = SHA256_TEST_VECTORS
3426                         }
3427                 }
3428         }, {
3429                 .alg = "sha384",
3430                 .test = alg_test_hash,
3431                 .fips_allowed = 1,
3432                 .suite = {
3433                         .hash = {
3434                                 .vecs = sha384_tv_template,
3435                                 .count = SHA384_TEST_VECTORS
3436                         }
3437                 }
3438         }, {
3439                 .alg = "sha512",
3440                 .test = alg_test_hash,
3441                 .fips_allowed = 1,
3442                 .suite = {
3443                         .hash = {
3444                                 .vecs = sha512_tv_template,
3445                                 .count = SHA512_TEST_VECTORS
3446                         }
3447                 }
3448         }, {
3449                 .alg = "tgr128",
3450                 .test = alg_test_hash,
3451                 .suite = {
3452                         .hash = {
3453                                 .vecs = tgr128_tv_template,
3454                                 .count = TGR128_TEST_VECTORS
3455                         }
3456                 }
3457         }, {
3458                 .alg = "tgr160",
3459                 .test = alg_test_hash,
3460                 .suite = {
3461                         .hash = {
3462                                 .vecs = tgr160_tv_template,
3463                                 .count = TGR160_TEST_VECTORS
3464                         }
3465                 }
3466         }, {
3467                 .alg = "tgr192",
3468                 .test = alg_test_hash,
3469                 .suite = {
3470                         .hash = {
3471                                 .vecs = tgr192_tv_template,
3472                                 .count = TGR192_TEST_VECTORS
3473                         }
3474                 }
3475         }, {
3476                 .alg = "vmac(aes)",
3477                 .test = alg_test_hash,
3478                 .suite = {
3479                         .hash = {
3480                                 .vecs = aes_vmac128_tv_template,
3481                                 .count = VMAC_AES_TEST_VECTORS
3482                         }
3483                 }
3484         }, {
3485                 .alg = "wp256",
3486                 .test = alg_test_hash,
3487                 .suite = {
3488                         .hash = {
3489                                 .vecs = wp256_tv_template,
3490                                 .count = WP256_TEST_VECTORS
3491                         }
3492                 }
3493         }, {
3494                 .alg = "wp384",
3495                 .test = alg_test_hash,
3496                 .suite = {
3497                         .hash = {
3498                                 .vecs = wp384_tv_template,
3499                                 .count = WP384_TEST_VECTORS
3500                         }
3501                 }
3502         }, {
3503                 .alg = "wp512",
3504                 .test = alg_test_hash,
3505                 .suite = {
3506                         .hash = {
3507                                 .vecs = wp512_tv_template,
3508                                 .count = WP512_TEST_VECTORS
3509                         }
3510                 }
3511         }, {
3512                 .alg = "xcbc(aes)",
3513                 .test = alg_test_hash,
3514                 .suite = {
3515                         .hash = {
3516                                 .vecs = aes_xcbc128_tv_template,
3517                                 .count = XCBC_AES_TEST_VECTORS
3518                         }
3519                 }
3520         }, {
3521                 .alg = "xts(aes)",
3522                 .test = alg_test_skcipher,
3523                 .fips_allowed = 1,
3524                 .suite = {
3525                         .cipher = {
3526                                 .enc = {
3527                                         .vecs = aes_xts_enc_tv_template,
3528                                         .count = AES_XTS_ENC_TEST_VECTORS
3529                                 },
3530                                 .dec = {
3531                                         .vecs = aes_xts_dec_tv_template,
3532                                         .count = AES_XTS_DEC_TEST_VECTORS
3533                                 }
3534                         }
3535                 }
3536         }, {
3537                 .alg = "xts(camellia)",
3538                 .test = alg_test_skcipher,
3539                 .suite = {
3540                         .cipher = {
3541                                 .enc = {
3542                                         .vecs = camellia_xts_enc_tv_template,
3543                                         .count = CAMELLIA_XTS_ENC_TEST_VECTORS
3544                                 },
3545                                 .dec = {
3546                                         .vecs = camellia_xts_dec_tv_template,
3547                                         .count = CAMELLIA_XTS_DEC_TEST_VECTORS
3548                                 }
3549                         }
3550                 }
3551         }, {
3552                 .alg = "xts(cast6)",
3553                 .test = alg_test_skcipher,
3554                 .suite = {
3555                         .cipher = {
3556                                 .enc = {
3557                                         .vecs = cast6_xts_enc_tv_template,
3558                                         .count = CAST6_XTS_ENC_TEST_VECTORS
3559                                 },
3560                                 .dec = {
3561                                         .vecs = cast6_xts_dec_tv_template,
3562                                         .count = CAST6_XTS_DEC_TEST_VECTORS
3563                                 }
3564                         }
3565                 }
3566         }, {
3567                 .alg = "xts(serpent)",
3568                 .test = alg_test_skcipher,
