testmgr.c 125.2 KB
Newer Older
1 2 3 4 5 6 7
/*
 * Algorithm testing framework and tests.
 *
 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
 * Copyright (c) 2007 Nokia Siemens Networks
 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
8
 * Copyright (c) 2019 Google LLC
9
 *
10 11 12 13 14 15 16
 * Updated RFC4106 AES-GCM testing.
 *    Authors: Aidan O'Mahony (aidan.o.mahony@intel.com)
 *             Adrian Hoban <adrian.hoban@intel.com>
 *             Gabriele Paoloni <gabriele.paoloni@intel.com>
 *             Tadeusz Struk (tadeusz.struk@intel.com)
 *    Copyright (c) 2010, Intel Corporation.
 *
17 18 19 20 21 22 23
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the Free
 * Software Foundation; either version 2 of the License, or (at your option)
 * any later version.
 *
 */

24
#include <crypto/aead.h>
25
#include <crypto/hash.h>
26
#include <crypto/skcipher.h>
27
#include <linux/err.h>
28
#include <linux/fips.h>
29
#include <linux/module.h>
30
#include <linux/once.h>
31
#include <linux/random.h>
32 33 34
#include <linux/scatterlist.h>
#include <linux/slab.h>
#include <linux/string.h>
35
#include <crypto/rng.h>
36
#include <crypto/drbg.h>
37
#include <crypto/akcipher.h>
38
#include <crypto/kpp.h>
39
#include <crypto/acompress.h>
40
#include <crypto/internal/simd.h>
41 42

#include "internal.h"
43

44 45 46 47
static bool notests;
module_param(notests, bool, 0644);
MODULE_PARM_DESC(notests, "disable crypto self-tests");

48 49 50
static bool panic_on_fail;
module_param(panic_on_fail, bool, 0444);

51 52 53 54 55 56 57 58
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
static bool noextratests;
module_param(noextratests, bool, 0644);
MODULE_PARM_DESC(noextratests, "disable expensive crypto self-tests");

static unsigned int fuzz_iterations = 100;
module_param(fuzz_iterations, uint, 0644);
MODULE_PARM_DESC(fuzz_iterations, "number of fuzz test iterations");
59 60 61

DEFINE_PER_CPU(bool, crypto_simd_disabled_for_test);
EXPORT_PER_CPU_SYMBOL_GPL(crypto_simd_disabled_for_test);
62 63
#endif

64
#ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
65 66 67 68 69 70 71 72 73

/* a perfect nop */
int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
{
	return 0;
}

#else

74 75 76 77 78 79 80 81 82 83 84 85 86 87
#include "testmgr.h"

/*
 * Need slab memory for testing (size in number of pages).
 */
#define XBUFSIZE	8

/*
* Used by test_cipher()
*/
#define ENCRYPT 1
#define DECRYPT 0

struct aead_test_suite {
88 89
	const struct aead_testvec *vecs;
	unsigned int count;
90 91 92
};

struct cipher_test_suite {
93 94
	const struct cipher_testvec *vecs;
	unsigned int count;
95 96 97 98
};

struct comp_test_suite {
	struct {
99
		const struct comp_testvec *vecs;
100 101 102 103 104
		unsigned int count;
	} comp, decomp;
};

struct hash_test_suite {
105
	const struct hash_testvec *vecs;
106 107 108
	unsigned int count;
};

109
struct cprng_test_suite {
110
	const struct cprng_testvec *vecs;
111 112 113
	unsigned int count;
};

114
struct drbg_test_suite {
115
	const struct drbg_testvec *vecs;
116 117 118
	unsigned int count;
};

119
struct akcipher_test_suite {
120
	const struct akcipher_testvec *vecs;
121 122 123
	unsigned int count;
};

124
struct kpp_test_suite {
125
	const struct kpp_testvec *vecs;
126 127 128
	unsigned int count;
};

129 130
struct alg_test_desc {
	const char *alg;
131
	const char *generic_driver;
132 133
	int (*test)(const struct alg_test_desc *desc, const char *driver,
		    u32 type, u32 mask);
134
	int fips_allowed;	/* set if alg is allowed in fips mode */
135 136 137 138 139 140

	union {
		struct aead_test_suite aead;
		struct cipher_test_suite cipher;
		struct comp_test_suite comp;
		struct hash_test_suite hash;
141
		struct cprng_test_suite cprng;
142
		struct drbg_test_suite drbg;
143
		struct akcipher_test_suite akcipher;
144
		struct kpp_test_suite kpp;
145 146 147 148 149 150 151 152 153 154
	} suite;
};

static void hexdump(unsigned char *buf, unsigned int len)
{
	print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
			16, 1,
			buf, len, false);
}

155
static int __testmgr_alloc_buf(char *buf[XBUFSIZE], int order)
156 157 158 159
{
	int i;

	for (i = 0; i < XBUFSIZE; i++) {
160
		buf[i] = (char *)__get_free_pages(GFP_KERNEL, order);
161 162 163 164 165 166 167 168
		if (!buf[i])
			goto err_free_buf;
	}

	return 0;

err_free_buf:
	while (i-- > 0)
169
		free_pages((unsigned long)buf[i], order);
170 171 172 173

	return -ENOMEM;
}

174 175 176 177 178 179
static int testmgr_alloc_buf(char *buf[XBUFSIZE])
{
	return __testmgr_alloc_buf(buf, 0);
}

static void __testmgr_free_buf(char *buf[XBUFSIZE], int order)
180 181 182 183
{
	int i;

	for (i = 0; i < XBUFSIZE; i++)
184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240
		free_pages((unsigned long)buf[i], order);
}

static void testmgr_free_buf(char *buf[XBUFSIZE])
{
	__testmgr_free_buf(buf, 0);
}

#define TESTMGR_POISON_BYTE	0xfe
#define TESTMGR_POISON_LEN	16

static inline void testmgr_poison(void *addr, size_t len)
{
	memset(addr, TESTMGR_POISON_BYTE, len);
}

/* Is the memory region still fully poisoned? */
static inline bool testmgr_is_poison(const void *addr, size_t len)
{
	return memchr_inv(addr, TESTMGR_POISON_BYTE, len) == NULL;
}

/* flush type for hash algorithms */
enum flush_type {
	/* merge with update of previous buffer(s) */
	FLUSH_TYPE_NONE = 0,

	/* update with previous buffer(s) before doing this one */
	FLUSH_TYPE_FLUSH,

	/* likewise, but also export and re-import the intermediate state */
	FLUSH_TYPE_REIMPORT,
};

/* finalization function for hash algorithms */
enum finalization_type {
	FINALIZATION_TYPE_FINAL,	/* use final() */
	FINALIZATION_TYPE_FINUP,	/* use finup() */
	FINALIZATION_TYPE_DIGEST,	/* use digest() */
};

#define TEST_SG_TOTAL	10000

/**
 * struct test_sg_division - description of a scatterlist entry
 *
 * This struct describes one entry of a scatterlist being constructed to check a
 * crypto test vector.
 *
 * @proportion_of_total: length of this chunk relative to the total length,
 *			 given as a proportion out of TEST_SG_TOTAL so that it
 *			 scales to fit any test vector
 * @offset: byte offset into a 2-page buffer at which this chunk will start
 * @offset_relative_to_alignmask: if true, add the algorithm's alignmask to the
 *				  @offset
 * @flush_type: for hashes, whether an update() should be done now vs.
 *		continuing to accumulate data
241
 * @nosimd: if doing the pending update(), do it with SIMD disabled?
242 243 244 245 246 247
 */
struct test_sg_division {
	unsigned int proportion_of_total;
	unsigned int offset;
	bool offset_relative_to_alignmask;
	enum flush_type flush_type;
248
	bool nosimd;
249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267
};

/**
 * struct testvec_config - configuration for testing a crypto test vector
 *
 * This struct describes the data layout and other parameters with which each
 * crypto test vector can be tested.
 *
 * @name: name of this config, logged for debugging purposes if a test fails
 * @inplace: operate on the data in-place, if applicable for the algorithm type?
 * @req_flags: extra request_flags, e.g. CRYPTO_TFM_REQ_MAY_SLEEP
 * @src_divs: description of how to arrange the source scatterlist
 * @dst_divs: description of how to arrange the dst scatterlist, if applicable
 *	      for the algorithm type.  Defaults to @src_divs if unset.
 * @iv_offset: misalignment of the IV in the range [0..MAX_ALGAPI_ALIGNMASK+1],
 *	       where 0 is aligned to a 2*(MAX_ALGAPI_ALIGNMASK+1) byte boundary
 * @iv_offset_relative_to_alignmask: if true, add the algorithm's alignmask to
 *				     the @iv_offset
 * @finalization_type: what finalization function to use for hashes
268
 * @nosimd: execute with SIMD disabled?  Requires !CRYPTO_TFM_REQ_MAY_SLEEP.
269 270 271 272 273 274 275 276 277 278
 */
struct testvec_config {
	const char *name;
	bool inplace;
	u32 req_flags;
	struct test_sg_division src_divs[XBUFSIZE];
	struct test_sg_division dst_divs[XBUFSIZE];
	unsigned int iv_offset;
	bool iv_offset_relative_to_alignmask;
	enum finalization_type finalization_type;
279
	bool nosimd;
280 281 282 283
};

#define TESTVEC_CONFIG_NAMELEN	192

284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345
/*
 * The following are the lists of testvec_configs to test for each algorithm
 * type when the basic crypto self-tests are enabled, i.e. when
 * CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is unset.  They aim to provide good test
 * coverage, while keeping the test time much shorter than the full fuzz tests
 * so that the basic tests can be enabled in a wider range of circumstances.
 */

/* Configs for skciphers and aeads */
static const struct testvec_config default_cipher_testvec_configs[] = {
	{
		.name = "in-place",
		.inplace = true,
		.src_divs = { { .proportion_of_total = 10000 } },
	}, {
		.name = "out-of-place",
		.src_divs = { { .proportion_of_total = 10000 } },
	}, {
		.name = "unaligned buffer, offset=1",
		.src_divs = { { .proportion_of_total = 10000, .offset = 1 } },
		.iv_offset = 1,
	}, {
		.name = "buffer aligned only to alignmask",
		.src_divs = {
			{
				.proportion_of_total = 10000,
				.offset = 1,
				.offset_relative_to_alignmask = true,
			},
		},
		.iv_offset = 1,
		.iv_offset_relative_to_alignmask = true,
	}, {
		.name = "two even aligned splits",
		.src_divs = {
			{ .proportion_of_total = 5000 },
			{ .proportion_of_total = 5000 },
		},
	}, {
		.name = "uneven misaligned splits, may sleep",
		.req_flags = CRYPTO_TFM_REQ_MAY_SLEEP,
		.src_divs = {
			{ .proportion_of_total = 1900, .offset = 33 },
			{ .proportion_of_total = 3300, .offset = 7  },
			{ .proportion_of_total = 4800, .offset = 18 },
		},
		.iv_offset = 3,
	}, {
		.name = "misaligned splits crossing pages, inplace",
		.inplace = true,
		.src_divs = {
			{
				.proportion_of_total = 7500,
				.offset = PAGE_SIZE - 32
			}, {
				.proportion_of_total = 2500,
				.offset = PAGE_SIZE - 7
			},
		},
	}
};

346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418
static const struct testvec_config default_hash_testvec_configs[] = {
	{
		.name = "init+update+final aligned buffer",
		.src_divs = { { .proportion_of_total = 10000 } },
		.finalization_type = FINALIZATION_TYPE_FINAL,
	}, {
		.name = "init+finup aligned buffer",
		.src_divs = { { .proportion_of_total = 10000 } },
		.finalization_type = FINALIZATION_TYPE_FINUP,
	}, {
		.name = "digest aligned buffer",
		.src_divs = { { .proportion_of_total = 10000 } },
		.finalization_type = FINALIZATION_TYPE_DIGEST,
	}, {
		.name = "init+update+final misaligned buffer",
		.src_divs = { { .proportion_of_total = 10000, .offset = 1 } },
		.finalization_type = FINALIZATION_TYPE_FINAL,
	}, {
		.name = "digest buffer aligned only to alignmask",
		.src_divs = {
			{
				.proportion_of_total = 10000,
				.offset = 1,
				.offset_relative_to_alignmask = true,
			},
		},
		.finalization_type = FINALIZATION_TYPE_DIGEST,
	}, {
		.name = "init+update+update+final two even splits",
		.src_divs = {
			{ .proportion_of_total = 5000 },
			{
				.proportion_of_total = 5000,
				.flush_type = FLUSH_TYPE_FLUSH,
			},
		},
		.finalization_type = FINALIZATION_TYPE_FINAL,
	}, {
		.name = "digest uneven misaligned splits, may sleep",
		.req_flags = CRYPTO_TFM_REQ_MAY_SLEEP,
		.src_divs = {
			{ .proportion_of_total = 1900, .offset = 33 },
			{ .proportion_of_total = 3300, .offset = 7  },
			{ .proportion_of_total = 4800, .offset = 18 },
		},
		.finalization_type = FINALIZATION_TYPE_DIGEST,
	}, {
		.name = "digest misaligned splits crossing pages",
		.src_divs = {
			{
				.proportion_of_total = 7500,
				.offset = PAGE_SIZE - 32,
			}, {
				.proportion_of_total = 2500,
				.offset = PAGE_SIZE - 7,
			},
		},
		.finalization_type = FINALIZATION_TYPE_DIGEST,
	}, {
		.name = "import/export",
		.src_divs = {
			{
				.proportion_of_total = 6500,
				.flush_type = FLUSH_TYPE_REIMPORT,
			}, {
				.proportion_of_total = 3500,
				.flush_type = FLUSH_TYPE_REIMPORT,
			},
		},
		.finalization_type = FINALIZATION_TYPE_FINAL,
	}
};

419 420 421 422 423 424 425 426 427 428 429 430
static unsigned int count_test_sg_divisions(const struct test_sg_division *divs)
{
	unsigned int remaining = TEST_SG_TOTAL;
	unsigned int ndivs = 0;

	do {
		remaining -= divs[ndivs++].proportion_of_total;
	} while (remaining);

	return ndivs;
}

431 432 433
#define SGDIVS_HAVE_FLUSHES	BIT(0)
#define SGDIVS_HAVE_NOSIMD	BIT(1)

