crypto: cryptomgr - Test ciphers using ECB
[linux-2.6.git] / crypto / testmgr.c
1 /*
2  * Algorithm testing framework and tests.
3  *
4  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5  * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
6  * Copyright (c) 2007 Nokia Siemens Networks
7  * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8  *
9  * This program is free software; you can redistribute it and/or modify it
10  * under the terms of the GNU General Public License as published by the Free
11  * Software Foundation; either version 2 of the License, or (at your option)
12  * any later version.
13  *
14  */
15
16 #include <crypto/hash.h>
17 #include <linux/err.h>
18 #include <linux/module.h>
19 #include <linux/scatterlist.h>
20 #include <linux/slab.h>
21 #include <linux/string.h>
22
23 #include "internal.h"
24 #include "testmgr.h"
25
26 /*
27  * Need slab memory for testing (size in number of pages).
28  */
29 #define XBUFSIZE        8
30
31 /*
32  * Indexes into the xbuf to simulate cross-page access.
33  */
34 #define IDX1            32
35 #define IDX2            32400
36 #define IDX3            1
37 #define IDX4            8193
38 #define IDX5            22222
39 #define IDX6            17101
40 #define IDX7            27333
41 #define IDX8            3000
42
43 /*
44 * Used by test_cipher()
45 */
46 #define ENCRYPT 1
47 #define DECRYPT 0
48
49 struct tcrypt_result {
50         struct completion completion;
51         int err;
52 };
53
54 struct aead_test_suite {
55         struct {
56                 struct aead_testvec *vecs;
57                 unsigned int count;
58         } enc, dec;
59 };
60
61 struct cipher_test_suite {
62         struct {
63                 struct cipher_testvec *vecs;
64                 unsigned int count;
65         } enc, dec;
66 };
67
68 struct comp_test_suite {
69         struct {
70                 struct comp_testvec *vecs;
71                 unsigned int count;
72         } comp, decomp;
73 };
74
75 struct hash_test_suite {
76         struct hash_testvec *vecs;
77         unsigned int count;
78 };
79
80 struct alg_test_desc {
81         const char *alg;
82         int (*test)(const struct alg_test_desc *desc, const char *driver,
83                     u32 type, u32 mask);
84
85         union {
86                 struct aead_test_suite aead;
87                 struct cipher_test_suite cipher;
88                 struct comp_test_suite comp;
89                 struct hash_test_suite hash;
90         } suite;
91 };
92
93 static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
94
95 static char *xbuf[XBUFSIZE];
96 static char *axbuf[XBUFSIZE];
97
98 static void hexdump(unsigned char *buf, unsigned int len)
99 {
100         print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
101                         16, 1,
102                         buf, len, false);
103 }
104
105 static void tcrypt_complete(struct crypto_async_request *req, int err)
106 {
107         struct tcrypt_result *res = req->data;
108
109         if (err == -EINPROGRESS)
110                 return;
111
112         res->err = err;
113         complete(&res->completion);
114 }
115
116 static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template,
117                      unsigned int tcount)
118 {
119         const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm));
120         unsigned int i, j, k, temp;
121         struct scatterlist sg[8];
122         char result[64];
123         struct ahash_request *req;
124         struct tcrypt_result tresult;
125         int ret;
126         void *hash_buff;
127
128         init_completion(&tresult.completion);
129
130         req = ahash_request_alloc(tfm, GFP_KERNEL);
131         if (!req) {
132                 printk(KERN_ERR "alg: hash: Failed to allocate request for "
133                        "%s\n", algo);
134                 ret = -ENOMEM;
135                 goto out_noreq;
136         }
137         ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
138                                    tcrypt_complete, &tresult);
139
140         for (i = 0; i < tcount; i++) {
141                 memset(result, 0, 64);
142
143                 hash_buff = xbuf[0];
144
145                 memcpy(hash_buff, template[i].plaintext, template[i].psize);
146                 sg_init_one(&sg[0], hash_buff, template[i].psize);
147
148                 if (template[i].ksize) {
149                         crypto_ahash_clear_flags(tfm, ~0);
150                         ret = crypto_ahash_setkey(tfm, template[i].key,
151                                                   template[i].ksize);
152                         if (ret) {
153                                 printk(KERN_ERR "alg: hash: setkey failed on "
154                                        "test %d for %s: ret=%d\n", i + 1, algo,
155                                        -ret);
156                                 goto out;
157                         }
158                 }
159
160                 ahash_request_set_crypt(req, sg, result, template[i].psize);
161                 ret = crypto_ahash_digest(req);
162                 switch (ret) {
163                 case 0:
164                         break;
165                 case -EINPROGRESS:
166                 case -EBUSY:
167                         ret = wait_for_completion_interruptible(
168                                 &tresult.completion);
169                         if (!ret && !(ret = tresult.err)) {
170                                 INIT_COMPLETION(tresult.completion);
171                                 break;
172                         }
173                         /* fall through */
174                 default:
175                         printk(KERN_ERR "alg: hash: digest failed on test %d "
176                                "for %s: ret=%d\n", i + 1, algo, -ret);
177                         goto out;
178                 }
179
180                 if (memcmp(result, template[i].digest,
181                            crypto_ahash_digestsize(tfm))) {
182                         printk(KERN_ERR "alg: hash: Test %d failed for %s\n",
183                                i + 1, algo);
184                         hexdump(result, crypto_ahash_digestsize(tfm));
185                         ret = -EINVAL;
186                         goto out;
187                 }
188         }
189
190         j = 0;
191         for (i = 0; i < tcount; i++) {
192                 if (template[i].np) {
193                         j++;
194                         memset(result, 0, 64);
195
196                         temp = 0;
197                         sg_init_table(sg, template[i].np);
198                         for (k = 0; k < template[i].np; k++) {
199                                 sg_set_buf(&sg[k],
200                                            memcpy(xbuf[IDX[k] >> PAGE_SHIFT] +
201                                                   offset_in_page(IDX[k]),
202                                                   template[i].plaintext + temp,
203                                                   template[i].tap[k]),
204                                            template[i].tap[k]);
205                                 temp += template[i].tap[k];
206                         }
207
208                         if (template[i].ksize) {
209                                 crypto_ahash_clear_flags(tfm, ~0);
210                                 ret = crypto_ahash_setkey(tfm, template[i].key,
211                                                           template[i].ksize);
212
213                                 if (ret) {
214                                         printk(KERN_ERR "alg: hash: setkey "
215                                                "failed on chunking test %d "
216                                                "for %s: ret=%d\n", j, algo,
217                                                -ret);
218                                         goto out;
219                                 }
220                         }
221
222                         ahash_request_set_crypt(req, sg, result,
223                                                 template[i].psize);
224                         ret = crypto_ahash_digest(req);
225                         switch (ret) {
226                         case 0:
227                                 break;
228                         case -EINPROGRESS:
229                         case -EBUSY:
230                                 ret = wait_for_completion_interruptible(
231                                         &tresult.completion);
232                                 if (!ret && !(ret = tresult.err)) {
233                                         INIT_COMPLETION(tresult.completion);
234                                         break;
235                                 }
236                                 /* fall through */
237                         default:
238                                 printk(KERN_ERR "alg: hash: digest failed "
239                                        "on chunking test %d for %s: "
240                                        "ret=%d\n", j, algo, -ret);
241                                 goto out;
242                         }
243
244                         if (memcmp(result, template[i].digest,
245                                    crypto_ahash_digestsize(tfm))) {
246                                 printk(KERN_ERR "alg: hash: Chunking test %d "
247                                        "failed for %s\n", j, algo);
248                                 hexdump(result, crypto_ahash_digestsize(tfm));
249                                 ret = -EINVAL;
250                                 goto out;
251                         }
252                 }
253         }
254
255         ret = 0;
256
257 out:
258         ahash_request_free(req);