3569                 .suite = {
3570                         .cipher = {
3571                                 .enc = {
3572                                         .vecs = serpent_xts_enc_tv_template,
3573                                         .count = SERPENT_XTS_ENC_TEST_VECTORS
3574                                 },
3575                                 .dec = {
3576                                         .vecs = serpent_xts_dec_tv_template,
3577                                         .count = SERPENT_XTS_DEC_TEST_VECTORS
3578                                 }
3579                         }
3580                 }
3581         }, {
3582                 .alg = "xts(twofish)",
3583                 .test = alg_test_skcipher,
3584                 .suite = {
3585                         .cipher = {
3586                                 .enc = {
3587                                         .vecs = tf_xts_enc_tv_template,
3588                                         .count = TF_XTS_ENC_TEST_VECTORS
3589                                 },
3590                                 .dec = {
3591                                         .vecs = tf_xts_dec_tv_template,
3592                                         .count = TF_XTS_DEC_TEST_VECTORS
3593                                 }
3594                         }
3595                 }
3596         }, {
3597                 .alg = "zlib",
3598                 .test = alg_test_pcomp,
3599                 .fips_allowed = 1,
3600                 .suite = {
3601                         .pcomp = {
3602                                 .comp = {
3603                                         .vecs = zlib_comp_tv_template,
3604                                         .count = ZLIB_COMP_TEST_VECTORS
3605                                 },
3606                                 .decomp = {
3607                                         .vecs = zlib_decomp_tv_template,
3608                                         .count = ZLIB_DECOMP_TEST_VECTORS
3609                                 }
3610                         }
3611                 }
3612         }
3613 };
3614
3615 static bool alg_test_descs_checked;
3616
3617 static void alg_test_descs_check_order(void)
3618 {
3619         int i;
3620
3621         /* only check once */
3622         if (alg_test_descs_checked)
3623                 return;
3624
3625         alg_test_descs_checked = true;
3626
3627         for (i = 1; i < ARRAY_SIZE(alg_test_descs); i++) {
3628                 int diff = strcmp(alg_test_descs[i - 1].alg,
3629                                   alg_test_descs[i].alg);
3630
3631                 if (WARN_ON(diff > 0)) {
3632                         pr_warn("testmgr: alg_test_descs entries in wrong order: '%s' before '%s'\n",
3633                                 alg_test_descs[i - 1].alg,
3634                                 alg_test_descs[i].alg);
3635                 }
3636
3637                 if (WARN_ON(diff == 0)) {
3638                         pr_warn("testmgr: duplicate alg_test_descs entry: '%s'\n",
3639                                 alg_test_descs[i].alg);
3640                 }
3641         }
3642 }
3643
3644 static int alg_find_test(const char *alg)
3645 {
3646         int start = 0;
3647         int end = ARRAY_SIZE(alg_test_descs);
3648
3649         while (start < end) {
3650                 int i = (start + end) / 2;
3651                 int diff = strcmp(alg_test_descs[i].alg, alg);
3652
3653                 if (diff > 0) {
3654                         end = i;
3655                         continue;
3656                 }
3657
3658                 if (diff < 0) {
3659                         start = i + 1;
3660                         continue;
3661                 }
3662
3663                 return i;
3664         }
3665
3666         return -1;
3667 }
3668
3669 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
3670 {
3671         int i;
3672         int j;
3673         int rc;
3674
3675         alg_test_descs_check_order();
3676
3677         if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) {
3678                 char nalg[CRYPTO_MAX_ALG_NAME];
3679
3680                 if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
3681                     sizeof(nalg))
3682                         return -ENAMETOOLONG;
3683
3684                 i = alg_find_test(nalg);
3685                 if (i < 0)
3686                         goto notest;
3687
3688                 if (fips_enabled && !alg_test_descs[i].fips_allowed)
3689                         goto non_fips_alg;
3690
3691                 rc = alg_test_cipher(alg_test_descs + i, driver, type, mask);
3692                 goto test_done;
3693         }
3694
3695         i = alg_find_test(alg);
3696         j = alg_find_test(driver);
3697         if (i < 0 && j < 0)
3698                 goto notest;
3699
3700         if (fips_enabled && ((i >= 0 && !alg_test_descs[i].fips_allowed) ||
3701                              (j >= 0 && !alg_test_descs[j].fips_allowed)))
3702                 goto non_fips_alg;
3703
3704         rc = 0;
3705         if (i >= 0)
3706                 rc |= alg_test_descs[i].test(alg_test_descs + i, driver,
3707                                              type, mask);
3708         if (j >= 0 && j != i)
3709                 rc |= alg_test_descs[j].test(alg_test_descs + j, driver,
3710                                              type, mask);
3711
3712 test_done:
3713         if (fips_enabled && rc)
3714                 panic("%s: %s alg self test failed in fips mode!\n", driver, alg);
3715
3716         if (fips_enabled && !rc)
3717                 pr_info(KERN_INFO "alg: self-tests for %s (%s) passed\n",
3718                         driver, alg);
3719
3720         return rc;
3721
3722 notest:
3723         printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
3724         return 0;
3725 non_fips_alg:
3726         return -EINVAL;
3727 }
3728
3729 #endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */
3730
3731 EXPORT_SYMBOL_GPL(alg_test);