434
static bool valid_sg_divisions(const struct test_sg_division *divs,
435
			       unsigned int count, int *flags_ret)
436 437 438 439 440 441 442 443 444 445
{
	unsigned int total = 0;
	unsigned int i;

	for (i = 0; i < count && total != TEST_SG_TOTAL; i++) {
		if (divs[i].proportion_of_total <= 0 ||
		    divs[i].proportion_of_total > TEST_SG_TOTAL - total)
			return false;
		total += divs[i].proportion_of_total;
		if (divs[i].flush_type != FLUSH_TYPE_NONE)
446 447 448
			*flags_ret |= SGDIVS_HAVE_FLUSHES;
		if (divs[i].nosimd)
			*flags_ret |= SGDIVS_HAVE_NOSIMD;
449 450 451 452 453 454 455 456 457 458 459 460
	}
	return total == TEST_SG_TOTAL &&
		memchr_inv(&divs[i], 0, (count - i) * sizeof(divs[0])) == NULL;
}

/*
 * Check whether the given testvec_config is valid.  This isn't strictly needed
 * since every testvec_config should be valid, but check anyway so that people
 * don't unknowingly add broken configs that don't do what they wanted.
 */
static bool valid_testvec_config(const struct testvec_config *cfg)
{
461
	int flags = 0;
462 463 464 465 466

	if (cfg->name == NULL)
		return false;

	if (!valid_sg_divisions(cfg->src_divs, ARRAY_SIZE(cfg->src_divs),
467
				&flags))
468 469 470 471
		return false;

	if (cfg->dst_divs[0].proportion_of_total) {
		if (!valid_sg_divisions(cfg->dst_divs,
472
					ARRAY_SIZE(cfg->dst_divs), &flags))
473 474 475 476 477 478 479 480 481 482 483 484
			return false;
	} else {
		if (memchr_inv(cfg->dst_divs, 0, sizeof(cfg->dst_divs)))
			return false;
		/* defaults to dst_divs=src_divs */
	}

	if (cfg->iv_offset +
	    (cfg->iv_offset_relative_to_alignmask ? MAX_ALGAPI_ALIGNMASK : 0) >
	    MAX_ALGAPI_ALIGNMASK + 1)
		return false;

485 486 487 488 489 490
	if ((flags & (SGDIVS_HAVE_FLUSHES | SGDIVS_HAVE_NOSIMD)) &&
	    cfg->finalization_type == FINALIZATION_TYPE_DIGEST)
		return false;

	if ((cfg->nosimd || (flags & SGDIVS_HAVE_NOSIMD)) &&
	    (cfg->req_flags & CRYPTO_TFM_REQ_MAY_SLEEP))
491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745
		return false;

	return true;
}

struct test_sglist {
	char *bufs[XBUFSIZE];
	struct scatterlist sgl[XBUFSIZE];
	struct scatterlist sgl_saved[XBUFSIZE];
	struct scatterlist *sgl_ptr;
	unsigned int nents;
};

static int init_test_sglist(struct test_sglist *tsgl)
{
	return __testmgr_alloc_buf(tsgl->bufs, 1 /* two pages per buffer */);
}

static void destroy_test_sglist(struct test_sglist *tsgl)
{
	return __testmgr_free_buf(tsgl->bufs, 1 /* two pages per buffer */);
}

/**
 * build_test_sglist() - build a scatterlist for a crypto test
 *
 * @tsgl: the scatterlist to build.  @tsgl->bufs[] contains an array of 2-page
 *	  buffers which the scatterlist @tsgl->sgl[] will be made to point into.
 * @divs: the layout specification on which the scatterlist will be based
 * @alignmask: the algorithm's alignmask
 * @total_len: the total length of the scatterlist to build in bytes
 * @data: if non-NULL, the buffers will be filled with this data until it ends.
 *	  Otherwise the buffers will be poisoned.  In both cases, some bytes
 *	  past the end of each buffer will be poisoned to help detect overruns.
 * @out_divs: if non-NULL, the test_sg_division to which each scatterlist entry
 *	      corresponds will be returned here.  This will match @divs except
 *	      that divisions resolving to a length of 0 are omitted as they are
 *	      not included in the scatterlist.
 *
 * Return: 0 or a -errno value
 */
static int build_test_sglist(struct test_sglist *tsgl,
			     const struct test_sg_division *divs,
			     const unsigned int alignmask,
			     const unsigned int total_len,
			     struct iov_iter *data,
			     const struct test_sg_division *out_divs[XBUFSIZE])
{
	struct {
		const struct test_sg_division *div;
		size_t length;
	} partitions[XBUFSIZE];
	const unsigned int ndivs = count_test_sg_divisions(divs);
	unsigned int len_remaining = total_len;
	unsigned int i;

	BUILD_BUG_ON(ARRAY_SIZE(partitions) != ARRAY_SIZE(tsgl->sgl));
	if (WARN_ON(ndivs > ARRAY_SIZE(partitions)))
		return -EINVAL;

	/* Calculate the (div, length) pairs */
	tsgl->nents = 0;
	for (i = 0; i < ndivs; i++) {
		unsigned int len_this_sg =
			min(len_remaining,
			    (total_len * divs[i].proportion_of_total +
			     TEST_SG_TOTAL / 2) / TEST_SG_TOTAL);

		if (len_this_sg != 0) {
			partitions[tsgl->nents].div = &divs[i];
			partitions[tsgl->nents].length = len_this_sg;
			tsgl->nents++;
			len_remaining -= len_this_sg;
		}
	}
	if (tsgl->nents == 0) {
		partitions[tsgl->nents].div = &divs[0];
		partitions[tsgl->nents].length = 0;
		tsgl->nents++;
	}
	partitions[tsgl->nents - 1].length += len_remaining;

	/* Set up the sgl entries and fill the data or poison */
	sg_init_table(tsgl->sgl, tsgl->nents);
	for (i = 0; i < tsgl->nents; i++) {
		unsigned int offset = partitions[i].div->offset;
		void *addr;

		if (partitions[i].div->offset_relative_to_alignmask)
			offset += alignmask;

		while (offset + partitions[i].length + TESTMGR_POISON_LEN >
		       2 * PAGE_SIZE) {
			if (WARN_ON(offset <= 0))
				return -EINVAL;
			offset /= 2;
		}

		addr = &tsgl->bufs[i][offset];
		sg_set_buf(&tsgl->sgl[i], addr, partitions[i].length);

		if (out_divs)
			out_divs[i] = partitions[i].div;

		if (data) {
			size_t copy_len, copied;

			copy_len = min(partitions[i].length, data->count);
			copied = copy_from_iter(addr, copy_len, data);
			if (WARN_ON(copied != copy_len))
				return -EINVAL;
			testmgr_poison(addr + copy_len, partitions[i].length +
				       TESTMGR_POISON_LEN - copy_len);
		} else {
			testmgr_poison(addr, partitions[i].length +
				       TESTMGR_POISON_LEN);
		}
	}

	sg_mark_end(&tsgl->sgl[tsgl->nents - 1]);
	tsgl->sgl_ptr = tsgl->sgl;
	memcpy(tsgl->sgl_saved, tsgl->sgl, tsgl->nents * sizeof(tsgl->sgl[0]));
	return 0;
}

/*
 * Verify that a scatterlist crypto operation produced the correct output.
 *
 * @tsgl: scatterlist containing the actual output
 * @expected_output: buffer containing the expected output
 * @len_to_check: length of @expected_output in bytes
 * @unchecked_prefix_len: number of ignored bytes in @tsgl prior to real result
 * @check_poison: verify that the poison bytes after each chunk are intact?
 *
 * Return: 0 if correct, -EINVAL if incorrect, -EOVERFLOW if buffer overrun.
 */
static int verify_correct_output(const struct test_sglist *tsgl,
				 const char *expected_output,
				 unsigned int len_to_check,
				 unsigned int unchecked_prefix_len,
				 bool check_poison)
{
	unsigned int i;

	for (i = 0; i < tsgl->nents; i++) {
		struct scatterlist *sg = &tsgl->sgl_ptr[i];
		unsigned int len = sg->length;
		unsigned int offset = sg->offset;
		const char *actual_output;

		if (unchecked_prefix_len) {
			if (unchecked_prefix_len >= len) {
				unchecked_prefix_len -= len;
				continue;
			}
			offset += unchecked_prefix_len;
			len -= unchecked_prefix_len;
			unchecked_prefix_len = 0;
		}
		len = min(len, len_to_check);
		actual_output = page_address(sg_page(sg)) + offset;
		if (memcmp(expected_output, actual_output, len) != 0)
			return -EINVAL;
		if (check_poison &&
		    !testmgr_is_poison(actual_output + len, TESTMGR_POISON_LEN))
			return -EOVERFLOW;
		len_to_check -= len;
		expected_output += len;
	}
	if (WARN_ON(len_to_check != 0))
		return -EINVAL;
	return 0;
}

static bool is_test_sglist_corrupted(const struct test_sglist *tsgl)
{
	unsigned int i;

	for (i = 0; i < tsgl->nents; i++) {
		if (tsgl->sgl[i].page_link != tsgl->sgl_saved[i].page_link)
			return true;
		if (tsgl->sgl[i].offset != tsgl->sgl_saved[i].offset)
			return true;
		if (tsgl->sgl[i].length != tsgl->sgl_saved[i].length)
			return true;
	}
	return false;
}

struct cipher_test_sglists {
	struct test_sglist src;
	struct test_sglist dst;
};

static struct cipher_test_sglists *alloc_cipher_test_sglists(void)
{
	struct cipher_test_sglists *tsgls;

	tsgls = kmalloc(sizeof(*tsgls), GFP_KERNEL);
	if (!tsgls)
		return NULL;

	if (init_test_sglist(&tsgls->src) != 0)
		goto fail_kfree;
	if (init_test_sglist(&tsgls->dst) != 0)
		goto fail_destroy_src;

	return tsgls;

fail_destroy_src:
	destroy_test_sglist(&tsgls->src);
fail_kfree:
	kfree(tsgls);
	return NULL;
}

static void free_cipher_test_sglists(struct cipher_test_sglists *tsgls)
{
	if (tsgls) {
		destroy_test_sglist(&tsgls->src);
		destroy_test_sglist(&tsgls->dst);
		kfree(tsgls);
	}
}

/* Build the src and dst scatterlists for an skcipher or AEAD test */
static int build_cipher_test_sglists(struct cipher_test_sglists *tsgls,
				     const struct testvec_config *cfg,
				     unsigned int alignmask,
				     unsigned int src_total_len,
				     unsigned int dst_total_len,
				     const struct kvec *inputs,
				     unsigned int nr_inputs)
{
	struct iov_iter input;
	int err;

	iov_iter_kvec(&input, WRITE, inputs, nr_inputs, src_total_len);
	err = build_test_sglist(&tsgls->src, cfg->src_divs, alignmask,
				cfg->inplace ?
					max(dst_total_len, src_total_len) :
					src_total_len,
				&input, NULL);
	if (err)
		return err;

	if (cfg->inplace) {
		tsgls->dst.sgl_ptr = tsgls->src.sgl;
		tsgls->dst.nents = tsgls->src.nents;
		return 0;
	}
	return build_test_sglist(&tsgls->dst,
				 cfg->dst_divs[0].proportion_of_total ?
					cfg->dst_divs : cfg->src_divs,
				 alignmask, dst_total_len, NULL, NULL);
746 747
}

748
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833

/* Generate a random length in range [0, max_len], but prefer smaller values */
static unsigned int generate_random_length(unsigned int max_len)
{
	unsigned int len = prandom_u32() % (max_len + 1);

	switch (prandom_u32() % 4) {
	case 0:
		return len % 64;
	case 1:
		return len % 256;
	case 2:
		return len % 1024;
	default:
		return len;
	}
}

/* Sometimes make some random changes to the given data buffer */
static void mutate_buffer(u8 *buf, size_t count)
{
	size_t num_flips;
	size_t i;
	size_t pos;

	/* Sometimes flip some bits */
	if (prandom_u32() % 4 == 0) {
		num_flips = min_t(size_t, 1 << (prandom_u32() % 8), count * 8);
		for (i = 0; i < num_flips; i++) {
			pos = prandom_u32() % (count * 8);
			buf[pos / 8] ^= 1 << (pos % 8);
		}
	}

	/* Sometimes flip some bytes */
	if (prandom_u32() % 4 == 0) {
		num_flips = min_t(size_t, 1 << (prandom_u32() % 8), count);
		for (i = 0; i < num_flips; i++)
			buf[prandom_u32() % count] ^= 0xff;
	}
}

/* Randomly generate 'count' bytes, but sometimes make them "interesting" */
static void generate_random_bytes(u8 *buf, size_t count)
{
	u8 b;
	u8 increment;
	size_t i;

	if (count == 0)
		return;

	switch (prandom_u32() % 8) { /* Choose a generation strategy */
	case 0:
	case 1:
		/* All the same byte, plus optional mutations */
		switch (prandom_u32() % 4) {
		case 0:
			b = 0x00;
			break;
		case 1:
			b = 0xff;
			break;
		default:
			b = (u8)prandom_u32();
			break;
		}
		memset(buf, b, count);
		mutate_buffer(buf, count);
		break;
	case 2:
		/* Ascending or descending bytes, plus optional mutations */
		increment = (u8)prandom_u32();
		b = (u8)prandom_u32();
		for (i = 0; i < count; i++, b += increment)
			buf[i] = b;
		mutate_buffer(buf, count);
		break;
	default:
		/* Fully random bytes */
		for (i = 0; i < count; i++)
			buf[i] = (u8)prandom_u32();
	}
}

834 835
static char *generate_random_sgl_divisions(struct test_sg_division *divs,
					   size_t max_divs, char *p, char *end,
836
					   bool gen_flushes, u32 req_flags)
837 838 839 840 841 842
{
	struct test_sg_division *div = divs;
	unsigned int remaining = TEST_SG_TOTAL;

	do {
		unsigned int this_len;
843
		const char *flushtype_str;
844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871

		if (div == &divs[max_divs - 1] || prandom_u32() % 2 == 0)
			this_len = remaining;
		else
			this_len = 1 + (prandom_u32() % remaining);
		div->proportion_of_total = this_len;

		if (prandom_u32() % 4 == 0)
			div->offset = (PAGE_SIZE - 128) + (prandom_u32() % 128);
		else if (prandom_u32() % 2 == 0)
			div->offset = prandom_u32() % 32;
		else
			div->offset = prandom_u32() % PAGE_SIZE;
		if (prandom_u32() % 8 == 0)
			div->offset_relative_to_alignmask = true;

		div->flush_type = FLUSH_TYPE_NONE;
		if (gen_flushes) {
			switch (prandom_u32() % 4) {
			case 0:
				div->flush_type = FLUSH_TYPE_REIMPORT;
				break;
			case 1:
				div->flush_type = FLUSH_TYPE_FLUSH;
				break;
			}
		}