259 out_noreq:
260         return ret;
261 }
262
263 static int test_aead(struct crypto_aead *tfm, int enc,
264                      struct aead_testvec *template, unsigned int tcount)
265 {
266         const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm));
267         unsigned int i, j, k, n, temp;
268         int ret = 0;
269         char *q;
270         char *key;
271         struct aead_request *req;
272         struct scatterlist sg[8];
273         struct scatterlist asg[8];
274         const char *e;
275         struct tcrypt_result result;
276         unsigned int authsize;
277         void *input;
278         void *assoc;
279         char iv[MAX_IVLEN];
280
281         if (enc == ENCRYPT)
282                 e = "encryption";
283         else
284                 e = "decryption";
285
286         init_completion(&result.completion);
287
288         req = aead_request_alloc(tfm, GFP_KERNEL);
289         if (!req) {
290                 printk(KERN_ERR "alg: aead: Failed to allocate request for "
291                        "%s\n", algo);
292                 ret = -ENOMEM;
293                 goto out;
294         }
295
296         aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
297                                   tcrypt_complete, &result);
298
299         for (i = 0, j = 0; i < tcount; i++) {
300                 if (!template[i].np) {
301                         j++;
302
303                         /* some tepmplates have no input data but they will
304                          * touch input
305                          */
306                         input = xbuf[0];
307                         assoc = axbuf[0];
308
309                         memcpy(input, template[i].input, template[i].ilen);
310                         memcpy(assoc, template[i].assoc, template[i].alen);
311                         if (template[i].iv)
312                                 memcpy(iv, template[i].iv, MAX_IVLEN);
313                         else
314                                 memset(iv, 0, MAX_IVLEN);
315
316                         crypto_aead_clear_flags(tfm, ~0);
317                         if (template[i].wk)
318                                 crypto_aead_set_flags(
319                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
320
321                         key = template[i].key;
322
323                         ret = crypto_aead_setkey(tfm, key,
324                                                  template[i].klen);
325                         if (!ret == template[i].fail) {
326                                 printk(KERN_ERR "alg: aead: setkey failed on "
327                                        "test %d for %s: flags=%x\n", j, algo,
328                                        crypto_aead_get_flags(tfm));
329                                 goto out;
330                         } else if (ret)
331                                 continue;
332
333                         authsize = abs(template[i].rlen - template[i].ilen);
334                         ret = crypto_aead_setauthsize(tfm, authsize);
335                         if (ret) {
336                                 printk(KERN_ERR "alg: aead: Failed to set "
337                                        "authsize to %u on test %d for %s\n",
338                                        authsize, j, algo);
339                                 goto out;
340                         }
341
342                         sg_init_one(&sg[0], input,
343                                     template[i].ilen + (enc ? authsize : 0));
344
345                         sg_init_one(&asg[0], assoc, template[i].alen);
346
347                         aead_request_set_crypt(req, sg, sg,
348                                                template[i].ilen, iv);
349
350                         aead_request_set_assoc(req, asg, template[i].alen);
351
352                         ret = enc ?
353                                 crypto_aead_encrypt(req) :
354                                 crypto_aead_decrypt(req);
355
356                         switch (ret) {
357                         case 0:
358                                 break;
359                         case -EINPROGRESS:
360                         case -EBUSY:
361                                 ret = wait_for_completion_interruptible(
362                                         &result.completion);
363                                 if (!ret && !(ret = result.err)) {
364                                         INIT_COMPLETION(result.completion);
365                                         break;
366                                 }
367                                 /* fall through */
368                         default:
369                                 printk(KERN_ERR "alg: aead: %s failed on test "
370                                        "%d for %s: ret=%d\n", e, j, algo, -ret);
371                                 goto out;
372                         }
373
374                         q = input;
375                         if (memcmp(q, template[i].result, template[i].rlen)) {
376                                 printk(KERN_ERR "alg: aead: Test %d failed on "
377                                        "%s for %s\n", j, e, algo);
378                                 hexdump(q, template[i].rlen);
379                                 ret = -EINVAL;
380                                 goto out;
381                         }
382                 }
383         }
384
385         for (i = 0, j = 0; i < tcount; i++) {
386                 if (template[i].np) {
387                         j++;
388
389                         if (template[i].iv)
390                                 memcpy(iv, template[i].iv, MAX_IVLEN);
391                         else
392                                 memset(iv, 0, MAX_IVLEN);
393
394                         crypto_aead_clear_flags(tfm, ~0);
395                         if (template[i].wk)
396                                 crypto_aead_set_flags(
397                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
398                         key = template[i].key;
399
400                         ret = crypto_aead_setkey(tfm, key, template[i].klen);
401                         if (!ret == template[i].fail) {
402                                 printk(KERN_ERR "alg: aead: setkey failed on "
403                                        "chunk test %d for %s: flags=%x\n", j,
404                                        algo, crypto_aead_get_flags(tfm));
405                                 goto out;
406                         } else if (ret)
407                                 continue;
408
409                         authsize = abs(template[i].rlen - template[i].ilen);
410
411                         ret = -EINVAL;
412                         sg_init_table(sg, template[i].np);
413                         for (k = 0, temp = 0; k < template[i].np; k++) {
414                                 if (WARN_ON(offset_in_page(IDX[k]) +
415                                             template[i].tap[k] > PAGE_SIZE))
416                                         goto out;
417
418                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
419                                     offset_in_page(IDX[k]);
420
421                                 memcpy(q, template[i].input + temp,
422                                        template[i].tap[k]);
423
424                                 n = template[i].tap[k];
425                                 if (k == template[i].np - 1 && enc)
426                                         n += authsize;
427                                 if (offset_in_page(q) + n < PAGE_SIZE)
428                                         q[n] = 0;
429
430                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
431                                 temp += template[i].tap[k];
432                         }
433
434                         ret = crypto_aead_setauthsize(tfm, authsize);
435                         if (ret) {
436                                 printk(KERN_ERR "alg: aead: Failed to set "
437                                        "authsize to %u on chunk test %d for "
438                                        "%s\n", authsize, j, algo);
439                                 goto out;
440                         }
441
442                         if (enc) {
443                                 if (WARN_ON(sg[k - 1].offset +
444                                             sg[k - 1].length + authsize >
445                                             PAGE_SIZE)) {
446                                         ret = -EINVAL;
447                                         goto out;
448                                 }
449
450                                 sg[k - 1].length += authsize;
451                         }
452
453                         sg_init_table(asg, template[i].anp);
454                         for (k = 0, temp = 0; k < template[i].anp; k++) {
455                                 sg_set_buf(&asg[k],
456                                            memcpy(axbuf[IDX[k] >> PAGE_SHIFT] +
457                                                   offset_in_page(IDX[k]),
458                                                   template[i].assoc + temp,
459                                                   template[i].atap[k]),
460                                            template[i].atap[k]);
461                                 temp += template[i].atap[k];
462                         }
463
464                         aead_request_set_crypt(req, sg, sg,
465                                                template[i].ilen,
466                                                iv);
467
468                         aead_request_set_assoc(req, asg, template[i].alen);
469
470                         ret = enc ?