872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894
		if (div->flush_type != FLUSH_TYPE_NONE &&
		    !(req_flags & CRYPTO_TFM_REQ_MAY_SLEEP) &&
		    prandom_u32() % 2 == 0)
			div->nosimd = true;

		switch (div->flush_type) {
		case FLUSH_TYPE_FLUSH:
			if (div->nosimd)
				flushtype_str = "<flush,nosimd>";
			else
				flushtype_str = "<flush>";
			break;
		case FLUSH_TYPE_REIMPORT:
			if (div->nosimd)
				flushtype_str = "<reimport,nosimd>";
			else
				flushtype_str = "<reimport>";
			break;
		default:
			flushtype_str = "";
			break;
		}

895
		BUILD_BUG_ON(TEST_SG_TOTAL != 10000); /* for "%u.%u%%" */
896
		p += scnprintf(p, end - p, "%s%u.%u%%@%s+%u%s", flushtype_str,
897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945
			       this_len / 100, this_len % 100,
			       div->offset_relative_to_alignmask ?
					"alignmask" : "",
			       div->offset, this_len == remaining ? "" : ", ");
		remaining -= this_len;
		div++;
	} while (remaining);

	return p;
}

/* Generate a random testvec_config for fuzz testing */
static void generate_random_testvec_config(struct testvec_config *cfg,
					   char *name, size_t max_namelen)
{
	char *p = name;
	char * const end = name + max_namelen;

	memset(cfg, 0, sizeof(*cfg));

	cfg->name = name;

	p += scnprintf(p, end - p, "random:");

	if (prandom_u32() % 2 == 0) {
		cfg->inplace = true;
		p += scnprintf(p, end - p, " inplace");
	}

	if (prandom_u32() % 2 == 0) {
		cfg->req_flags |= CRYPTO_TFM_REQ_MAY_SLEEP;
		p += scnprintf(p, end - p, " may_sleep");
	}

	switch (prandom_u32() % 4) {
	case 0:
		cfg->finalization_type = FINALIZATION_TYPE_FINAL;
		p += scnprintf(p, end - p, " use_final");
		break;
	case 1:
		cfg->finalization_type = FINALIZATION_TYPE_FINUP;
		p += scnprintf(p, end - p, " use_finup");
		break;
	default:
		cfg->finalization_type = FINALIZATION_TYPE_DIGEST;
		p += scnprintf(p, end - p, " use_digest");
		break;
	}

946 947 948 949 950 951
	if (!(cfg->req_flags & CRYPTO_TFM_REQ_MAY_SLEEP) &&
	    prandom_u32() % 2 == 0) {
		cfg->nosimd = true;
		p += scnprintf(p, end - p, " nosimd");
	}

952 953 954 955
	p += scnprintf(p, end - p, " src_divs=[");
	p = generate_random_sgl_divisions(cfg->src_divs,
					  ARRAY_SIZE(cfg->src_divs), p, end,
					  (cfg->finalization_type !=
956 957
					   FINALIZATION_TYPE_DIGEST),
					  cfg->req_flags);
958 959 960 961 962 963
	p += scnprintf(p, end - p, "]");

	if (!cfg->inplace && prandom_u32() % 2 == 0) {
		p += scnprintf(p, end - p, " dst_divs=[");
		p = generate_random_sgl_divisions(cfg->dst_divs,
						  ARRAY_SIZE(cfg->dst_divs),
964 965
						  p, end, false,
						  cfg->req_flags);
966 967 968 969 970 971 972 973 974 975
		p += scnprintf(p, end - p, "]");
	}

	if (prandom_u32() % 2 == 0) {
		cfg->iv_offset = 1 + (prandom_u32() % MAX_ALGAPI_ALIGNMASK);
		p += scnprintf(p, end - p, " iv_offset=%u", cfg->iv_offset);
	}

	WARN_ON_ONCE(!valid_testvec_config(cfg));
}
976 977 978 979 980 981 982 983 984 985 986 987

static void crypto_disable_simd_for_test(void)
{
	preempt_disable();
	__this_cpu_write(crypto_simd_disabled_for_test, true);
}

static void crypto_reenable_simd_for_test(void)
{
	__this_cpu_write(crypto_simd_disabled_for_test, false);
	preempt_enable();
}
988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029

/*
 * Given an algorithm name, build the name of the generic implementation of that
 * algorithm, assuming the usual naming convention.  Specifically, this appends
 * "-generic" to every part of the name that is not a template name.  Examples:
 *
 *	aes => aes-generic
 *	cbc(aes) => cbc(aes-generic)
 *	cts(cbc(aes)) => cts(cbc(aes-generic))
 *	rfc7539(chacha20,poly1305) => rfc7539(chacha20-generic,poly1305-generic)
 *
 * Return: 0 on success, or -ENAMETOOLONG if the generic name would be too long
 */
static int build_generic_driver_name(const char *algname,
				     char driver_name[CRYPTO_MAX_ALG_NAME])
{
	const char *in = algname;
	char *out = driver_name;
	size_t len = strlen(algname);

	if (len >= CRYPTO_MAX_ALG_NAME)
		goto too_long;
	do {
		const char *in_saved = in;

		while (*in && *in != '(' && *in != ')' && *in != ',')
			*out++ = *in++;
		if (*in != '(' && in > in_saved) {
			len += 8;
			if (len >= CRYPTO_MAX_ALG_NAME)
				goto too_long;
			memcpy(out, "-generic", 8);
			out += 8;
		}
	} while ((*out++ = *in++) != '\0');
	return 0;

too_long:
	pr_err("alg: generic driver name for \"%s\" would be too long\n",
	       algname);
	return -ENAMETOOLONG;
}
1030 1031 1032 1033 1034 1035 1036 1037 1038
#else /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */
static void crypto_disable_simd_for_test(void)
{
}

static void crypto_reenable_simd_for_test(void)
{
}
#endif /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */
1039

1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056
static int do_ahash_op(int (*op)(struct ahash_request *req),
		       struct ahash_request *req,
		       struct crypto_wait *wait, bool nosimd)
{
	int err;

	if (nosimd)
		crypto_disable_simd_for_test();

	err = op(req);

	if (nosimd)
		crypto_reenable_simd_for_test();

	return crypto_wait_req(err, wait);
}

1057 1058
static int check_nonfinal_hash_op(const char *op, int err,
				  u8 *result, unsigned int digestsize,
1059
				  const char *driver, const char *vec_name,
1060
				  const struct testvec_config *cfg)
1061
{
1062
	if (err) {
1063 1064
		pr_err("alg: hash: %s %s() failed with err %d on test vector %s, cfg=\"%s\"\n",
		       driver, op, err, vec_name, cfg->name);
1065
		return err;
1066
	}
1067
	if (!testmgr_is_poison(result, digestsize)) {
1068 1069
		pr_err("alg: hash: %s %s() used result buffer on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1070
		return -EINVAL;
1071
	}
1072
	return 0;
1073 1074
}

1075 1076
static int test_hash_vec_cfg(const char *driver,
			     const struct hash_testvec *vec,
1077
			     const char *vec_name,
1078 1079 1080 1081
			     const struct testvec_config *cfg,
			     struct ahash_request *req,
			     struct test_sglist *tsgl,
			     u8 *hashstate)
1082
{
1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096
	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
	const unsigned int alignmask = crypto_ahash_alignmask(tfm);
	const unsigned int digestsize = crypto_ahash_digestsize(tfm);
	const unsigned int statesize = crypto_ahash_statesize(tfm);
	const u32 req_flags = CRYPTO_TFM_REQ_MAY_BACKLOG | cfg->req_flags;
	const struct test_sg_division *divs[XBUFSIZE];
	DECLARE_CRYPTO_WAIT(wait);
	struct kvec _input;
	struct iov_iter input;
	unsigned int i;
	struct scatterlist *pending_sgl;
	unsigned int pending_len;
	u8 result[HASH_MAX_DIGESTSIZE + TESTMGR_POISON_LEN];
	int err;
1097

1098 1099 1100 1101
	/* Set the key, if specified */
	if (vec->ksize) {
		err = crypto_ahash_setkey(tfm, vec->key, vec->ksize);
		if (err) {
1102 1103
			if (err == vec->setkey_error)
				return 0;
1104 1105
			pr_err("alg: hash: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
			       driver, vec_name, vec->setkey_error, err,
1106 1107 1108
			       crypto_ahash_get_flags(tfm));
			return err;
		}
1109
		if (vec->setkey_error) {
1110 1111
			pr_err("alg: hash: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
			       driver, vec_name, vec->setkey_error);
1112 1113
			return -EINVAL;
		}
1114
	}
1115

1116 1117 1118 1119 1120 1121 1122
	/* Build the scatterlist for the source data */
	_input.iov_base = (void *)vec->plaintext;
	_input.iov_len = vec->psize;
	iov_iter_kvec(&input, WRITE, &_input, 1, vec->psize);
	err = build_test_sglist(tsgl, cfg->src_divs, alignmask, vec->psize,
				&input, divs);
	if (err) {
1123 1124
		pr_err("alg: hash: %s: error preparing scatterlist for test vector %s, cfg=\"%s\"\n",
		       driver, vec_name, cfg->name);
1125
		return err;
1126 1127
	}

1128
	/* Do the actual hashing */
1129

1130 1131
	testmgr_poison(req->__ctx, crypto_ahash_reqsize(tfm));
	testmgr_poison(result, digestsize + TESTMGR_POISON_LEN);
1132

1133 1134
	if (cfg->finalization_type == FINALIZATION_TYPE_DIGEST ||
	    vec->digest_error) {
1135 1136 1137 1138
		/* Just using digest() */
		ahash_request_set_callback(req, req_flags, crypto_req_done,
					   &wait);
		ahash_request_set_crypt(req, tsgl->sgl, result, vec->psize);
1139
		err = do_ahash_op(crypto_ahash_digest, req, &wait, cfg->nosimd);
1140
		if (err) {
1141 1142
			if (err == vec->digest_error)
				return 0;
1143 1144
			pr_err("alg: hash: %s digest() failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
			       driver, vec_name, vec->digest_error, err,
1145
			       cfg->name);
1146 1147
			return err;
		}
1148
		if (vec->digest_error) {
1149 1150
			pr_err("alg: hash: %s digest() unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
			       driver, vec_name, vec->digest_error, cfg->name);
1151 1152
			return -EINVAL;
		}
1153 1154
		goto result_ready;
	}
1155

1156
	/* Using init(), zero or more update(), then final() or finup() */
1157

1158 1159
	ahash_request_set_callback(req, req_flags, crypto_req_done, &wait);
	ahash_request_set_crypt(req, NULL, result, 0);
1160
	err = do_ahash_op(crypto_ahash_init, req, &wait, cfg->nosimd);
1161
	err = check_nonfinal_hash_op("init", err, result, digestsize,
1162
				     driver, vec_name, cfg);
1163 1164
	if (err)
		return err;
1165

1166 1167 1168 1169 1170 1171 1172 1173 1174 1175
	pending_sgl = NULL;
	pending_len = 0;
	for (i = 0; i < tsgl->nents; i++) {
		if (divs[i]->flush_type != FLUSH_TYPE_NONE &&
		    pending_sgl != NULL) {
			/* update() with the pending data */
			ahash_request_set_callback(req, req_flags,
						   crypto_req_done, &wait);
			ahash_request_set_crypt(req, pending_sgl, result,
						pending_len);
1176 1177
			err = do_ahash_op(crypto_ahash_update, req, &wait,
					  divs[i]->nosimd);
1178 1179
			err = check_nonfinal_hash_op("update", err,
						     result, digestsize,
1180
						     driver, vec_name, cfg);
1181 1182 1183 1184
			if (err)
				return err;
			pending_sgl = NULL;
			pending_len = 0;
1185
		}
1186 1187 1188 1189 1190 1191 1192
		if (divs[i]->flush_type == FLUSH_TYPE_REIMPORT) {
			/* Test ->export() and ->import() */
			testmgr_poison(hashstate + statesize,
				       TESTMGR_POISON_LEN);
			err = crypto_ahash_export(req, hashstate);
			err = check_nonfinal_hash_op("export", err,
						     result, digestsize,
1193
						     driver, vec_name, cfg);
1194 1195 1196 1197
			if (err)
				return err;
			if (!testmgr_is_poison(hashstate + statesize,
					       TESTMGR_POISON_LEN)) {
1198 1199
				pr_err("alg: hash: %s export() overran state buffer on test vector %s, cfg=\"%s\"\n",
				       driver, vec_name, cfg->name);
1200
				return -EOVERFLOW;
1201
			}
1202

1203 1204 1205 1206
			testmgr_poison(req->__ctx, crypto_ahash_reqsize(tfm));
			err = crypto_ahash_import(req, hashstate);
			err = check_nonfinal_hash_op("import", err,
						     result, digestsize,
1207
						     driver, vec_name, cfg);
1208 1209
			if (err)
				return err;
1210
		}
1211 1212 1213 1214
		if (pending_sgl == NULL)
			pending_sgl = &tsgl->sgl[i];
		pending_len += tsgl->sgl[i].length;
	}
1215

1216 1217 1218 1219
	ahash_request_set_callback(req, req_flags, crypto_req_done, &wait);
	ahash_request_set_crypt(req, pending_sgl, result, pending_len);
	if (cfg->finalization_type == FINALIZATION_TYPE_FINAL) {
		/* finish with update() and final() */
1220
		err = do_ahash_op(crypto_ahash_update, req, &wait, cfg->nosimd);
1221
		err = check_nonfinal_hash_op("update", err, result, digestsize,
1222
					     driver, vec_name, cfg);
1223 1224
		if (err)
			return err;
1225
		err = do_ahash_op(crypto_ahash_final, req, &wait, cfg->nosimd);
1226
		if (err) {
1227 1228
			pr_err("alg: hash: %s final() failed with err %d on test vector %s, cfg=\"%s\"\n",
			       driver, err, vec_name, cfg->name);
1229 1230 1231 1232
			return err;
		}
	} else {
		/* finish with finup() */
1233
		err = do_ahash_op(crypto_ahash_finup, req, &wait, cfg->nosimd);
1234
		if (err) {
1235 1236
			pr_err("alg: hash: %s finup() failed with err %d on test vector %s, cfg=\"%s\"\n",
			       driver, err, vec_name, cfg->name);
1237
			return err;
1238 1239 1240
		}
	}

1241 1242 1243
result_ready:
	/* Check that the algorithm produced the correct digest */
	if (memcmp(result, vec->digest, digestsize) != 0) {
1244 1245
		pr_err("alg: hash: %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
		       driver, vec_name, cfg->name);
1246 1247 1248
		return -EINVAL;
	}
	if (!testmgr_is_poison(&result[digestsize], TESTMGR_POISON_LEN)) {
1249 1250
		pr_err("alg: hash: %s overran result buffer on test vector %s, cfg=\"%s\"\n",
		       driver, vec_name, cfg->name);
1251 1252
		return -EOVERFLOW;
	}
1253