471                                 crypto_aead_encrypt(req) :
472                                 crypto_aead_decrypt(req);
473
474                         switch (ret) {
475                         case 0:
476                                 break;
477                         case -EINPROGRESS:
478                         case -EBUSY:
479                                 ret = wait_for_completion_interruptible(
480                                         &result.completion);
481                                 if (!ret && !(ret = result.err)) {
482                                         INIT_COMPLETION(result.completion);
483                                         break;
484                                 }
485                                 /* fall through */
486                         default:
487                                 printk(KERN_ERR "alg: aead: %s failed on "
488                                        "chunk test %d for %s: ret=%d\n", e, j,
489                                        algo, -ret);
490                                 goto out;
491                         }
492
493                         ret = -EINVAL;
494                         for (k = 0, temp = 0; k < template[i].np; k++) {
495                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
496                                     offset_in_page(IDX[k]);
497
498                                 n = template[i].tap[k];
499                                 if (k == template[i].np - 1)
500                                         n += enc ? authsize : -authsize;
501
502                                 if (memcmp(q, template[i].result + temp, n)) {
503                                         printk(KERN_ERR "alg: aead: Chunk "
504                                                "test %d failed on %s at page "
505                                                "%u for %s\n", j, e, k, algo);
506                                         hexdump(q, n);
507                                         goto out;
508                                 }
509
510                                 q += n;
511                                 if (k == template[i].np - 1 && !enc) {
512                                         if (memcmp(q, template[i].input +
513                                                       temp + n, authsize))
514                                                 n = authsize;
515                                         else
516                                                 n = 0;
517                                 } else {
518                                         for (n = 0; offset_in_page(q + n) &&
519                                                     q[n]; n++)
520                                                 ;
521                                 }
522                                 if (n) {
523                                         printk(KERN_ERR "alg: aead: Result "
524                                                "buffer corruption in chunk "
525                                                "test %d on %s at page %u for "
526                                                "%s: %u bytes:\n", j, e, k,
527                                                algo, n);
528                                         hexdump(q, n);
529                                         goto out;
530                                 }
531
532                                 temp += template[i].tap[k];
533                         }
534                 }
535         }
536
537         ret = 0;
538
539 out:
540         aead_request_free(req);
541         return ret;
542 }
543
544 static int test_cipher(struct crypto_cipher *tfm, int enc,
545                        struct cipher_testvec *template, unsigned int tcount)
546 {
547         const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm));
548         unsigned int i, j, k;
549         int ret;
550         char *q;
551         const char *e;
552         void *data;
553
554         if (enc == ENCRYPT)
555                 e = "encryption";
556         else
557                 e = "decryption";
558
559         j = 0;
560         for (i = 0; i < tcount; i++) {
561                 if (template[i].np)
562                         continue;
563
564                 j++;
565
566                 data = xbuf[0];
567                 memcpy(data, template[i].input, template[i].ilen);
568
569                 crypto_cipher_clear_flags(tfm, ~0);
570                 if (template[i].wk)
571                         crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_WEAK_KEY);
572
573                 ret = crypto_cipher_setkey(tfm, template[i].key,
574                                            template[i].klen);
575                 if (!ret == template[i].fail) {
576                         printk(KERN_ERR "alg: cipher: setkey failed "
577                                "on test %d for %s: flags=%x\n", j,
578                                algo, crypto_cipher_get_flags(tfm));
579                         goto out;
580                 } else if (ret)
581                         continue;
582
583                 for (k = 0; k < template[i].ilen;
584                      k += crypto_cipher_blocksize(tfm)) {
585                         if (enc)
586                                 crypto_cipher_encrypt_one(tfm, data + k,
587                                                           data + k);
588                         else
589                                 crypto_cipher_decrypt_one(tfm, data + k,
590                                                           data + k);
591                 }
592
593                 q = data;
594                 if (memcmp(q, template[i].result, template[i].rlen)) {
595                         printk(KERN_ERR "alg: cipher: Test %d failed "
596                                "on %s for %s\n", j, e, algo);
597                         hexdump(q, template[i].rlen);
598                         ret = -EINVAL;
599                         goto out;
600                 }
601         }
602
603         ret = 0;
604
605 out:
606         return ret;
607 }
608
609 static int test_skcipher(struct crypto_ablkcipher *tfm, int enc,
610                          struct cipher_testvec *template, unsigned int tcount)
611 {
612         const char *algo =
613                 crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm));
614         unsigned int i, j, k, n, temp;
615         int ret;
616         char *q;
617         struct ablkcipher_request *req;
618         struct scatterlist sg[8];
619         const char *e;
620         struct tcrypt_result result;
621         void *data;
622         char iv[MAX_IVLEN];
623
624         if (enc == ENCRYPT)
625                 e = "encryption";
626         else
627                 e = "decryption";
628
629         init_completion(&result.completion);
630
631         req = ablkcipher_request_alloc(tfm, GFP_KERNEL);
632         if (!req) {
633                 printk(KERN_ERR "alg: skcipher: Failed to allocate request "
634                        "for %s\n", algo);
635                 ret = -ENOMEM;
636                 goto out;
637         }
638
639         ablkcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
640                                         tcrypt_complete, &result);
641
642         j = 0;
643         for (i = 0; i < tcount; i++) {
644                 if (template[i].iv)
645                         memcpy(iv, template[i].iv, MAX_IVLEN);
646                 else
647                         memset(iv, 0, MAX_IVLEN);
648
649                 if (!(template[i].np)) {
650                         j++;
651
652                         data = xbuf[0];
653                         memcpy(data, template[i].input, template[i].ilen);
654
655                         crypto_ablkcipher_clear_flags(tfm, ~0);
656                         if (template[i].wk)
657                                 crypto_ablkcipher_set_flags(
658                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
659
660                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
661                                                        template[i].klen);
662                         if (!ret == template[i].fail) {
663                                 printk(KERN_ERR "alg: skcipher: setkey failed "
664                                        "on test %d for %s: flags=%x\n", j,
665                                        algo, crypto_ablkcipher_get_flags(tfm));
666                                 goto out;
667                         } else if (ret)
668                                 continue;
669
670                         sg_init_one(&sg[0], data, template[i].ilen);
671
672                         ablkcipher_request_set_crypt(req, sg, sg,
673                                                      template[i].ilen, iv);
674                         ret = enc ?
675                                 crypto_ablkcipher_encrypt(req) :
676                                 crypto_ablkcipher_decrypt(req);
677
678                         switch (ret) {
679                         case 0:
680                                 break;
681                         case -EINPROGRESS:
682                         case -EBUSY:
683                                 ret = wait_for_completion_interruptible(
684                                         &result.completion);
685                                 if (!ret && !((ret = result.err))) {
686                                         INIT_COMPLETION(result.completion);
687                                         break;
688                                 }
689                                 /* fall through */
690                         default:
691                                 printk(KERN_ERR "alg: skcipher: %s failed on "
692                                        "test %d for %s: ret=%d\n", e, j, algo,
693                                        -ret);
694                                 goto out;
695                         }
696
697                         q = data;
698                         if (memcmp(q, template[i].result, template[i].rlen)) {
699                                 printk(KERN_ERR "alg: skcipher: Test %d "
700                                        "failed on %s for %s\n", j, e, algo);
701                                 hexdump(q, template[i].rlen);
702                                 ret = -EINVAL;
703                                 goto out;
704                         }
705                 }
706         }
707
708         j = 0;
709         for (i = 0; i < tcount; i++) {
710
711                 if (template[i].iv)
712                         memcpy(iv, template[i].iv, MAX_IVLEN);
713                 else
714                         memset(iv, 0, MAX_IVLEN);
715
716                 if (template[i].np) {
717                         j++;
718
719                         crypto_ablkcipher_clear_flags(tfm, ~0);
720                         if (template[i].wk)
721                                 crypto_ablkcipher_set_flags(
722                                         tfm, CRYPTO_TFM_REQ_WEAK_KEY);
723
724                         ret = crypto_ablkcipher_setkey(tfm, template[i].key,
725                                                        template[i].klen);
726                         if (!ret == template[i].fail) {
727                                 printk(KERN_ERR "alg: skcipher: setkey failed "
728                                        "on chunk test %d for %s: flags=%x\n",
729                                        j, algo,
730                                        crypto_ablkcipher_get_flags(tfm));
731                                 goto out;
732                         } else if (ret)
733                                 continue;
734
735                         temp = 0;
736                         ret = -EINVAL;
737                         sg_init_table(sg, template[i].np);
738                         for (k = 0; k < template[i].np; k++) {
739                                 if (WARN_ON(offset_in_page(IDX[k]) +
740                                             template[i].tap[k] > PAGE_SIZE))
741                                         goto out;
742
743                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
744                                     offset_in_page(IDX[k]);
745
746                                 memcpy(q, template[i].input + temp,
747                                        template[i].tap[k]);
748
749                                 if (offset_in_page(q) + template[i].tap[k] <
750                                     PAGE_SIZE)
751                                         q[template[i].tap[k]] = 0;
752
753                                 sg_set_buf(&sg[k], q, template[i].tap[k]);
754
755                                 temp += template[i].tap[k];
756                         }
757
758                         ablkcipher_request_set_crypt(req, sg, sg,
759                                         template[i].ilen, iv);
760
761                         ret = enc ?