1254 1255
	return 0;
}
1256

1257 1258 1259 1260
static int test_hash_vec(const char *driver, const struct hash_testvec *vec,
			 unsigned int vec_num, struct ahash_request *req,
			 struct test_sglist *tsgl, u8 *hashstate)
{
1261
	char vec_name[16];
1262 1263
	unsigned int i;
	int err;
1264

1265 1266
	sprintf(vec_name, "%u", vec_num);

1267
	for (i = 0; i < ARRAY_SIZE(default_hash_testvec_configs); i++) {
1268
		err = test_hash_vec_cfg(driver, vec, vec_name,
1269 1270 1271 1272 1273
					&default_hash_testvec_configs[i],
					req, tsgl, hashstate);
		if (err)
			return err;
	}
1274

1275 1276 1277 1278
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
	if (!noextratests) {
		struct testvec_config cfg;
		char cfgname[TESTVEC_CONFIG_NAMELEN];
1279

1280 1281 1282
		for (i = 0; i < fuzz_iterations; i++) {
			generate_random_testvec_config(&cfg, cfgname,
						       sizeof(cfgname));
1283
			err = test_hash_vec_cfg(driver, vec, vec_name, &cfg,
1284 1285 1286
						req, tsgl, hashstate);
			if (err)
				return err;
1287 1288
		}
	}
1289 1290 1291
#endif
	return 0;
}
1292

1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
/*
 * Generate a hash test vector from the given implementation.
 * Assumes the buffers in 'vec' were already allocated.
 */
static void generate_random_hash_testvec(struct crypto_shash *tfm,
					 struct hash_testvec *vec,
					 unsigned int maxkeysize,
					 unsigned int maxdatasize,
					 char *name, size_t max_namelen)
{
	SHASH_DESC_ON_STACK(desc, tfm);

	/* Data */
	vec->psize = generate_random_length(maxdatasize);
	generate_random_bytes((u8 *)vec->plaintext, vec->psize);

	/*
	 * Key: length in range [1, maxkeysize], but usually choose maxkeysize.
	 * If algorithm is unkeyed, then maxkeysize == 0 and set ksize = 0.
	 */
	vec->setkey_error = 0;
	vec->ksize = 0;
	if (maxkeysize) {
		vec->ksize = maxkeysize;
		if (prandom_u32() % 4 == 0)
			vec->ksize = 1 + (prandom_u32() % maxkeysize);
		generate_random_bytes((u8 *)vec->key, vec->ksize);

		vec->setkey_error = crypto_shash_setkey(tfm, vec->key,
							vec->ksize);
		/* If the key couldn't be set, no need to continue to digest. */
		if (vec->setkey_error)
			goto done;
	}

	/* Digest */
	desc->tfm = tfm;
	vec->digest_error = crypto_shash_digest(desc, vec->plaintext,
						vec->psize, (u8 *)vec->digest);
done:
	snprintf(name, max_namelen, "\"random: psize=%u ksize=%u\"",
		 vec->psize, vec->ksize);
}

/*
 * Test the hash algorithm represented by @req against the corresponding generic
 * implementation, if one is available.
 */
static int test_hash_vs_generic_impl(const char *driver,
				     const char *generic_driver,
				     unsigned int maxkeysize,
				     struct ahash_request *req,
				     struct test_sglist *tsgl,
				     u8 *hashstate)
{
	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
	const unsigned int digestsize = crypto_ahash_digestsize(tfm);
	const unsigned int blocksize = crypto_ahash_blocksize(tfm);
	const unsigned int maxdatasize = (2 * PAGE_SIZE) - TESTMGR_POISON_LEN;
	const char *algname = crypto_hash_alg_common(tfm)->base.cra_name;
	char _generic_driver[CRYPTO_MAX_ALG_NAME];
	struct crypto_shash *generic_tfm = NULL;
	unsigned int i;
	struct hash_testvec vec = { 0 };
	char vec_name[64];
	struct testvec_config cfg;
	char cfgname[TESTVEC_CONFIG_NAMELEN];
	int err;

	if (noextratests)
		return 0;

	if (!generic_driver) { /* Use default naming convention? */
		err = build_generic_driver_name(algname, _generic_driver);
		if (err)
			return err;
		generic_driver = _generic_driver;
	}

	if (strcmp(generic_driver, driver) == 0) /* Already the generic impl? */
		return 0;

	generic_tfm = crypto_alloc_shash(generic_driver, 0, 0);
	if (IS_ERR(generic_tfm)) {
		err = PTR_ERR(generic_tfm);
		if (err == -ENOENT) {
			pr_warn("alg: hash: skipping comparison tests for %s because %s is unavailable\n",
				driver, generic_driver);
			return 0;
		}
		pr_err("alg: hash: error allocating %s (generic impl of %s): %d\n",
		       generic_driver, algname, err);
		return err;
	}

	/* Check the algorithm properties for consistency. */

	if (digestsize != crypto_shash_digestsize(generic_tfm)) {
		pr_err("alg: hash: digestsize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, digestsize,
		       crypto_shash_digestsize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	if (blocksize != crypto_shash_blocksize(generic_tfm)) {
		pr_err("alg: hash: blocksize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, blocksize, crypto_shash_blocksize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	/*
	 * Now generate test vectors using the generic implementation, and test
	 * the other implementation against them.
	 */

	vec.key = kmalloc(maxkeysize, GFP_KERNEL);
	vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL);
	vec.digest = kmalloc(digestsize, GFP_KERNEL);
	if (!vec.key || !vec.plaintext || !vec.digest) {
		err = -ENOMEM;
		goto out;
	}

	for (i = 0; i < fuzz_iterations * 8; i++) {
		generate_random_hash_testvec(generic_tfm, &vec,
					     maxkeysize, maxdatasize,
					     vec_name, sizeof(vec_name));
		generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));

		err = test_hash_vec_cfg(driver, &vec, vec_name, &cfg,
					req, tsgl, hashstate);
		if (err)
			goto out;
		cond_resched();
	}
	err = 0;
out:
	kfree(vec.key);
	kfree(vec.plaintext);
	kfree(vec.digest);
	crypto_free_shash(generic_tfm);
	return err;
}
#else /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */
static int test_hash_vs_generic_impl(const char *driver,
				     const char *generic_driver,
				     unsigned int maxkeysize,
				     struct ahash_request *req,
				     struct test_sglist *tsgl,
				     u8 *hashstate)
{
	return 0;
}
#endif /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */

1451 1452
static int __alg_test_hash(const struct hash_testvec *vecs,
			   unsigned int num_vecs, const char *driver,
1453 1454
			   u32 type, u32 mask,
			   const char *generic_driver, unsigned int maxkeysize)
1455 1456 1457 1458 1459 1460 1461
{
	struct crypto_ahash *tfm;
	struct ahash_request *req = NULL;
	struct test_sglist *tsgl = NULL;
	u8 *hashstate = NULL;
	unsigned int i;
	int err;
1462

1463 1464 1465 1466 1467 1468
	tfm = crypto_alloc_ahash(driver, type, mask);
	if (IS_ERR(tfm)) {
		pr_err("alg: hash: failed to allocate transform for %s: %ld\n",
		       driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}
1469

1470 1471 1472 1473 1474 1475 1476
	req = ahash_request_alloc(tfm, GFP_KERNEL);
	if (!req) {
		pr_err("alg: hash: failed to allocate request for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
	}
1477

1478 1479 1480 1481 1482 1483 1484 1485 1486
	tsgl = kmalloc(sizeof(*tsgl), GFP_KERNEL);
	if (!tsgl || init_test_sglist(tsgl) != 0) {
		pr_err("alg: hash: failed to allocate test buffers for %s\n",
		       driver);
		kfree(tsgl);
		tsgl = NULL;
		err = -ENOMEM;
		goto out;
	}
1487

1488 1489 1490 1491 1492 1493 1494 1495
	hashstate = kmalloc(crypto_ahash_statesize(tfm) + TESTMGR_POISON_LEN,
			    GFP_KERNEL);
	if (!hashstate) {
		pr_err("alg: hash: failed to allocate hash state buffer for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
	}
1496

1497 1498 1499
	for (i = 0; i < num_vecs; i++) {
		err = test_hash_vec(driver, &vecs[i], i, req, tsgl, hashstate);
		if (err)
1500
			goto out;
1501
	}
1502 1503
	err = test_hash_vs_generic_impl(driver, generic_driver, maxkeysize, req,
					tsgl, hashstate);
1504
out:
1505 1506 1507 1508 1509
	kfree(hashstate);
	if (tsgl) {
		destroy_test_sglist(tsgl);
		kfree(tsgl);
	}
1510
	ahash_request_free(req);
1511 1512
	crypto_free_ahash(tfm);
	return err;
1513 1514
}

1515 1516
static int alg_test_hash(const struct alg_test_desc *desc, const char *driver,
			 u32 type, u32 mask)
1517
{
1518 1519 1520
	const struct hash_testvec *template = desc->suite.hash.vecs;
	unsigned int tcount = desc->suite.hash.count;
	unsigned int nr_unkeyed, nr_keyed;
1521
	unsigned int maxkeysize = 0;
1522
	int err;
1523

1524 1525 1526 1527 1528
	/*
	 * For OPTIONAL_KEY algorithms, we have to do all the unkeyed tests
	 * first, before setting a key on the tfm.  To make this easier, we
	 * require that the unkeyed test vectors (if any) are listed first.
	 */
1529

1530 1531 1532 1533 1534 1535 1536 1537 1538 1539
	for (nr_unkeyed = 0; nr_unkeyed < tcount; nr_unkeyed++) {
		if (template[nr_unkeyed].ksize)
			break;
	}
	for (nr_keyed = 0; nr_unkeyed + nr_keyed < tcount; nr_keyed++) {
		if (!template[nr_unkeyed + nr_keyed].ksize) {
			pr_err("alg: hash: test vectors for %s out of order, "
			       "unkeyed ones must come first\n", desc->alg);
			return -EINVAL;
		}
1540 1541
		maxkeysize = max_t(unsigned int, maxkeysize,
				   template[nr_unkeyed + nr_keyed].ksize);
1542
	}
1543

1544 1545
	err = 0;
	if (nr_unkeyed) {
1546 1547
		err = __alg_test_hash(template, nr_unkeyed, driver, type, mask,
				      desc->generic_driver, maxkeysize);
1548
		template += nr_unkeyed;
1549 1550
	}

1551
	if (!err && nr_keyed)
1552 1553
		err = __alg_test_hash(template, nr_keyed, driver, type, mask,
				      desc->generic_driver, maxkeysize);
1554 1555

	return err;
1556 1557
}

1558 1559
static int test_aead_vec_cfg(const char *driver, int enc,
			     const struct aead_testvec *vec,
1560
			     const char *vec_name,
1561 1562 1563
			     const struct testvec_config *cfg,
			     struct aead_request *req,
			     struct cipher_test_sglists *tsgls)
1564
{
1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576
	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
	const unsigned int alignmask = crypto_aead_alignmask(tfm);
	const unsigned int ivsize = crypto_aead_ivsize(tfm);
	const unsigned int authsize = vec->clen - vec->plen;
	const u32 req_flags = CRYPTO_TFM_REQ_MAY_BACKLOG | cfg->req_flags;
	const char *op = enc ? "encryption" : "decryption";
	DECLARE_CRYPTO_WAIT(wait);
	u8 _iv[3 * (MAX_ALGAPI_ALIGNMASK + 1) + MAX_IVLEN];
	u8 *iv = PTR_ALIGN(&_iv[0], 2 * (MAX_ALGAPI_ALIGNMASK + 1)) +
		 cfg->iv_offset +
		 (cfg->iv_offset_relative_to_alignmask ? alignmask : 0);
	struct kvec input[2];
1577
	int expected_error;
1578
	int err;
1579

1580 1581 1582
	/* Set the key */
	if (vec->wk)
		crypto_aead_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
1583
	else
1584 1585
		crypto_aead_clear_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
	err = crypto_aead_setkey(tfm, vec->key, vec->klen);
1586
	if (err && err != vec->setkey_error) {
1587 1588
		pr_err("alg: aead: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
		       driver, vec_name, vec->setkey_error, err,
1589
		       crypto_aead_get_flags(tfm));
1590
		return err;
1591
	}
1592
	if (!err && vec->setkey_error) {
1593 1594
		pr_err("alg: aead: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
		       driver, vec_name, vec->setkey_error);
1595
		return -EINVAL;
1596 1597
	}

1598 1599
	/* Set the authentication tag size */
	err = crypto_aead_setauthsize(tfm, authsize);
1600
	if (err && err != vec->setauthsize_error) {
1601 1602
		pr_err("alg: aead: %s setauthsize failed on test vector %s; expected_error=%d, actual_error=%d\n",
		       driver, vec_name, vec->setauthsize_error, err);
1603 1604
		return err;
	}
1605
	if (!err && vec->setauthsize_error) {
1606 1607
		pr_err("alg: aead: %s setauthsize unexpectedly succeeded on test vector %s; expected_error=%d\n",
		       driver, vec_name, vec->setauthsize_error);
1608 1609 1610 1611 1612
		return -EINVAL;
	}

	if (vec->setkey_error || vec->setauthsize_error)
		return 0;
1613

1614 1615 1616 1617 1618 1619 1620
	/* The IV must be copied to a buffer, as the algorithm may modify it */
	if (WARN_ON(ivsize > MAX_IVLEN))
		return -EINVAL;
	if (vec->iv)
		memcpy(iv, vec->iv, ivsize);
	else
		memset(iv, 0, ivsize);
1621

1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633
	/* Build the src/dst scatterlists */
	input[0].iov_base = (void *)vec->assoc;
	input[0].iov_len = vec->alen;
	input[1].iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext;
	input[1].iov_len = enc ? vec->plen : vec->clen;
	err = build_cipher_test_sglists(tsgls, cfg, alignmask,
					vec->alen + (enc ? vec->plen :
						     vec->clen),
					vec->alen + (enc ? vec->clen :
						     vec->plen),
					input, 2);
	if (err) {
1634 1635
		pr_err("alg: aead: %s %s: error preparing scatterlists for test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1636 1637
		return err;
	}
1638

1639 1640 1641 1642 1643 1644
	/* Do the actual encryption or decryption */
	testmgr_poison(req->__ctx, crypto_aead_reqsize(tfm));
	aead_request_set_callback(req, req_flags, crypto_req_done, &wait);
	aead_request_set_crypt(req, tsgls->src.sgl_ptr, tsgls->dst.sgl_ptr,
			       enc ? vec->plen : vec->clen, iv);
	aead_request_set_ad(req, vec->alen);
1645 1646 1647 1648 1649 1650
	if (cfg->nosimd)
		crypto_disable_simd_for_test();
	err = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);
	if (cfg->nosimd)
		crypto_reenable_simd_for_test();
	err = crypto_wait_req(err, &wait);
1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661

	/* Check that the algorithm didn't overwrite things it shouldn't have */
	if (req->cryptlen != (enc ? vec->plen : vec->clen) ||
	    req->assoclen != vec->alen ||
	    req->iv != iv ||
	    req->src != tsgls->src.sgl_ptr ||
	    req->dst != tsgls->dst.sgl_ptr ||
	    crypto_aead_reqtfm(req) != tfm ||
	    req->base.complete != crypto_req_done ||
	    req->base.flags != req_flags ||
	    req->base.data != &wait) {
1662 1663
		pr_err("alg: aead: %s %s corrupted request struct on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684
		if (req->cryptlen != (enc ? vec->plen : vec->clen))
			pr_err("alg: aead: changed 'req->cryptlen'\n");
		if (req->assoclen != vec->alen)
			pr_err("alg: aead: changed 'req->assoclen'\n");
		if (req->iv != iv)
			pr_err("alg: aead: changed 'req->iv'\n");
		if (req->src != tsgls->src.sgl_ptr)
			pr_err("alg: aead: changed 'req->src'\n");
		if (req->dst != tsgls->dst.sgl_ptr)
			pr_err("alg: aead: changed 'req->dst'\n");
		if (crypto_aead_reqtfm(req) != tfm)
			pr_err("alg: aead: changed 'req->base.tfm'\n");
		if (req->base.complete != crypto_req_done)
			pr_err("alg: aead: changed 'req->base.complete'\n");
		if (req->base.flags != req_flags)
			pr_err("alg: aead: changed 'req->base.flags'\n");
		if (req->base.data != &wait)
			pr_err("alg: aead: changed 'req->base.data'\n");
		return -EINVAL;
	}
	if (is_test_sglist_corrupted(&tsgls->src)) {
1685 1686
		pr_err("alg: aead: %s %s corrupted src sgl on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1687 1688 1689 1690
		return -EINVAL;
	}
	if (tsgls->dst.sgl_ptr != tsgls->src.sgl &&
	    is_test_sglist_corrupted(&tsgls->dst)) {
1691 1692
		pr_err("alg: aead: %s %s corrupted dst sgl on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1693
		return -EINVAL;
1694
	}
1695

1696 1697 1698 1699 1700
	/* Check for success or failure */
	expected_error = vec->novrfy ? -EBADMSG : vec->crypt_error;
	if (err) {
		if (err == expected_error)
			return 0;
1701 1702
		pr_err("alg: aead: %s %s failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
		       driver, op, vec_name, expected_error, err, cfg->name);
1703 1704 1705
		return err;
	}
	if (expected_error) {
1706 1707
		pr_err("alg: aead: %s %s unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
		       driver, op, vec_name, expected_error, cfg->name);
1708 1709 1710
		return -EINVAL;
	}

1711 1712 1713 1714 1715
	/* Check for the correct output (ciphertext or plaintext) */
	err = verify_correct_output(&tsgls->dst, enc ? vec->ctext : vec->ptext,
				    enc ? vec->clen : vec->plen,
				    vec->alen, enc || !cfg->inplace);
	if (err == -EOVERFLOW) {
1716 1717
		pr_err("alg: aead: %s %s overran dst buffer on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1718 1719 1720
		return err;
	}
	if (err) {
1721 1722
		pr_err("alg: aead: %s %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
1723 1724
		return err;
	}
1725

1726 1727
	return 0;
}
1728

1729 1730 1731 1732 1733
static int test_aead_vec(const char *driver, int enc,
			 const struct aead_testvec *vec, unsigned int vec_num,
			 struct aead_request *req,
			 struct cipher_test_sglists *tsgls)
{
1734
	char vec_name[16];
1735 1736
	unsigned int i;
	int err;
1737

1738 1739
	if (enc && vec->novrfy)
		return 0;
1740

1741 1742
	sprintf(vec_name, "%u", vec_num);

1743
	for (i = 0; i < ARRAY_SIZE(default_cipher_testvec_configs); i++) {
1744
		err = test_aead_vec_cfg(driver, enc, vec, vec_name,
1745 1746 1747 1748 1749
					&default_cipher_testvec_configs[i],
					req, tsgls);
		if (err)
			return err;
	}
1750

1751 1752 1753 1754
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
	if (!noextratests) {
		struct testvec_config cfg;
		char cfgname[TESTVEC_CONFIG_NAMELEN];
1755

1756 1757 1758
		for (i = 0; i < fuzz_iterations; i++) {
			generate_random_testvec_config(&cfg, cfgname,
						       sizeof(cfgname));
1759
			err = test_aead_vec_cfg(driver, enc, vec, vec_name,
1760 1761 1762
						&cfg, req, tsgls);
			if (err)
				return err;
1763 1764
		}
	}
1765 1766 1767
#endif
	return 0;
}
1768

1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
/*
 * Generate an AEAD test vector from the given implementation.
 * Assumes the buffers in 'vec' were already allocated.
 */
static void generate_random_aead_testvec(struct aead_request *req,
					 struct aead_testvec *vec,
					 unsigned int maxkeysize,
					 unsigned int maxdatasize,
					 char *name, size_t max_namelen)
{
	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
	const unsigned int ivsize = crypto_aead_ivsize(tfm);
	unsigned int maxauthsize = crypto_aead_alg(tfm)->maxauthsize;
	unsigned int authsize;
	unsigned int total_len;
	int i;
	struct scatterlist src[2], dst;
	u8 iv[MAX_IVLEN];
	DECLARE_CRYPTO_WAIT(wait);

	/* Key: length in [0, maxkeysize], but usually choose maxkeysize */
	vec->klen = maxkeysize;
	if (prandom_u32() % 4 == 0)
		vec->klen = prandom_u32() % (maxkeysize + 1);
	generate_random_bytes((u8 *)vec->key, vec->klen);
	vec->setkey_error = crypto_aead_setkey(tfm, vec->key, vec->klen);

	/* IV */
	generate_random_bytes((u8 *)vec->iv, ivsize);

	/* Tag length: in [0, maxauthsize], but usually choose maxauthsize */
	authsize = maxauthsize;
	if (prandom_u32() % 4 == 0)
		authsize = prandom_u32() % (maxauthsize + 1);
	if (WARN_ON(authsize > maxdatasize))
		authsize = maxdatasize;
	maxdatasize -= authsize;
	vec->setauthsize_error = crypto_aead_setauthsize(tfm, authsize);

	/* Plaintext and associated data */
	total_len = generate_random_length(maxdatasize);
	if (prandom_u32() % 4 == 0)
		vec->alen = 0;
	else
		vec->alen = generate_random_length(total_len);
	vec->plen = total_len - vec->alen;
	generate_random_bytes((u8 *)vec->assoc, vec->alen);
	generate_random_bytes((u8 *)vec->ptext, vec->plen);

	vec->clen = vec->plen + authsize;

	/*
	 * If the key or authentication tag size couldn't be set, no need to
	 * continue to encrypt.
	 */
	if (vec->setkey_error || vec->setauthsize_error)
		goto done;

	/* Ciphertext */
	sg_init_table(src, 2);
	i = 0;
	if (vec->alen)
		sg_set_buf(&src[i++], vec->assoc, vec->alen);
	if (vec->plen)
		sg_set_buf(&src[i++], vec->ptext, vec->plen);
	sg_init_one(&dst, vec->ctext, vec->alen + vec->clen);
	memcpy(iv, vec->iv, ivsize);
	aead_request_set_callback(req, 0, crypto_req_done, &wait);
	aead_request_set_crypt(req, src, &dst, vec->plen, iv);
	aead_request_set_ad(req, vec->alen);
	vec->crypt_error = crypto_wait_req(crypto_aead_encrypt(req), &wait);
	if (vec->crypt_error == 0)
		memmove((u8 *)vec->ctext, vec->ctext + vec->alen, vec->clen);
done:
	snprintf(name, max_namelen,
		 "\"random: alen=%u plen=%u authsize=%u klen=%u\"",
		 vec->alen, vec->plen, authsize, vec->klen);
}

/*
 * Test the AEAD algorithm represented by @req against the corresponding generic
 * implementation, if one is available.
 */
static int test_aead_vs_generic_impl(const char *driver,
				     const struct alg_test_desc *test_desc,
				     struct aead_request *req,
				     struct cipher_test_sglists *tsgls)
{
	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
	const unsigned int ivsize = crypto_aead_ivsize(tfm);
	const unsigned int maxauthsize = crypto_aead_alg(tfm)->maxauthsize;
	const unsigned int blocksize = crypto_aead_blocksize(tfm);
	const unsigned int maxdatasize = (2 * PAGE_SIZE) - TESTMGR_POISON_LEN;
	const char *algname = crypto_aead_alg(tfm)->base.cra_name;
	const char *generic_driver = test_desc->generic_driver;
	char _generic_driver[CRYPTO_MAX_ALG_NAME];
	struct crypto_aead *generic_tfm = NULL;
	struct aead_request *generic_req = NULL;
	unsigned int maxkeysize;
	unsigned int i;
	struct aead_testvec vec = { 0 };
	char vec_name[64];
	struct testvec_config cfg;
	char cfgname[TESTVEC_CONFIG_NAMELEN];
	int err;

	if (noextratests)
		return 0;

	if (!generic_driver) { /* Use default naming convention? */
		err = build_generic_driver_name(algname, _generic_driver);
		if (err)
			return err;
		generic_driver = _generic_driver;
	}

	if (strcmp(generic_driver, driver) == 0) /* Already the generic impl? */
		return 0;

	generic_tfm = crypto_alloc_aead(generic_driver, 0, 0);
	if (IS_ERR(generic_tfm)) {
		err = PTR_ERR(generic_tfm);
		if (err == -ENOENT) {
			pr_warn("alg: aead: skipping comparison tests for %s because %s is unavailable\n",
				driver, generic_driver);
			return 0;
		}
		pr_err("alg: aead: error allocating %s (generic impl of %s): %d\n",
		       generic_driver, algname, err);
		return err;
	}

	generic_req = aead_request_alloc(generic_tfm, GFP_KERNEL);
	if (!generic_req) {
		err = -ENOMEM;
		goto out;
	}

	/* Check the algorithm properties for consistency. */

	if (maxauthsize != crypto_aead_alg(generic_tfm)->maxauthsize) {
		pr_err("alg: aead: maxauthsize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, maxauthsize,
		       crypto_aead_alg(generic_tfm)->maxauthsize);
		err = -EINVAL;
		goto out;
	}

	if (ivsize != crypto_aead_ivsize(generic_tfm)) {
		pr_err("alg: aead: ivsize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, ivsize, crypto_aead_ivsize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	if (blocksize != crypto_aead_blocksize(generic_tfm)) {
		pr_err("alg: aead: blocksize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, blocksize, crypto_aead_blocksize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	/*
	 * Now generate test vectors using the generic implementation, and test
	 * the other implementation against them.
	 */

	maxkeysize = 0;
	for (i = 0; i < test_desc->suite.aead.count; i++)
		maxkeysize = max_t(unsigned int, maxkeysize,
				   test_desc->suite.aead.vecs[i].klen);

	vec.key = kmalloc(maxkeysize, GFP_KERNEL);
	vec.iv = kmalloc(ivsize, GFP_KERNEL);
	vec.assoc = kmalloc(maxdatasize, GFP_KERNEL);
	vec.ptext = kmalloc(maxdatasize, GFP_KERNEL);
	vec.ctext = kmalloc(maxdatasize, GFP_KERNEL);
	if (!vec.key || !vec.iv || !vec.assoc || !vec.ptext || !vec.ctext) {
		err = -ENOMEM;
		goto out;
	}

	for (i = 0; i < fuzz_iterations * 8; i++) {
		generate_random_aead_testvec(generic_req, &vec,
					     maxkeysize, maxdatasize,
					     vec_name, sizeof(vec_name));
		generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));

		err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, &cfg,
					req, tsgls);
		if (err)
			goto out;
		err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, &cfg,
					req, tsgls);
		if (err)
			goto out;
		cond_resched();
	}
	err = 0;
out:
	kfree(vec.key);
	kfree(vec.iv);
	kfree(vec.assoc);
	kfree(vec.ptext);
	kfree(vec.ctext);
	crypto_free_aead(generic_tfm);
	aead_request_free(generic_req);
	return err;
}
#else /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */
static int test_aead_vs_generic_impl(const char *driver,
				     const struct alg_test_desc *test_desc,
				     struct aead_request *req,
				     struct cipher_test_sglists *tsgls)
{
	return 0;
}
#endif /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */

1989 1990 1991 1992 1993 1994 1995
static int test_aead(const char *driver, int enc,
		     const struct aead_test_suite *suite,
		     struct aead_request *req,
		     struct cipher_test_sglists *tsgls)
{
	unsigned int i;
	int err;
1996

1997 1998 1999 2000 2001 2002 2003
	for (i = 0; i < suite->count; i++) {
		err = test_aead_vec(driver, enc, &suite->vecs[i], i, req,
				    tsgls);
		if (err)
			return err;
	}
	return 0;
2004 2005
}

2006 2007
static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
			 u32 type, u32 mask)
2008
{
2009 2010 2011 2012 2013
	const struct aead_test_suite *suite = &desc->suite.aead;
	struct crypto_aead *tfm;
	struct aead_request *req = NULL;
	struct cipher_test_sglists *tsgls = NULL;
	int err;
2014

2015 2016 2017 2018
	if (suite->count <= 0) {
		pr_err("alg: aead: empty test suite for %s\n", driver);
		return -EINVAL;
	}
2019

2020 2021 2022 2023 2024 2025
	tfm = crypto_alloc_aead(driver, type, mask);
	if (IS_ERR(tfm)) {
		pr_err("alg: aead: failed to allocate transform for %s: %ld\n",
		       driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}
2026

2027 2028 2029 2030 2031 2032 2033
	req = aead_request_alloc(tfm, GFP_KERNEL);
	if (!req) {
		pr_err("alg: aead: failed to allocate request for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
	}
2034

2035 2036 2037 2038 2039 2040
	tsgls = alloc_cipher_test_sglists();
	if (!tsgls) {
		pr_err("alg: aead: failed to allocate test buffers for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
2041 2042
	}