762                                 crypto_ablkcipher_encrypt(req) :
763                                 crypto_ablkcipher_decrypt(req);
764
765                         switch (ret) {
766                         case 0:
767                                 break;
768                         case -EINPROGRESS:
769                         case -EBUSY:
770                                 ret = wait_for_completion_interruptible(
771                                         &result.completion);
772                                 if (!ret && !((ret = result.err))) {
773                                         INIT_COMPLETION(result.completion);
774                                         break;
775                                 }
776                                 /* fall through */
777                         default:
778                                 printk(KERN_ERR "alg: skcipher: %s failed on "
779                                        "chunk test %d for %s: ret=%d\n", e, j,
780                                        algo, -ret);
781                                 goto out;
782                         }
783
784                         temp = 0;
785                         ret = -EINVAL;
786                         for (k = 0; k < template[i].np; k++) {
787                                 q = xbuf[IDX[k] >> PAGE_SHIFT] +
788                                     offset_in_page(IDX[k]);
789
790                                 if (memcmp(q, template[i].result + temp,
791                                            template[i].tap[k])) {
792                                         printk(KERN_ERR "alg: skcipher: Chunk "
793                                                "test %d failed on %s at page "
794                                                "%u for %s\n", j, e, k, algo);
795                                         hexdump(q, template[i].tap[k]);
796                                         goto out;
797                                 }
798
799                                 q += template[i].tap[k];
800                                 for (n = 0; offset_in_page(q + n) && q[n]; n++)
801                                         ;
802                                 if (n) {
803                                         printk(KERN_ERR "alg: skcipher: "
804                                                "Result buffer corruption in "
805                                                "chunk test %d on %s at page "
806                                                "%u for %s: %u bytes:\n", j, e,
807                                                k, algo, n);
808                                         hexdump(q, n);
809                                         goto out;
810                                 }
811                                 temp += template[i].tap[k];
812                         }
813                 }
814         }
815
816         ret = 0;
817
818 out:
819         ablkcipher_request_free(req);
820         return ret;
821 }
822
823 static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate,
824                      struct comp_testvec *dtemplate, int ctcount, int dtcount)
825 {
826         const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm));
827         unsigned int i;
828         char result[COMP_BUF_SIZE];
829         int ret;
830
831         for (i = 0; i < ctcount; i++) {
832                 int ilen, dlen = COMP_BUF_SIZE;
833
834                 memset(result, 0, sizeof (result));
835
836                 ilen = ctemplate[i].inlen;
837                 ret = crypto_comp_compress(tfm, ctemplate[i].input,
838                                            ilen, result, &dlen);
839                 if (ret) {
840                         printk(KERN_ERR "alg: comp: compression failed "
841                                "on test %d for %s: ret=%d\n", i + 1, algo,
842                                -ret);
843                         goto out;
844                 }
845
846                 if (memcmp(result, ctemplate[i].output, dlen)) {
847                         printk(KERN_ERR "alg: comp: Compression test %d "
848                                "failed for %s\n", i + 1, algo);
849                         hexdump(result, dlen);
850                         ret = -EINVAL;
851                         goto out;
852                 }
853         }
854
855         for (i = 0; i < dtcount; i++) {
856                 int ilen, ret, dlen = COMP_BUF_SIZE;
857
858                 memset(result, 0, sizeof (result));
859
860                 ilen = dtemplate[i].inlen;
861                 ret = crypto_comp_decompress(tfm, dtemplate[i].input,
862                                              ilen, result, &dlen);
863                 if (ret) {
864                         printk(KERN_ERR "alg: comp: decompression failed "
865                                "on test %d for %s: ret=%d\n", i + 1, algo,
866                                -ret);
867                         goto out;
868                 }
869
870                 if (memcmp(result, dtemplate[i].output, dlen)) {
871                         printk(KERN_ERR "alg: comp: Decompression test %d "
872                                "failed for %s\n", i + 1, algo);
873                         hexdump(result, dlen);
874                         ret = -EINVAL;
875                         goto out;
876                 }
877         }
878
879         ret = 0;
880
881 out:
882         return ret;
883 }
884
885 static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
886                          u32 type, u32 mask)
887 {
888         struct crypto_aead *tfm;
889         int err = 0;
890
891         tfm = crypto_alloc_aead(driver, type, mask);
892         if (IS_ERR(tfm)) {
893                 printk(KERN_ERR "alg: aead: Failed to load transform for %s: "
894                        "%ld\n", driver, PTR_ERR(tfm));
895                 return PTR_ERR(tfm);
896         }
897
898         if (desc->suite.aead.enc.vecs) {
899                 err = test_aead(tfm, ENCRYPT, desc->suite.aead.enc.vecs,
900                                 desc->suite.aead.enc.count);
901                 if (err)
902                         goto out;
903         }
904
905         if (!err && desc->suite.aead.dec.vecs)
906                 err = test_aead(tfm, DECRYPT, desc->suite.aead.dec.vecs,
907                                 desc->suite.aead.dec.count);
908
909 out:
910         crypto_free_aead(tfm);
911         return err;
912 }
913
914 static int alg_test_cipher(const struct alg_test_desc *desc,
915                            const char *driver, u32 type, u32 mask)
916 {
917         struct crypto_cipher *tfm;
918         int err = 0;
919
920         tfm = crypto_alloc_cipher(driver, type, mask);
921         if (IS_ERR(tfm)) {
922                 printk(KERN_ERR "alg: cipher: Failed to load transform for "
923                        "%s: %ld\n", driver, PTR_ERR(tfm));
924                 return PTR_ERR(tfm);
925         }
926
927         if (desc->suite.cipher.enc.vecs) {
928                 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
929                                   desc->suite.cipher.enc.count);
930                 if (err)
931                         goto out;
932         }
933
934         if (desc->suite.cipher.dec.vecs)
935                 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
936                                   desc->suite.cipher.dec.count);
937
938 out:
939         crypto_free_cipher(tfm);
940         return err;
941 }
942
943 static int alg_test_skcipher(const struct alg_test_desc *desc,
944                              const char *driver, u32 type, u32 mask)
945 {
946         struct crypto_ablkcipher *tfm;
947         int err = 0;
948
949         tfm = crypto_alloc_ablkcipher(driver, type, mask);
950         if (IS_ERR(tfm)) {
951                 printk(KERN_ERR "alg: skcipher: Failed to load transform for "
952                        "%s: %ld\n", driver, PTR_ERR(tfm));
953                 return PTR_ERR(tfm);
954         }
955
956         if (desc->suite.cipher.enc.vecs) {
957                 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs,
958                                     desc->suite.cipher.enc.count);
959                 if (err)
960                         goto out;
961         }
962
963         if (desc->suite.cipher.dec.vecs)
964                 err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs,
965                                     desc->suite.cipher.dec.count);
966
967 out:
968         crypto_free_ablkcipher(tfm);
969         return err;
970 }
971
972 static int alg_test_comp(const struct alg_test_desc *desc, const char *driver,
973                          u32 type, u32 mask)
974 {
975         struct crypto_comp *tfm;
976         int err;
977
978         tfm = crypto_alloc_comp(driver, type, mask);
979         if (IS_ERR(tfm)) {
980                 printk(KERN_ERR "alg: comp: Failed to load transform for %s: "
981                        "%ld\n", driver, PTR_ERR(tfm));
982                 return PTR_ERR(tfm);
983         }
984
985         err = test_comp(tfm, desc->suite.comp.comp.vecs,
986                         desc->suite.comp.decomp.vecs,
987                         desc->suite.comp.comp.count,
988                         desc->suite.comp.decomp.count);
989
990         crypto_free_comp(tfm);
991         return err;
992 }
993
994 static int alg_test_hash(const struct alg_test_desc *desc, const char *driver,
995                          u32 type, u32 mask)
996 {
997         struct crypto_ahash *tfm;
998         int err;
999
1000         tfm = crypto_alloc_ahash(driver, type, mask);
1001         if (IS_ERR(tfm)) {
1002                 printk(KERN_ERR "alg: hash: Failed to load transform for %s: "
1003                        "%ld\n", driver, PTR_ERR(tfm));
1004                 return PTR_ERR(tfm);
1005         }
1006
1007         err = test_hash(tfm, desc->suite.hash.vecs, desc->suite.hash.count);
1008
1009         crypto_free_ahash(tfm);
1010         return err;
1011 }
1012
1013 /* Please keep this list sorted by algorithm name. */
1014 static const struct alg_test_desc alg_test_descs[] = {
1015         {
1016                 .alg = "cbc(aes)",
1017                 .test = alg_test_skcipher,
1018                 .suite = {
1019                         .cipher = {
1020                                 .enc = {
1021                                         .vecs = aes_cbc_enc_tv_template,
1022                                         .count = AES_CBC_ENC_TEST_VECTORS
1023                                 },
1024                                 .dec = {
1025                                         .vecs = aes_cbc_dec_tv_template,
1026                                         .count = AES_CBC_DEC_TEST_VECTORS
1027                                 }
1028                         }
1029                 }
1030         }, {
1031                 .alg = "cbc(anubis)",
1032                 .test = alg_test_skcipher,
1033                 .suite = {
1034                         .cipher = {
1035                                 .enc = {
1036                                         .vecs = anubis_cbc_enc_tv_template,
1037                                         .count = ANUBIS_CBC_ENC_TEST_VECTORS
1038                                 },
1039                                 .dec = {
1040                                         .vecs = anubis_cbc_dec_tv_template,
1041                                         .count = ANUBIS_CBC_DEC_TEST_VECTORS
1042                                 }
1043                         }
1044                 }
1045         }, {
1046                 .alg = "cbc(blowfish)",
1047                 .test = alg_test_skcipher,
1048                 .suite = {
1049                         .cipher = {
1050                                 .enc = {
1051                                         .vecs = bf_cbc_enc_tv_template,
1052                                         .count = BF_CBC_ENC_TEST_VECTORS
1053                                 },
1054                                 .dec = {
1055                                         .vecs = bf_cbc_dec_tv_template,
1056                                         .count = BF_CBC_DEC_TEST_VECTORS
1057                                 }
1058                         }
1059                 }
1060         }, {
1061                 .alg = "cbc(camellia)",
1062                 .test = alg_test_skcipher,
1063                 .suite = {
1064                         .cipher = {
1065                                 .enc = {
1066                                         .vecs = camellia_cbc_enc_tv_template,
1067                                         .count = CAMELLIA_CBC_ENC_TEST_VECTORS
1068                                 },
1069                                 .dec = {
1070                                         .vecs = camellia_cbc_dec_tv_template,
1071                                         .count = CAMELLIA_CBC_DEC_TEST_VECTORS
1072                                 }
1073                         }
1074                 }
1075         }, {
1076                 .alg = "cbc(des)",
1077                 .test = alg_test_skcipher,
1078                 .suite = {
1079                         .cipher = {
1080                                 .enc = {
1081                                         .vecs = des_cbc_enc_tv_template,
1082                                         .count = DES_CBC_ENC_TEST_VECTORS
1083                                 },
1084                                 .dec = {
1085                                         .vecs = des_cbc_dec_tv_template,
1086                                         .count = DES_CBC_DEC_TEST_VECTORS
1087                                 }
1088                         }
1089                 }
1090         }, {
1091                 .alg = "cbc(des3_ede)",
1092                 .test = alg_test_skcipher,
1093                 .suite = {
1094                         .cipher = {
1095                                 .enc = {
1096                                         .vecs = des3_ede_cbc_enc_tv_template,
1097                                         .count = DES3_EDE_CBC_ENC_TEST_VECTORS
1098                                 },
1099                                 .dec = {
1100                                         .vecs = des3_ede_cbc_dec_tv_template,
1101                                         .count = DES3_EDE_CBC_DEC_TEST_VECTORS
1102                                 }
1103                         }
1104                 }
1105         }, {
1106                 .alg = "cbc(twofish)",
1107                 .test = alg_test_skcipher,
1108                 .suite = {
1109                         .cipher = {
1110                                 .enc = {
1111                                         .vecs = tf_cbc_enc_tv_template,
1112                                         .count = TF_CBC_ENC_TEST_VECTORS
1113                                 },
1114                                 .dec = {
1115                                         .vecs = tf_cbc_dec_tv_template,
1116                                         .count = TF_CBC_DEC_TEST_VECTORS
1117                                 }
1118                         }
1119                 }
1120         }, {
1121                 .alg = "ccm(aes)",
1122                 .test = alg_test_aead,
1123                 .suite = {
1124                         .aead = {
1125                                 .enc = {
1126                                         .vecs = aes_ccm_enc_tv_template,
1127                                         .count = AES_CCM_ENC_TEST_VECTORS
1128                                 },
1129                                 .dec = {
1130                                         .vecs = aes_ccm_dec_tv_template,
1131                                         .count = AES_CCM_DEC_TEST_VECTORS
1132                                 }
1133                         }
1134                 }
1135         }, {
1136                 .alg = "crc32c",
1137                 .test = alg_test_hash,
1138                 .suite = {
1139                         .hash = {
1140                                 .vecs = crc32c_tv_template,
1141                                 .count = CRC32C_TEST_VECTORS
1142                         }
1143                 }
1144         }, {
1145                 .alg = "cts(cbc(aes))",
1146                 .test = alg_test_skcipher,
1147                 .suite = {
1148                         .cipher = {
1149                                 .enc = {
1150                                         .vecs = cts_mode_enc_tv_template,
1151                                         .count = CTS_MODE_ENC_TEST_VECTORS
1152                                 },
1153                                 .dec = {
1154                                         .vecs = cts_mode_dec_tv_template,
1155                                         .count = CTS_MODE_DEC_TEST_VECTORS
1156                                 }
1157                         }
1158                 }
1159         }, {
1160                 .alg = "deflate",
1161                 .test = alg_test_comp,
1162                 .suite = {
1163                         .comp = {
1164                                 .comp = {
1165                                         .vecs = deflate_comp_tv_template,
1166                                         .count = DEFLATE_COMP_TEST_VECTORS
1167                                 },
1168                                 .decomp = {
1169                                         .vecs = deflate_decomp_tv_template,
1170                                         .count = DEFLATE_DECOMP_TEST_VECTORS
1171                                 }
1172                         }
1173                 }
1174         }, {
1175                 .alg = "ecb(aes)",
1176                 .test = alg_test_skcipher,
1177                 .suite = {
1178                         .cipher = {
1179                                 .enc = {
1180                                         .vecs = aes_enc_tv_template,
1181                                         .count = AES_ENC_TEST_VECTORS
1182                                 },
1183                                 .dec = {
1184                                         .vecs = aes_dec_tv_template,
1185                                         .count = AES_DEC_TEST_VECTORS
1186                                 }
1187                         }
1188                 }
1189         }, {
1190                 .alg = "ecb(anubis)",
1191                 .test = alg_test_skcipher,
1192                 .suite = {
1193                         .cipher = {
1194                                 .enc = {
1195                                         .vecs = anubis_enc_tv_template,
1196                                         .count = ANUBIS_ENC_TEST_VECTORS