2043 2044 2045 2046 2047
	err = test_aead(driver, ENCRYPT, suite, req, tsgls);
	if (err)
		goto out;

	err = test_aead(driver, DECRYPT, suite, req, tsgls);
2048 2049 2050 2051
	if (err)
		goto out;

	err = test_aead_vs_generic_impl(driver, desc, req, tsgls);
2052 2053 2054 2055 2056
out:
	free_cipher_test_sglists(tsgls);
	aead_request_free(req);
	crypto_free_aead(tfm);
	return err;
2057 2058
}

2059
static int test_cipher(struct crypto_cipher *tfm, int enc,
2060 2061
		       const struct cipher_testvec *template,
		       unsigned int tcount)
2062 2063 2064 2065 2066
{
	const char *algo = crypto_tfm_alg_driver_name(crypto_cipher_tfm(tfm));
	unsigned int i, j, k;
	char *q;
	const char *e;
2067
	const char *input, *result;
2068
	void *data;
2069 2070 2071 2072 2073
	char *xbuf[XBUFSIZE];
	int ret = -ENOMEM;

	if (testmgr_alloc_buf(xbuf))
		goto out_nobuf;
2074 2075 2076 2077 2078 2079 2080 2081 2082

	if (enc == ENCRYPT)
	        e = "encryption";
	else
		e = "decryption";

	j = 0;
	for (i = 0; i < tcount; i++) {

2083 2084 2085
		if (fips_enabled && template[i].fips_skip)
			continue;

2086 2087
		input  = enc ? template[i].ptext : template[i].ctext;
		result = enc ? template[i].ctext : template[i].ptext;
2088 2089
		j++;

2090
		ret = -EINVAL;
2091
		if (WARN_ON(template[i].len > PAGE_SIZE))
2092 2093
			goto out;

2094
		data = xbuf[0];
2095
		memcpy(data, input, template[i].len);
2096 2097 2098

		crypto_cipher_clear_flags(tfm, ~0);
		if (template[i].wk)
2099
			crypto_cipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
2100 2101 2102

		ret = crypto_cipher_setkey(tfm, template[i].key,
					   template[i].klen);
2103 2104 2105 2106 2107 2108
		if (ret) {
			if (ret == template[i].setkey_error)
				continue;
			pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n",
			       algo, j, template[i].setkey_error, ret,
			       crypto_cipher_get_flags(tfm));
2109
			goto out;
2110 2111 2112 2113 2114 2115 2116
		}
		if (template[i].setkey_error) {
			pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n",
			       algo, j, template[i].setkey_error);
			ret = -EINVAL;
			goto out;
		}
2117

2118
		for (k = 0; k < template[i].len;
2119 2120 2121 2122 2123 2124 2125 2126 2127 2128
		     k += crypto_cipher_blocksize(tfm)) {
			if (enc)
				crypto_cipher_encrypt_one(tfm, data + k,
							  data + k);
			else
				crypto_cipher_decrypt_one(tfm, data + k,
							  data + k);
		}

		q = data;
2129
		if (memcmp(q, result, template[i].len)) {
2130 2131
			printk(KERN_ERR "alg: cipher: Test %d failed "
			       "on %s for %s\n", j, e, algo);
2132
			hexdump(q, template[i].len);
2133 2134 2135 2136 2137 2138 2139 2140
			ret = -EINVAL;
			goto out;
		}
	}

	ret = 0;

out:
2141 2142
	testmgr_free_buf(xbuf);
out_nobuf:
2143 2144 2145
	return ret;
}

2146 2147
static int test_skcipher_vec_cfg(const char *driver, int enc,
				 const struct cipher_testvec *vec,
2148
				 const char *vec_name,
2149 2150 2151
				 const struct testvec_config *cfg,
				 struct skcipher_request *req,
				 struct cipher_test_sglists *tsgls)
2152
{
2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164
	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
	const unsigned int alignmask = crypto_skcipher_alignmask(tfm);
	const unsigned int ivsize = crypto_skcipher_ivsize(tfm);
	const u32 req_flags = CRYPTO_TFM_REQ_MAY_BACKLOG | cfg->req_flags;
	const char *op = enc ? "encryption" : "decryption";
	DECLARE_CRYPTO_WAIT(wait);
	u8 _iv[3 * (MAX_ALGAPI_ALIGNMASK + 1) + MAX_IVLEN];
	u8 *iv = PTR_ALIGN(&_iv[0], 2 * (MAX_ALGAPI_ALIGNMASK + 1)) +
		 cfg->iv_offset +
		 (cfg->iv_offset_relative_to_alignmask ? alignmask : 0);
	struct kvec input;
	int err;
2165

2166 2167 2168
	/* Set the key */
	if (vec->wk)
		crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
2169
	else
2170 2171 2172 2173
		crypto_skcipher_clear_flags(tfm,
					    CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
	err = crypto_skcipher_setkey(tfm, vec->key, vec->klen);
	if (err) {
2174
		if (err == vec->setkey_error)
2175
			return 0;
2176 2177
		pr_err("alg: skcipher: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
		       driver, vec_name, vec->setkey_error, err,
2178
		       crypto_skcipher_get_flags(tfm));
2179 2180
		return err;
	}
2181
	if (vec->setkey_error) {
2182 2183
		pr_err("alg: skcipher: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
		       driver, vec_name, vec->setkey_error);
2184
		return -EINVAL;
2185 2186
	}

2187 2188 2189 2190
	/* The IV must be copied to a buffer, as the algorithm may modify it */
	if (ivsize) {
		if (WARN_ON(ivsize > MAX_IVLEN))
			return -EINVAL;
2191 2192 2193
		if (vec->generates_iv && !enc)
			memcpy(iv, vec->iv_out, ivsize);
		else if (vec->iv)
2194
			memcpy(iv, vec->iv, ivsize);
2195
		else
2196 2197 2198
			memset(iv, 0, ivsize);
	} else {
		if (vec->generates_iv) {
2199 2200
			pr_err("alg: skcipher: %s has ivsize=0 but test vector %s generates IV!\n",
			       driver, vec_name);
2201
			return -EINVAL;
2202
		}
2203
		iv = NULL;
2204 2205
	}

2206 2207 2208 2209 2210 2211
	/* Build the src/dst scatterlists */
	input.iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext;
	input.iov_len = vec->len;
	err = build_cipher_test_sglists(tsgls, cfg, alignmask,
					vec->len, vec->len, &input, 1);
	if (err) {
2212 2213
		pr_err("alg: skcipher: %s %s: error preparing scatterlists for test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2214 2215
		return err;
	}
2216

2217 2218 2219 2220 2221
	/* Do the actual encryption or decryption */
	testmgr_poison(req->__ctx, crypto_skcipher_reqsize(tfm));
	skcipher_request_set_callback(req, req_flags, crypto_req_done, &wait);
	skcipher_request_set_crypt(req, tsgls->src.sgl_ptr, tsgls->dst.sgl_ptr,
				   vec->len, iv);
2222 2223 2224 2225 2226 2227
	if (cfg->nosimd)
		crypto_disable_simd_for_test();
	err = enc ? crypto_skcipher_encrypt(req) : crypto_skcipher_decrypt(req);
	if (cfg->nosimd)
		crypto_reenable_simd_for_test();
	err = crypto_wait_req(err, &wait);
2228

2229 2230 2231 2232 2233 2234 2235 2236 2237
	/* Check that the algorithm didn't overwrite things it shouldn't have */
	if (req->cryptlen != vec->len ||
	    req->iv != iv ||
	    req->src != tsgls->src.sgl_ptr ||
	    req->dst != tsgls->dst.sgl_ptr ||
	    crypto_skcipher_reqtfm(req) != tfm ||
	    req->base.complete != crypto_req_done ||
	    req->base.flags != req_flags ||
	    req->base.data != &wait) {
2238 2239
		pr_err("alg: skcipher: %s %s corrupted request struct on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258
		if (req->cryptlen != vec->len)
			pr_err("alg: skcipher: changed 'req->cryptlen'\n");
		if (req->iv != iv)
			pr_err("alg: skcipher: changed 'req->iv'\n");
		if (req->src != tsgls->src.sgl_ptr)
			pr_err("alg: skcipher: changed 'req->src'\n");
		if (req->dst != tsgls->dst.sgl_ptr)
			pr_err("alg: skcipher: changed 'req->dst'\n");
		if (crypto_skcipher_reqtfm(req) != tfm)
			pr_err("alg: skcipher: changed 'req->base.tfm'\n");
		if (req->base.complete != crypto_req_done)
			pr_err("alg: skcipher: changed 'req->base.complete'\n");
		if (req->base.flags != req_flags)
			pr_err("alg: skcipher: changed 'req->base.flags'\n");
		if (req->base.data != &wait)
			pr_err("alg: skcipher: changed 'req->base.data'\n");
		return -EINVAL;
	}
	if (is_test_sglist_corrupted(&tsgls->src)) {
2259 2260
		pr_err("alg: skcipher: %s %s corrupted src sgl on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2261 2262 2263 2264
		return -EINVAL;
	}
	if (tsgls->dst.sgl_ptr != tsgls->src.sgl &&
	    is_test_sglist_corrupted(&tsgls->dst)) {
2265 2266
		pr_err("alg: skcipher: %s %s corrupted dst sgl on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2267 2268 2269
		return -EINVAL;
	}

2270 2271 2272 2273
	/* Check for success or failure */
	if (err) {
		if (err == vec->crypt_error)
			return 0;
2274 2275
		pr_err("alg: skcipher: %s %s failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
		       driver, op, vec_name, vec->crypt_error, err, cfg->name);
2276 2277 2278
		return err;
	}
	if (vec->crypt_error) {
2279 2280
		pr_err("alg: skcipher: %s %s unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
		       driver, op, vec_name, vec->crypt_error, cfg->name);
2281 2282 2283
		return -EINVAL;
	}

2284 2285 2286 2287
	/* Check for the correct output (ciphertext or plaintext) */
	err = verify_correct_output(&tsgls->dst, enc ? vec->ctext : vec->ptext,
				    vec->len, 0, true);
	if (err == -EOVERFLOW) {
2288 2289
		pr_err("alg: skcipher: %s %s overran dst buffer on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2290 2291 2292
		return err;
	}
	if (err) {
2293 2294
		pr_err("alg: skcipher: %s %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2295 2296
		return err;
	}
2297

2298
	/* If applicable, check that the algorithm generated the correct IV */
2299
	if (vec->iv_out && memcmp(iv, vec->iv_out, ivsize) != 0) {
2300 2301
		pr_err("alg: skcipher: %s %s test failed (wrong output IV) on test vector %s, cfg=\"%s\"\n",
		       driver, op, vec_name, cfg->name);
2302 2303 2304
		hexdump(iv, ivsize);
		return -EINVAL;
	}
2305

2306 2307
	return 0;
}
2308

2309 2310 2311 2312 2313 2314
static int test_skcipher_vec(const char *driver, int enc,
			     const struct cipher_testvec *vec,
			     unsigned int vec_num,
			     struct skcipher_request *req,
			     struct cipher_test_sglists *tsgls)
{
2315
	char vec_name[16];
2316 2317
	unsigned int i;
	int err;
2318

2319 2320
	if (fips_enabled && vec->fips_skip)
		return 0;
2321

2322 2323
	sprintf(vec_name, "%u", vec_num);

2324
	for (i = 0; i < ARRAY_SIZE(default_cipher_testvec_configs); i++) {
2325
		err = test_skcipher_vec_cfg(driver, enc, vec, vec_name,
2326 2327 2328 2329 2330
					    &default_cipher_testvec_configs[i],
					    req, tsgls);
		if (err)
			return err;
	}
2331

2332 2333 2334 2335 2336 2337 2338 2339
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
	if (!noextratests) {
		struct testvec_config cfg;
		char cfgname[TESTVEC_CONFIG_NAMELEN];

		for (i = 0; i < fuzz_iterations; i++) {
			generate_random_testvec_config(&cfg, cfgname,
						       sizeof(cfgname));
2340
			err = test_skcipher_vec_cfg(driver, enc, vec, vec_name,
2341 2342 2343
						    &cfg, req, tsgls);
			if (err)
				return err;
2344 2345
		}
	}
2346 2347 2348
#endif
	return 0;
}
2349

2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529
#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
/*
 * Generate a symmetric cipher test vector from the given implementation.
 * Assumes the buffers in 'vec' were already allocated.
 */
static void generate_random_cipher_testvec(struct skcipher_request *req,
					   struct cipher_testvec *vec,
					   unsigned int maxdatasize,
					   char *name, size_t max_namelen)
{
	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
	const unsigned int maxkeysize = tfm->keysize;
	const unsigned int ivsize = crypto_skcipher_ivsize(tfm);
	struct scatterlist src, dst;
	u8 iv[MAX_IVLEN];
	DECLARE_CRYPTO_WAIT(wait);

	/* Key: length in [0, maxkeysize], but usually choose maxkeysize */
	vec->klen = maxkeysize;
	if (prandom_u32() % 4 == 0)
		vec->klen = prandom_u32() % (maxkeysize + 1);
	generate_random_bytes((u8 *)vec->key, vec->klen);
	vec->setkey_error = crypto_skcipher_setkey(tfm, vec->key, vec->klen);

	/* IV */
	generate_random_bytes((u8 *)vec->iv, ivsize);

	/* Plaintext */
	vec->len = generate_random_length(maxdatasize);
	generate_random_bytes((u8 *)vec->ptext, vec->len);

	/* If the key couldn't be set, no need to continue to encrypt. */
	if (vec->setkey_error)
		goto done;

	/* Ciphertext */
	sg_init_one(&src, vec->ptext, vec->len);
	sg_init_one(&dst, vec->ctext, vec->len);
	memcpy(iv, vec->iv, ivsize);
	skcipher_request_set_callback(req, 0, crypto_req_done, &wait);
	skcipher_request_set_crypt(req, &src, &dst, vec->len, iv);
	vec->crypt_error = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
done:
	snprintf(name, max_namelen, "\"random: len=%u klen=%u\"",
		 vec->len, vec->klen);
}

/*
 * Test the skcipher algorithm represented by @req against the corresponding
 * generic implementation, if one is available.
 */
static int test_skcipher_vs_generic_impl(const char *driver,
					 const char *generic_driver,
					 struct skcipher_request *req,
					 struct cipher_test_sglists *tsgls)
{
	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
	const unsigned int ivsize = crypto_skcipher_ivsize(tfm);
	const unsigned int blocksize = crypto_skcipher_blocksize(tfm);
	const unsigned int maxdatasize = (2 * PAGE_SIZE) - TESTMGR_POISON_LEN;
	const char *algname = crypto_skcipher_alg(tfm)->base.cra_name;
	char _generic_driver[CRYPTO_MAX_ALG_NAME];
	struct crypto_skcipher *generic_tfm = NULL;
	struct skcipher_request *generic_req = NULL;
	unsigned int i;
	struct cipher_testvec vec = { 0 };
	char vec_name[64];
	struct testvec_config cfg;
	char cfgname[TESTVEC_CONFIG_NAMELEN];
	int err;

	if (noextratests)
		return 0;