1197                                 },
1198                                 .dec = {
1199                                         .vecs = anubis_dec_tv_template,
1200                                         .count = ANUBIS_DEC_TEST_VECTORS
1201                                 }
1202                         }
1203                 }
1204         }, {
1205                 .alg = "ecb(arc4)",
1206                 .test = alg_test_skcipher,
1207                 .suite = {
1208                         .cipher = {
1209                                 .enc = {
1210                                         .vecs = arc4_enc_tv_template,
1211                                         .count = ARC4_ENC_TEST_VECTORS
1212                                 },
1213                                 .dec = {
1214                                         .vecs = arc4_dec_tv_template,
1215                                         .count = ARC4_DEC_TEST_VECTORS
1216                                 }
1217                         }
1218                 }
1219         }, {
1220                 .alg = "ecb(blowfish)",
1221                 .test = alg_test_skcipher,
1222                 .suite = {
1223                         .cipher = {
1224                                 .enc = {
1225                                         .vecs = bf_enc_tv_template,
1226                                         .count = BF_ENC_TEST_VECTORS
1227                                 },
1228                                 .dec = {
1229                                         .vecs = bf_dec_tv_template,
1230                                         .count = BF_DEC_TEST_VECTORS
1231                                 }
1232                         }
1233                 }
1234         }, {
1235                 .alg = "ecb(camellia)",
1236                 .test = alg_test_skcipher,
1237                 .suite = {
1238                         .cipher = {
1239                                 .enc = {
1240                                         .vecs = camellia_enc_tv_template,
1241                                         .count = CAMELLIA_ENC_TEST_VECTORS
1242                                 },
1243                                 .dec = {
1244                                         .vecs = camellia_dec_tv_template,
1245                                         .count = CAMELLIA_DEC_TEST_VECTORS
1246                                 }
1247                         }
1248                 }
1249         }, {
1250                 .alg = "ecb(cast5)",
1251                 .test = alg_test_skcipher,
1252                 .suite = {
1253                         .cipher = {
1254                                 .enc = {
1255                                         .vecs = cast5_enc_tv_template,
1256                                         .count = CAST5_ENC_TEST_VECTORS
1257                                 },
1258                                 .dec = {
1259                                         .vecs = cast5_dec_tv_template,
1260                                         .count = CAST5_DEC_TEST_VECTORS
1261                                 }
1262                         }
1263                 }
1264         }, {
1265                 .alg = "ecb(cast6)",
1266                 .test = alg_test_skcipher,
1267                 .suite = {
1268                         .cipher = {
1269                                 .enc = {
1270                                         .vecs = cast6_enc_tv_template,
1271                                         .count = CAST6_ENC_TEST_VECTORS
1272                                 },
1273                                 .dec = {
1274                                         .vecs = cast6_dec_tv_template,
1275                                         .count = CAST6_DEC_TEST_VECTORS
1276                                 }
1277                         }
1278                 }
1279         }, {
1280                 .alg = "ecb(des)",
1281                 .test = alg_test_skcipher,
1282                 .suite = {
1283                         .cipher = {
1284                                 .enc = {
1285                                         .vecs = des_enc_tv_template,
1286                                         .count = DES_ENC_TEST_VECTORS
1287                                 },
1288                                 .dec = {
1289                                         .vecs = des_dec_tv_template,
1290                                         .count = DES_DEC_TEST_VECTORS
1291                                 }
1292                         }
1293                 }
1294         }, {
1295                 .alg = "ecb(des3_ede)",
1296                 .test = alg_test_skcipher,
1297                 .suite = {
1298                         .cipher = {
1299                                 .enc = {
1300                                         .vecs = des3_ede_enc_tv_template,
1301                                         .count = DES3_EDE_ENC_TEST_VECTORS
1302                                 },
1303                                 .dec = {
1304                                         .vecs = des3_ede_dec_tv_template,
1305                                         .count = DES3_EDE_DEC_TEST_VECTORS
1306                                 }
1307                         }
1308                 }
1309         }, {
1310                 .alg = "ecb(khazad)",
1311                 .test = alg_test_skcipher,
1312                 .suite = {
1313                         .cipher = {
1314                                 .enc = {
1315                                         .vecs = khazad_enc_tv_template,
1316                                         .count = KHAZAD_ENC_TEST_VECTORS
1317                                 },
1318                                 .dec = {
1319                                         .vecs = khazad_dec_tv_template,
1320                                         .count = KHAZAD_DEC_TEST_VECTORS
1321                                 }
1322                         }
1323                 }
1324         }, {
1325                 .alg = "ecb(seed)",
1326                 .test = alg_test_skcipher,
1327                 .suite = {
1328                         .cipher = {
1329                                 .enc = {
1330                                         .vecs = seed_enc_tv_template,
1331                                         .count = SEED_ENC_TEST_VECTORS
1332                                 },
1333                                 .dec = {
1334                                         .vecs = seed_dec_tv_template,
1335                                         .count = SEED_DEC_TEST_VECTORS
1336                                 }
1337                         }
1338                 }
1339         }, {
1340                 .alg = "ecb(serpent)",
1341                 .test = alg_test_skcipher,
1342                 .suite = {
1343                         .cipher = {
1344                                 .enc = {
1345                                         .vecs = serpent_enc_tv_template,
1346                                         .count = SERPENT_ENC_TEST_VECTORS
1347                                 },
1348                                 .dec = {
1349                                         .vecs = serpent_dec_tv_template,
1350                                         .count = SERPENT_DEC_TEST_VECTORS
1351                                 }
1352                         }
1353                 }
1354         }, {
1355                 .alg = "ecb(tea)",
1356                 .test = alg_test_skcipher,
1357                 .suite = {
1358                         .cipher = {
1359                                 .enc = {
1360                                         .vecs = tea_enc_tv_template,
1361                                         .count = TEA_ENC_TEST_VECTORS
1362                                 },
1363                                 .dec = {
1364                                         .vecs = tea_dec_tv_template,
1365                                         .count = TEA_DEC_TEST_VECTORS
1366                                 }
1367                         }
1368                 }
1369         }, {
1370                 .alg = "ecb(tnepres)",
1371                 .test = alg_test_skcipher,
1372                 .suite = {
1373                         .cipher = {
1374                                 .enc = {
1375                                         .vecs = tnepres_enc_tv_template,
1376                                         .count = TNEPRES_ENC_TEST_VECTORS
1377                                 },
1378                                 .dec = {
1379                                         .vecs = tnepres_dec_tv_template,
1380                                         .count = TNEPRES_DEC_TEST_VECTORS
1381                                 }
1382                         }
1383                 }
1384         }, {
1385                 .alg = "ecb(twofish)",
1386                 .test = alg_test_skcipher,
1387                 .suite = {
1388                         .cipher = {
1389                                 .enc = {
1390                                         .vecs = tf_enc_tv_template,
1391                                         .count = TF_ENC_TEST_VECTORS
1392                                 },
1393                                 .dec = {
1394                                         .vecs = tf_dec_tv_template,