	/* Keywrap isn't supported here yet as it handles its IV differently. */
	if (strncmp(algname, "kw(", 3) == 0)
		return 0;

	if (!generic_driver) { /* Use default naming convention? */
		err = build_generic_driver_name(algname, _generic_driver);
		if (err)
			return err;
		generic_driver = _generic_driver;
	}

	if (strcmp(generic_driver, driver) == 0) /* Already the generic impl? */
		return 0;

	generic_tfm = crypto_alloc_skcipher(generic_driver, 0, 0);
	if (IS_ERR(generic_tfm)) {
		err = PTR_ERR(generic_tfm);
		if (err == -ENOENT) {
			pr_warn("alg: skcipher: skipping comparison tests for %s because %s is unavailable\n",
				driver, generic_driver);
			return 0;
		}
		pr_err("alg: skcipher: error allocating %s (generic impl of %s): %d\n",
		       generic_driver, algname, err);
		return err;
	}

	generic_req = skcipher_request_alloc(generic_tfm, GFP_KERNEL);
	if (!generic_req) {
		err = -ENOMEM;
		goto out;
	}

	/* Check the algorithm properties for consistency. */

	if (tfm->keysize != generic_tfm->keysize) {
		pr_err("alg: skcipher: max keysize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, tfm->keysize, generic_tfm->keysize);
		err = -EINVAL;
		goto out;
	}

	if (ivsize != crypto_skcipher_ivsize(generic_tfm)) {
		pr_err("alg: skcipher: ivsize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, ivsize, crypto_skcipher_ivsize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	if (blocksize != crypto_skcipher_blocksize(generic_tfm)) {
		pr_err("alg: skcipher: blocksize for %s (%u) doesn't match generic impl (%u)\n",
		       driver, blocksize,
		       crypto_skcipher_blocksize(generic_tfm));
		err = -EINVAL;
		goto out;
	}

	/*
	 * Now generate test vectors using the generic implementation, and test
	 * the other implementation against them.
	 */

	vec.key = kmalloc(tfm->keysize, GFP_KERNEL);
	vec.iv = kmalloc(ivsize, GFP_KERNEL);
	vec.ptext = kmalloc(maxdatasize, GFP_KERNEL);
	vec.ctext = kmalloc(maxdatasize, GFP_KERNEL);
	if (!vec.key || !vec.iv || !vec.ptext || !vec.ctext) {
		err = -ENOMEM;
		goto out;
	}

	for (i = 0; i < fuzz_iterations * 8; i++) {
		generate_random_cipher_testvec(generic_req, &vec, maxdatasize,
					       vec_name, sizeof(vec_name));
		generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));

		err = test_skcipher_vec_cfg(driver, ENCRYPT, &vec, vec_name,
					    &cfg, req, tsgls);
		if (err)
			goto out;
		err = test_skcipher_vec_cfg(driver, DECRYPT, &vec, vec_name,
					    &cfg, req, tsgls);
		if (err)
			goto out;
		cond_resched();
	}
	err = 0;
out:
	kfree(vec.key);
	kfree(vec.iv);
	kfree(vec.ptext);
	kfree(vec.ctext);
	crypto_free_skcipher(generic_tfm);
	skcipher_request_free(generic_req);
	return err;
}
#else /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */
static int test_skcipher_vs_generic_impl(const char *driver,
					 const char *generic_driver,
					 struct skcipher_request *req,
					 struct cipher_test_sglists *tsgls)
{
	return 0;
}
#endif /* !CONFIG_CRYPTO_MANAGER_EXTRA_TESTS */

2530 2531 2532 2533 2534 2535 2536
static int test_skcipher(const char *driver, int enc,
			 const struct cipher_test_suite *suite,
			 struct skcipher_request *req,
			 struct cipher_test_sglists *tsgls)
{
	unsigned int i;
	int err;
2537

2538 2539 2540 2541 2542 2543 2544
	for (i = 0; i < suite->count; i++) {
		err = test_skcipher_vec(driver, enc, &suite->vecs[i], i, req,
					tsgls);
		if (err)
			return err;
	}
	return 0;
2545 2546
}

2547 2548
static int alg_test_skcipher(const struct alg_test_desc *desc,
			     const char *driver, u32 type, u32 mask)
2549
{
2550 2551 2552 2553 2554
	const struct cipher_test_suite *suite = &desc->suite.cipher;
	struct crypto_skcipher *tfm;
	struct skcipher_request *req = NULL;
	struct cipher_test_sglists *tsgls = NULL;
	int err;
2555

2556 2557 2558 2559
	if (suite->count <= 0) {
		pr_err("alg: skcipher: empty test suite for %s\n", driver);
		return -EINVAL;
	}
2560

2561 2562 2563 2564 2565 2566
	tfm = crypto_alloc_skcipher(driver, type, mask);
	if (IS_ERR(tfm)) {
		pr_err("alg: skcipher: failed to allocate transform for %s: %ld\n",
		       driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}
2567

2568 2569 2570 2571 2572 2573 2574
	req = skcipher_request_alloc(tfm, GFP_KERNEL);
	if (!req) {
		pr_err("alg: skcipher: failed to allocate request for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
	}
2575

2576 2577 2578 2579 2580 2581
	tsgls = alloc_cipher_test_sglists();
	if (!tsgls) {
		pr_err("alg: skcipher: failed to allocate test buffers for %s\n",
		       driver);
		err = -ENOMEM;
		goto out;
2582 2583
	}

2584 2585 2586 2587 2588
	err = test_skcipher(driver, ENCRYPT, suite, req, tsgls);
	if (err)
		goto out;

	err = test_skcipher(driver, DECRYPT, suite, req, tsgls);
2589 2590 2591 2592 2593
	if (err)
		goto out;

	err = test_skcipher_vs_generic_impl(driver, desc->generic_driver, req,
					    tsgls);
2594 2595 2596 2597 2598
out:
	free_cipher_test_sglists(tsgls);
	skcipher_request_free(req);
	crypto_free_skcipher(tfm);
	return err;
2599 2600
}

2601 2602 2603 2604
static int test_comp(struct crypto_comp *tfm,
		     const struct comp_testvec *ctemplate,
		     const struct comp_testvec *dtemplate,
		     int ctcount, int dtcount)
2605 2606
{
	const char *algo = crypto_tfm_alg_driver_name(crypto_comp_tfm(tfm));
2607
	char *output, *decomp_output;
2608 2609 2610
	unsigned int i;
	int ret;

2611 2612 2613 2614 2615 2616 2617 2618 2619 2620
	output = kmalloc(COMP_BUF_SIZE, GFP_KERNEL);
	if (!output)
		return -ENOMEM;

	decomp_output = kmalloc(COMP_BUF_SIZE, GFP_KERNEL);
	if (!decomp_output) {
		kfree(output);
		return -ENOMEM;
	}

2621
	for (i = 0; i < ctcount; i++) {
2622 2623
		int ilen;
		unsigned int dlen = COMP_BUF_SIZE;
2624

2625 2626
		memset(output, 0, COMP_BUF_SIZE);
		memset(decomp_output, 0, COMP_BUF_SIZE);
2627 2628 2629

		ilen = ctemplate[i].inlen;
		ret = crypto_comp_compress(tfm, ctemplate[i].input,
2630
					   ilen, output, &dlen);
2631 2632 2633 2634 2635 2636 2637
		if (ret) {
			printk(KERN_ERR "alg: comp: compression failed "
			       "on test %d for %s: ret=%d\n", i + 1, algo,
			       -ret);
			goto out;
		}

2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648
		ilen = dlen;
		dlen = COMP_BUF_SIZE;
		ret = crypto_comp_decompress(tfm, output,
					     ilen, decomp_output, &dlen);
		if (ret) {
			pr_err("alg: comp: compression failed: decompress: on test %d for %s failed: ret=%d\n",
			       i + 1, algo, -ret);
			goto out;
		}

		if (dlen != ctemplate[i].inlen) {
2649 2650 2651 2652 2653 2654 2655
			printk(KERN_ERR "alg: comp: Compression test %d "
			       "failed for %s: output len = %d\n", i + 1, algo,
			       dlen);
			ret = -EINVAL;
			goto out;
		}

2656 2657 2658 2659 2660
		if (memcmp(decomp_output, ctemplate[i].input,
			   ctemplate[i].inlen)) {
			pr_err("alg: comp: compression failed: output differs: on test %d for %s\n",
			       i + 1, algo);
			hexdump(decomp_output, dlen);
2661 2662 2663 2664 2665 2666
			ret = -EINVAL;
			goto out;
		}
	}

	for (i = 0; i < dtcount; i++) {
2667 2668
		int ilen;
		unsigned int dlen = COMP_BUF_SIZE;
2669

2670
		memset(decomp_output, 0, COMP_BUF_SIZE);
2671 2672 2673

		ilen = dtemplate[i].inlen;
		ret = crypto_comp_decompress(tfm, dtemplate[i].input,
2674
					     ilen, decomp_output, &dlen);
2675 2676 2677 2678 2679 2680 2681
		if (ret) {
			printk(KERN_ERR "alg: comp: decompression failed "
			       "on test %d for %s: ret=%d\n", i + 1, algo,
			       -ret);
			goto out;
		}

2682 2683 2684 2685 2686 2687 2688 2689
		if (dlen != dtemplate[i].outlen) {
			printk(KERN_ERR "alg: comp: Decompression test %d "
			       "failed for %s: output len = %d\n", i + 1, algo,
			       dlen);
			ret = -EINVAL;
			goto out;
		}

2690
		if (memcmp(decomp_output, dtemplate[i].output, dlen)) {
2691 2692
			printk(KERN_ERR "alg: comp: Decompression test %d "
			       "failed for %s\n", i + 1, algo);
2693
			hexdump(decomp_output, dlen);
2694 2695 2696 2697 2698 2699 2700 2701
			ret = -EINVAL;
			goto out;
		}
	}

	ret = 0;

out:
2702 2703
	kfree(decomp_output);
	kfree(output);
2704 2705 2706
	return ret;
}

2707
static int test_acomp(struct crypto_acomp *tfm,
2708
			      const struct comp_testvec *ctemplate,
2709 2710
		      const struct comp_testvec *dtemplate,
		      int ctcount, int dtcount)
2711 2712 2713
{
	const char *algo = crypto_tfm_alg_driver_name(crypto_acomp_tfm(tfm));
	unsigned int i;
2714
	char *output, *decomp_out;
2715 2716 2717
	int ret;
	struct scatterlist src, dst;
	struct acomp_req *req;
2718
	struct crypto_wait wait;
2719

2720 2721 2722 2723
	output = kmalloc(COMP_BUF_SIZE, GFP_KERNEL);
	if (!output)
		return -ENOMEM;

2724 2725 2726 2727 2728 2729
	decomp_out = kmalloc(COMP_BUF_SIZE, GFP_KERNEL);
	if (!decomp_out) {
		kfree(output);
		return -ENOMEM;
	}

2730 2731 2732
	for (i = 0; i < ctcount; i++) {
		unsigned int dlen = COMP_BUF_SIZE;
		int ilen = ctemplate[i].inlen;
2733
		void *input_vec;
2734

2735
		input_vec = kmemdup(ctemplate[i].input, ilen, GFP_KERNEL);
2736 2737 2738 2739 2740
		if (!input_vec) {
			ret = -ENOMEM;
			goto out;
		}

2741
		memset(output, 0, dlen);
2742
		crypto_init_wait(&wait);
2743
		sg_init_one(&src, input_vec, ilen);
2744 2745 2746 2747 2748 2749
		sg_init_one(&dst, output, dlen);

		req = acomp_request_alloc(tfm);
		if (!req) {
			pr_err("alg: acomp: request alloc failed for %s\n",
			       algo);
2750
			kfree(input_vec);
2751 2752 2753 2754 2755 2756
			ret = -ENOMEM;
			goto out;
		}

		acomp_request_set_params(req, &src, &dst, ilen, dlen);
		acomp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
2757
					   crypto_req_done, &wait);
2758

2759
		ret = crypto_wait_req(crypto_acomp_compress(req), &wait);
2760 2761 2762
		if (ret) {
			pr_err("alg: acomp: compression failed on test %d for %s: ret=%d\n",
			       i + 1, algo, -ret);
2763
			kfree(input_vec);
2764 2765 2766 2767
			acomp_request_free(req);
			goto out;
		}

2768 2769 2770 2771
		ilen = req->dlen;
		dlen = COMP_BUF_SIZE;
		sg_init_one(&src, output, ilen);
		sg_init_one(&dst, decomp_out, dlen);
2772
		crypto_init_wait(&wait);
2773 2774
		acomp_request_set_params(req, &src, &dst, ilen, dlen);

2775
		ret = crypto_wait_req(crypto_acomp_decompress(req), &wait);
2776 2777 2778 2779 2780 2781 2782 2783 2784
		if (ret) {
			pr_err("alg: acomp: compression failed on test %d for %s: ret=%d\n",
			       i + 1, algo, -ret);
			kfree(input_vec);
			acomp_request_free(req);
			goto out;
		}

		if (req->dlen != ctemplate[i].inlen) {
2785 2786 2787
			pr_err("alg: acomp: Compression test %d failed for %s: output len = %d\n",
			       i + 1, algo, req->dlen);
			ret = -EINVAL;
2788
			kfree(input_vec);
2789 2790 2791 2792
			acomp_request_free(req);
			goto out;
		}

2793
		if (memcmp(input_vec, decomp_out, req->dlen)) {
2794 2795 2796 2797
			pr_err("alg: acomp: Compression test %d failed for %s\n",
			       i + 1, algo);
			hexdump(output, req->dlen);
			ret = -EINVAL;
2798
			kfree(input_vec);
2799 2800 2801 2802
			acomp_request_free(req);
			goto out;
		}

2803
		kfree(input_vec);
2804 2805 2806 2807 2808 2809
		acomp_request_free(req);
	}

	for (i = 0; i < dtcount; i++) {
		unsigned int dlen = COMP_BUF_SIZE;
		int ilen = dtemplate[i].inlen;
2810 2811
		void *input_vec;

2812
		input_vec = kmemdup(dtemplate[i].input, ilen, GFP_KERNEL);
2813 2814 2815 2816
		if (!input_vec) {
			ret = -ENOMEM;
			goto out;
		}
2817