1395                                         .count = TF_DEC_TEST_VECTORS
1396                                 }
1397                         }
1398                 }
1399         }, {
1400                 .alg = "ecb(xeta)",
1401                 .test = alg_test_skcipher,
1402                 .suite = {
1403                         .cipher = {
1404                                 .enc = {
1405                                         .vecs = xeta_enc_tv_template,
1406                                         .count = XETA_ENC_TEST_VECTORS
1407                                 },
1408                                 .dec = {
1409                                         .vecs = xeta_dec_tv_template,
1410                                         .count = XETA_DEC_TEST_VECTORS
1411                                 }
1412                         }
1413                 }
1414         }, {
1415                 .alg = "ecb(xtea)",
1416                 .test = alg_test_skcipher,
1417                 .suite = {
1418                         .cipher = {
1419                                 .enc = {
1420                                         .vecs = xtea_enc_tv_template,
1421                                         .count = XTEA_ENC_TEST_VECTORS
1422                                 },
1423                                 .dec = {
1424                                         .vecs = xtea_dec_tv_template,
1425                                         .count = XTEA_DEC_TEST_VECTORS
1426                                 }
1427                         }
1428                 }
1429         }, {
1430                 .alg = "gcm(aes)",
1431                 .test = alg_test_aead,
1432                 .suite = {
1433                         .aead = {
1434                                 .enc = {
1435                                         .vecs = aes_gcm_enc_tv_template,
1436                                         .count = AES_GCM_ENC_TEST_VECTORS
1437                                 },
1438                                 .dec = {
1439                                         .vecs = aes_gcm_dec_tv_template,
1440                                         .count = AES_GCM_DEC_TEST_VECTORS
1441                                 }
1442                         }
1443                 }
1444         }, {
1445                 .alg = "hmac(md5)",
1446                 .test = alg_test_hash,
1447                 .suite = {
1448                         .hash = {
1449                                 .vecs = hmac_md5_tv_template,
1450                                 .count = HMAC_MD5_TEST_VECTORS
1451                         }
1452                 }
1453         }, {
1454                 .alg = "hmac(rmd128)",
1455                 .test = alg_test_hash,
1456                 .suite = {
1457                         .hash = {
1458                                 .vecs = hmac_rmd128_tv_template,
1459                                 .count = HMAC_RMD128_TEST_VECTORS
1460                         }
1461                 }
1462         }, {
1463                 .alg = "hmac(rmd160)",
1464                 .test = alg_test_hash,
1465                 .suite = {
1466                         .hash = {
1467                                 .vecs = hmac_rmd160_tv_template,
1468                                 .count = HMAC_RMD160_TEST_VECTORS
1469                         }
1470                 }
1471         }, {
1472                 .alg = "hmac(sha1)",
1473                 .test = alg_test_hash,
1474                 .suite = {
1475                         .hash = {
1476                                 .vecs = hmac_sha1_tv_template,
1477                                 .count = HMAC_SHA1_TEST_VECTORS
1478                         }
1479                 }
1480         }, {
1481                 .alg = "hmac(sha224)",
1482                 .test = alg_test_hash,
1483                 .suite = {
1484                         .hash = {
1485                                 .vecs = hmac_sha224_tv_template,
1486                                 .count = HMAC_SHA224_TEST_VECTORS
1487                         }
1488                 }
1489         }, {
1490                 .alg = "hmac(sha256)",
1491                 .test = alg_test_hash,
1492                 .suite = {
1493                         .hash = {
1494                                 .vecs = hmac_sha256_tv_template,
1495                                 .count = HMAC_SHA256_TEST_VECTORS
1496                         }
1497                 }
1498         }, {
1499                 .alg = "hmac(sha384)",
1500                 .test = alg_test_hash,
1501                 .suite = {
1502                         .hash = {
1503                                 .vecs = hmac_sha384_tv_template,
1504                                 .count = HMAC_SHA384_TEST_VECTORS
1505                         }
1506                 }
1507         }, {
1508                 .alg = "hmac(sha512)",
1509                 .test = alg_test_hash,
1510                 .suite = {
1511                         .hash = {
1512                                 .vecs = hmac_sha512_tv_template,
1513                                 .count = HMAC_SHA512_TEST_VECTORS
1514                         }
1515                 }
1516         }, {
1517                 .alg = "lrw(aes)",
1518                 .test = alg_test_skcipher,
1519                 .suite = {
1520                         .cipher = {
1521                                 .enc = {
1522                                         .vecs = aes_lrw_enc_tv_template,
1523                                         .count = AES_LRW_ENC_TEST_VECTORS
1524                                 },
1525                                 .dec = {
1526                                         .vecs = aes_lrw_dec_tv_template,
1527                                         .count = AES_LRW_DEC_TEST_VECTORS
1528                                 }
1529                         }
1530                 }
1531         }, {
1532                 .alg = "lzo",
1533                 .test = alg_test_comp,
1534                 .suite = {
1535                         .comp = {
1536                                 .comp = {
1537                                         .vecs = lzo_comp_tv_template,
1538                                         .count = LZO_COMP_TEST_VECTORS
1539                                 },
1540                                 .decomp = {
1541                                         .vecs = lzo_decomp_tv_template,
1542                                         .count = LZO_DECOMP_TEST_VECTORS
1543                                 }
1544                         }
1545                 }
1546         }, {
1547                 .alg = "md4",
1548                 .test = alg_test_hash,
1549                 .suite = {
1550                         .hash = {
1551                                 .vecs = md4_tv_template,
1552                                 .count = MD4_TEST_VECTORS
1553                         }
1554                 }
1555         }, {
1556                 .alg = "md5",
1557                 .test = alg_test_hash,
1558                 .suite = {
1559                         .hash = {
1560                                 .vecs = md5_tv_template,
1561                                 .count = MD5_TEST_VECTORS
1562                         }
1563                 }
1564         }, {
1565                 .alg = "michael_mic",
1566                 .test = alg_test_hash,
1567                 .suite = {
1568                         .hash = {
1569                                 .vecs = michael_mic_tv_template,
1570                                 .count = MICHAEL_MIC_TEST_VECTORS
1571                         }
1572                 }
1573         }, {
1574                 .alg = "pcbc(fcrypt)",
1575                 .test = alg_test_skcipher,
1576                 .suite = {
1577                         .cipher = {
1578                                 .enc = {
1579                                         .vecs = fcrypt_pcbc_enc_tv_template,
1580                                         .count = FCRYPT_ENC_TEST_VECTORS
1581                                 },
1582                                 .dec = {
1583                                         .vecs = fcrypt_pcbc_dec_tv_template,
1584                                         .count = FCRYPT_DEC_TEST_VECTORS
1585                                 }
1586                         }
1587                 }
1588         }, {
1589                 .alg = "rfc3686(ctr(aes))",
1590                 .test = alg_test_skcipher,
1591                 .suite = {
1592                         .cipher = {
1593                                 .enc = {
1594                                         .vecs = aes_ctr_enc_tv_template,
1595                                         .count = AES_CTR_ENC_TEST_VECTORS
1596                                 },
1597                                 .dec = {
1598                                         .vecs = aes_ctr_dec_tv_template,
1599                                         .count = AES_CTR_DEC_TEST_VECTORS
1600                                 }
1601                         }
1602                 }
1603         }, {
1604                 .alg = "rmd128",
1605                 .test = alg_test_hash,
1606                 .suite = {
1607                         .hash = {
1608                                 .vecs = rmd128_tv_template,
1609                                 .count = RMD128_TEST_VECTORS
1610                         }
1611                 }
1612         }, {
1613                 .alg = "rmd160",
1614                 .test = alg_test_hash,
1615                 .suite = {
1616                         .hash = {
1617                                 .vecs = rmd160_tv_template,
1618                                 .count = RMD160_TEST_VECTORS
1619                         }
1620                 }
1621         }, {
1622                 .alg = "rmd256",
1623                 .test = alg_test_hash,
1624                 .suite = {
1625                         .hash = {
1626                                 .vecs = rmd256_tv_template,
1627                                 .count = RMD256_TEST_VECTORS
1628                         }
1629                 }
1630         }, {
1631                 .alg = "rmd320",
1632                 .test = alg_test_hash,
1633                 .suite = {
1634                         .hash = {
1635                                 .vecs = rmd320_tv_template,
1636                                 .count = RMD320_TEST_VECTORS
1637                         }
1638                 }
1639         }, {
1640                 .alg = "salsa20",
1641                 .test = alg_test_skcipher,
1642                 .suite = {
1643                         .cipher = {
1644                                 .enc = {
1645                                         .vecs = salsa20_stream_enc_tv_template,
1646                                         .count = SALSA20_STREAM_ENC_TEST_VECTORS
1647                                 }
1648                         }
1649                 }
1650         }, {
1651                 .alg = "sha1",
1652                 .test = alg_test_hash,
1653                 .suite = {
1654                         .hash = {
1655                                 .vecs = sha1_tv_template,
1656                                 .count = SHA1_TEST_VECTORS
1657                         }
1658                 }
1659         }, {
1660                 .alg = "sha224",
1661                 .test = alg_test_hash,
1662                 .suite = {
1663                         .hash = {
1664                                 .vecs = sha224_tv_template,
1665                                 .count = SHA224_TEST_VECTORS
1666                         }
1667                 }
1668         }, {
1669                 .alg = "sha256",
1670                 .test = alg_test_hash,
1671                 .suite = {
1672                         .hash = {
1673                                 .vecs = sha256_tv_template,
1674                                 .count = SHA256_TEST_VECTORS
1675                         }
1676                 }
1677         }, {
1678                 .alg = "sha384",
1679                 .test = alg_test_hash,
1680                 .suite = {
1681                         .hash = {
1682                                 .vecs = sha384_tv_template,
1683                                 .count = SHA384_TEST_VECTORS
1684                         }
1685                 }
1686         }, {
1687                 .alg = "sha512",
1688                 .test = alg_test_hash,
1689                 .suite = {
1690                         .hash = {
1691                                 .vecs = sha512_tv_template,
1692                                 .count = SHA512_TEST_VECTORS
1693                         }
1694                 }
1695         }, {
1696                 .alg = "tgr128",
1697                 .test = alg_test_hash,
1698                 .suite = {
1699                         .hash = {
1700                                 .vecs = tgr128_tv_template,
1701                                 .count = TGR128_TEST_VECTORS
1702                         }
1703                 }
1704         }, {
1705                 .alg = "tgr160",
1706                 .test = alg_test_hash,
1707                 .suite = {
1708                         .hash = {
1709                                 .vecs = tgr160_tv_template,
1710                                 .count = TGR160_TEST_VECTORS
1711                         }
1712                 }
1713         }, {
1714                 .alg = "tgr192",
1715                 .test = alg_test_hash,
1716                 .suite = {
1717                         .hash = {
1718                                 .vecs = tgr192_tv_template,
1719                                 .count = TGR192_TEST_VECTORS
1720                         }
1721                 }
1722         }, {
1723                 .alg = "wp256",
1724                 .test = alg_test_hash,
1725                 .suite = {
1726                         .hash = {
1727                                 .vecs = wp256_tv_template,
1728                                 .count = WP256_TEST_VECTORS
1729                         }
1730                 }
1731         }, {
1732                 .alg = "wp384",
1733                 .test = alg_test_hash,
1734                 .suite = {
1735                         .hash = {
1736                                 .vecs = wp384_tv_template,
1737                                 .count = WP384_TEST_VECTORS
1738                         }
1739                 }
1740         }, {
1741                 .alg = "wp512",
1742                 .test = alg_test_hash,
1743                 .suite = {
1744                         .hash = {
1745                                 .vecs = wp512_tv_template,
1746                                 .count = WP512_TEST_VECTORS
1747                         }
1748                 }
1749         }, {
1750                 .alg = "xcbc(aes)",
1751                 .test = alg_test_hash,
1752                 .suite = {
1753                         .hash = {
1754                                 .vecs = aes_xcbc128_tv_template,
1755                                 .count = XCBC_AES_TEST_VECTORS
1756                         }
1757                 }
1758         }, {
1759                 .alg = "xts(aes)",
1760                 .test = alg_test_skcipher,
1761                 .suite = {
1762                         .cipher = {
1763                                 .enc = {
1764                                         .vecs = aes_xts_enc_tv_template,
1765                                         .count = AES_XTS_ENC_TEST_VECTORS
1766                                 },
1767                                 .dec = {
1768                                         .vecs = aes_xts_dec_tv_template,
1769                                         .count = AES_XTS_DEC_TEST_VECTORS
1770                                 }
1771                         }
1772                 }
1773         }
1774 };
1775
1776 static int alg_find_test(const char *alg)
1777 {
1778         int start = 0;
1779         int end = ARRAY_SIZE(alg_test_descs);
1780
1781         while (start < end) {
1782                 int i = (start + end) / 2;
1783                 int diff = strcmp(alg_test_descs[i].alg, alg);
1784
1785                 if (diff > 0) {
1786                         end = i;
1787                         continue;
1788                 }
1789
1790                 if (diff < 0) {
1791                         start = i + 1;
1792                         continue;
1793                 }
1794
1795                 return i;
1796         }
1797
1798         return -1;
1799 }
1800
1801 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
1802 {
1803         int i;
1804
1805         if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) {
1806                 char nalg[CRYPTO_MAX_ALG_NAME];
1807
1808                 if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
1809                     sizeof(nalg))
1810                         return -ENAMETOOLONG;
1811
1812                 i = alg_find_test(nalg);
1813                 if (i < 0)
1814                         goto notest;
1815
1816                 return alg_test_cipher(alg_test_descs + i, driver, type, mask);
1817         }
1818
1819         i = alg_find_test(alg);
1820         if (i < 0)
1821                 goto notest;
1822
1823         return alg_test_descs[i].test(alg_test_descs + i, driver,
1824                                       type, mask);
1825
1826 notest:
1827         printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
1828         return 0;
1829 }
1830 EXPORT_SYMBOL_GPL(alg_test);
1831
1832 int __init testmgr_init(void)
1833 {
1834         int i;
1835
1836         for (i = 0; i < XBUFSIZE; i++) {
1837                 xbuf[i] = (void *)__get_free_page(GFP_KERNEL);
1838                 if (!xbuf[i])
1839                         goto err_free_xbuf;
1840         }
1841
1842         for (i = 0; i < XBUFSIZE; i++) {
1843                 axbuf[i] = (void *)__get_free_page(GFP_KERNEL);
1844                 if (!axbuf[i])
1845                         goto err_free_axbuf;
1846         }
1847
1848         return 0;
1849
1850 err_free_axbuf:
1851         for (i = 0; i < XBUFSIZE && axbuf[i]; i++)
1852                 free_page((unsigned long)axbuf[i]);
1853 err_free_xbuf:
1854         for (i = 0; i < XBUFSIZE && xbuf[i]; i++)
1855                 free_page((unsigned long)xbuf[i]);
1856
1857         return -ENOMEM;
1858 }
1859
1860 void testmgr_exit(void)
1861 {
1862         int i;
1863
1864         for (i = 0; i < XBUFSIZE; i++)
1865                 free_page((unsigned long)axbuf[i]);
1866         for (i = 0; i < XBUFSIZE; i++)
1867                 free_page((unsigned long)xbuf[i]);
1868 }