2818
		memset(output, 0, dlen);
2819
		crypto_init_wait(&wait);
2820
		sg_init_one(&src, input_vec, ilen);
2821 2822 2823 2824 2825 2826
		sg_init_one(&dst, output, dlen);

		req = acomp_request_alloc(tfm);
		if (!req) {
			pr_err("alg: acomp: request alloc failed for %s\n",
			       algo);
2827
			kfree(input_vec);
2828 2829 2830 2831 2832 2833
			ret = -ENOMEM;
			goto out;
		}

		acomp_request_set_params(req, &src, &dst, ilen, dlen);
		acomp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
2834
					   crypto_req_done, &wait);
2835

2836
		ret = crypto_wait_req(crypto_acomp_decompress(req), &wait);
2837 2838 2839
		if (ret) {
			pr_err("alg: acomp: decompression failed on test %d for %s: ret=%d\n",
			       i + 1, algo, -ret);
2840
			kfree(input_vec);
2841 2842 2843 2844 2845 2846 2847 2848
			acomp_request_free(req);
			goto out;
		}

		if (req->dlen != dtemplate[i].outlen) {
			pr_err("alg: acomp: Decompression test %d failed for %s: output len = %d\n",
			       i + 1, algo, req->dlen);
			ret = -EINVAL;
2849
			kfree(input_vec);
2850 2851 2852 2853 2854 2855 2856 2857 2858
			acomp_request_free(req);
			goto out;
		}

		if (memcmp(output, dtemplate[i].output, req->dlen)) {
			pr_err("alg: acomp: Decompression test %d failed for %s\n",
			       i + 1, algo);
			hexdump(output, req->dlen);
			ret = -EINVAL;
2859
			kfree(input_vec);
2860 2861 2862 2863
			acomp_request_free(req);
			goto out;
		}

2864
		kfree(input_vec);
2865 2866 2867 2868 2869 2870
		acomp_request_free(req);
	}

	ret = 0;

out:
2871
	kfree(decomp_out);
2872
	kfree(output);
2873 2874 2875
	return ret;
}

2876 2877
static int test_cprng(struct crypto_rng *tfm,
		      const struct cprng_testvec *template,
2878 2879 2880
		      unsigned int tcount)
{
	const char *algo = crypto_tfm_alg_driver_name(crypto_rng_tfm(tfm));
F
Felipe Contreras 已提交
2881
	int err = 0, i, j, seedsize;
2882 2883 2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912
	u8 *seed;
	char result[32];

	seedsize = crypto_rng_seedsize(tfm);

	seed = kmalloc(seedsize, GFP_KERNEL);
	if (!seed) {
		printk(KERN_ERR "alg: cprng: Failed to allocate seed space "
		       "for %s\n", algo);
		return -ENOMEM;
	}

	for (i = 0; i < tcount; i++) {
		memset(result, 0, 32);

		memcpy(seed, template[i].v, template[i].vlen);
		memcpy(seed + template[i].vlen, template[i].key,
		       template[i].klen);
		memcpy(seed + template[i].vlen + template[i].klen,
		       template[i].dt, template[i].dtlen);

		err = crypto_rng_reset(tfm, seed, seedsize);
		if (err) {
			printk(KERN_ERR "alg: cprng: Failed to reset rng "
			       "for %s\n", algo);
			goto out;
		}

		for (j = 0; j < template[i].loops; j++) {
			err = crypto_rng_get_bytes(tfm, result,
						   template[i].rlen);
2913
			if (err < 0) {
2914 2915
				printk(KERN_ERR "alg: cprng: Failed to obtain "
				       "the correct amount of random data for "
2916 2917
				       "%s (requested %d)\n", algo,
				       template[i].rlen);
2918 2919 2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937
				goto out;
			}
		}

		err = memcmp(result, template[i].result,
			     template[i].rlen);
		if (err) {
			printk(KERN_ERR "alg: cprng: Test %d failed for %s\n",
			       i, algo);
			hexdump(result, template[i].rlen);
			err = -EINVAL;
			goto out;
		}
	}

out:
	kfree(seed);
	return err;
}

2938 2939 2940
static int alg_test_cipher(const struct alg_test_desc *desc,
			   const char *driver, u32 type, u32 mask)
{
2941
	const struct cipher_test_suite *suite = &desc->suite.cipher;
2942
	struct crypto_cipher *tfm;
2943
	int err;
2944

2945
	tfm = crypto_alloc_cipher(driver, type, mask);
2946 2947 2948 2949 2950 2951
	if (IS_ERR(tfm)) {
		printk(KERN_ERR "alg: cipher: Failed to load transform for "
		       "%s: %ld\n", driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}

2952 2953 2954
	err = test_cipher(tfm, ENCRYPT, suite->vecs, suite->count);
	if (!err)
		err = test_cipher(tfm, DECRYPT, suite->vecs, suite->count);
2955

2956 2957 2958 2959
	crypto_free_cipher(tfm);
	return err;
}

2960 2961 2962
static int alg_test_comp(const struct alg_test_desc *desc, const char *driver,
			 u32 type, u32 mask)
{
2963 2964
	struct crypto_comp *comp;
	struct crypto_acomp *acomp;
2965
	int err;
2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982 2983 2984 2985 2986
	u32 algo_type = type & CRYPTO_ALG_TYPE_ACOMPRESS_MASK;

	if (algo_type == CRYPTO_ALG_TYPE_ACOMPRESS) {
		acomp = crypto_alloc_acomp(driver, type, mask);
		if (IS_ERR(acomp)) {
			pr_err("alg: acomp: Failed to load transform for %s: %ld\n",
			       driver, PTR_ERR(acomp));
			return PTR_ERR(acomp);
		}
		err = test_acomp(acomp, desc->suite.comp.comp.vecs,
				 desc->suite.comp.decomp.vecs,
				 desc->suite.comp.comp.count,
				 desc->suite.comp.decomp.count);
		crypto_free_acomp(acomp);
	} else {
		comp = crypto_alloc_comp(driver, type, mask);
		if (IS_ERR(comp)) {
			pr_err("alg: comp: Failed to load transform for %s: %ld\n",
			       driver, PTR_ERR(comp));
			return PTR_ERR(comp);
		}
2987

2988 2989 2990 2991
		err = test_comp(comp, desc->suite.comp.comp.vecs,
				desc->suite.comp.decomp.vecs,
				desc->suite.comp.comp.count,
				desc->suite.comp.decomp.count);
2992

2993 2994
		crypto_free_comp(comp);
	}
2995 2996 2997
	return err;
}

2998 2999 3000 3001
static int alg_test_crc32c(const struct alg_test_desc *desc,
			   const char *driver, u32 type, u32 mask)
{
	struct crypto_shash *tfm;
3002
	__le32 val;
3003 3004 3005 3006
	int err;

	err = alg_test_hash(desc, driver, type, mask);
	if (err)
3007
		return err;
3008

3009
	tfm = crypto_alloc_shash(driver, type, mask);
3010
	if (IS_ERR(tfm)) {
3011 3012 3013 3014 3015 3016 3017 3018
		if (PTR_ERR(tfm) == -ENOENT) {
			/*
			 * This crc32c implementation is only available through
			 * ahash API, not the shash API, so the remaining part
			 * of the test is not applicable to it.
			 */
			return 0;
		}
3019 3020
		printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: "
		       "%ld\n", driver, PTR_ERR(tfm));
3021
		return PTR_ERR(tfm);
3022 3023 3024
	}

	do {
3025 3026
		SHASH_DESC_ON_STACK(shash, tfm);
		u32 *ctx = (u32 *)shash_desc_ctx(shash);
3027

3028
		shash->tfm = tfm;
3029

3030
		*ctx = 420553207;
3031
		err = crypto_shash_final(shash, (u8 *)&val);
3032 3033 3034 3035 3036 3037
		if (err) {
			printk(KERN_ERR "alg: crc32c: Operation failed for "
			       "%s: %d\n", driver, err);
			break;
		}

3038 3039 3040
		if (val != cpu_to_le32(~420553207)) {
			pr_err("alg: crc32c: Test failed for %s: %u\n",
			       driver, le32_to_cpu(val));
3041 3042 3043 3044 3045 3046 3047 3048 3049
			err = -EINVAL;
		}
	} while (0);

	crypto_free_shash(tfm);

	return err;
}

3050 3051 3052 3053 3054 3055
static int alg_test_cprng(const struct alg_test_desc *desc, const char *driver,
			  u32 type, u32 mask)
{
	struct crypto_rng *rng;
	int err;

3056
	rng = crypto_alloc_rng(driver, type, mask);
3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069
	if (IS_ERR(rng)) {
		printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
		       "%ld\n", driver, PTR_ERR(rng));
		return PTR_ERR(rng);
	}

	err = test_cprng(rng, desc->suite.cprng.vecs, desc->suite.cprng.count);

	crypto_free_rng(rng);

	return err;
}

3070

3071
static int drbg_cavs_test(const struct drbg_testvec *test, int pr,
3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082
			  const char *driver, u32 type, u32 mask)
{
	int ret = -EAGAIN;
	struct crypto_rng *drng;
	struct drbg_test_data test_data;
	struct drbg_string addtl, pers, testentropy;
	unsigned char *buf = kzalloc(test->expectedlen, GFP_KERNEL);

	if (!buf)
		return -ENOMEM;

3083
	drng = crypto_alloc_rng(driver, type, mask);
3084
	if (IS_ERR(drng)) {
3085
		printk(KERN_ERR "alg: drbg: could not allocate DRNG handle for "
3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108
		       "%s\n", driver);
		kzfree(buf);
		return -ENOMEM;
	}

	test_data.testentropy = &testentropy;
	drbg_string_fill(&testentropy, test->entropy, test->entropylen);
	drbg_string_fill(&pers, test->pers, test->perslen);
	ret = crypto_drbg_reset_test(drng, &pers, &test_data);
	if (ret) {
		printk(KERN_ERR "alg: drbg: Failed to reset rng\n");
		goto outbuf;
	}

	drbg_string_fill(&addtl, test->addtla, test->addtllen);
	if (pr) {
		drbg_string_fill(&testentropy, test->entpra, test->entprlen);
		ret = crypto_drbg_get_bytes_addtl_test(drng,
			buf, test->expectedlen, &addtl,	&test_data);
	} else {
		ret = crypto_drbg_get_bytes_addtl(drng,
			buf, test->expectedlen, &addtl);
	}
3109
	if (ret < 0) {
3110
		printk(KERN_ERR "alg: drbg: could not obtain random data for "
3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123
		       "driver %s\n", driver);
		goto outbuf;
	}

	drbg_string_fill(&addtl, test->addtlb, test->addtllen);
	if (pr) {
		drbg_string_fill(&testentropy, test->entprb, test->entprlen);
		ret = crypto_drbg_get_bytes_addtl_test(drng,
			buf, test->expectedlen, &addtl, &test_data);
	} else {
		ret = crypto_drbg_get_bytes_addtl(drng,
			buf, test->expectedlen, &addtl);
	}
3124
	if (ret < 0) {
3125
		printk(KERN_ERR "alg: drbg: could not obtain random data for "
3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144
		       "driver %s\n", driver);
		goto outbuf;
	}

	ret = memcmp(test->expected, buf, test->expectedlen);

outbuf:
	crypto_free_rng(drng);
	kzfree(buf);
	return ret;
}


static int alg_test_drbg(const struct alg_test_desc *desc, const char *driver,
			 u32 type, u32 mask)
{
	int err = 0;
	int pr = 0;
	int i = 0;
3145
	const struct drbg_testvec *template = desc->suite.drbg.vecs;
3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163
	unsigned int tcount = desc->suite.drbg.count;

	if (0 == memcmp(driver, "drbg_pr_", 8))
		pr = 1;

	for (i = 0; i < tcount; i++) {
		err = drbg_cavs_test(&template[i], pr, driver, type, mask);
		if (err) {
			printk(KERN_ERR "alg: drbg: Test %d failed for %s\n",
			       i, driver);
			err = -EINVAL;
			break;
		}
	}
	return err;

}

3164
static int do_test_kpp(struct crypto_kpp *tfm, const struct kpp_testvec *vec,
3165 3166 3167 3168 3169
		       const char *alg)
{
	struct kpp_request *req;
	void *input_buf = NULL;
	void *output_buf = NULL;
3170 3171 3172
	void *a_public = NULL;
	void *a_ss = NULL;
	void *shared_secret = NULL;
3173
	struct crypto_wait wait;
3174 3175 3176 3177 3178 3179 3180 3181
	unsigned int out_len_max;
	int err = -ENOMEM;
	struct scatterlist src, dst;

	req = kpp_request_alloc(tfm, GFP_KERNEL);
	if (!req)
		return err;

3182
	crypto_init_wait(&wait);
3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199

	err = crypto_kpp_set_secret(tfm, vec->secret, vec->secret_size);
	if (err < 0)
		goto free_req;

	out_len_max = crypto_kpp_maxsize(tfm);
	output_buf = kzalloc(out_len_max, GFP_KERNEL);
	if (!output_buf) {
		err = -ENOMEM;
		goto free_req;
	}

	/* Use appropriate parameter as base */
	kpp_request_set_input(req, NULL, 0);
	sg_init_one(&dst, output_buf, out_len_max);
	kpp_request_set_output(req, &dst, out_len_max);
	kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
3200
				 crypto_req_done, &wait);
3201

3202
	/* Compute party A's public key */
3203
	err = crypto_wait_req(crypto_kpp_generate_public_key(req), &wait);
3204
	if (err) {
3205
		pr_err("alg: %s: Party A: generate public key test failed. err %d\n",
3206 3207 3208
		       alg, err);
		goto free_output;
	}
3209 3210 3211

	if (vec->genkey) {
		/* Save party A's public key */
3212
		a_public = kmemdup(sg_virt(req->dst), out_len_max, GFP_KERNEL);
3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225
		if (!a_public) {
			err = -ENOMEM;
			goto free_output;
		}
	} else {
		/* Verify calculated public key */
		if (memcmp(vec->expected_a_public, sg_virt(req->dst),
			   vec->expected_a_public_size)) {
			pr_err("alg: %s: Party A: generate public key test failed. Invalid output\n",
			       alg);
			err = -EINVAL;
			goto free_output;
		}
3226 3227 3228
	}

	/* Calculate shared secret key by using counter part (b) public key. */
3229
	input_buf = kmemdup(vec->b_public, vec->b_public_size, GFP_KERNEL);
3230 3231 3232 3233 3234 3235 3236 3237 3238 3239
	if (!input_buf) {
		err = -ENOMEM;
		goto free_output;
	}

	sg_init_one(&src, input_buf, vec->b_public_size);
	sg_init_one(&dst, output_buf, out_len_max);
	kpp_request_set_input(req, &src, vec->b_public_size);
	kpp_request_set_output(req, &dst, out_len_max);
	kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
3240 3241
				 crypto_req_done, &wait);
	err = crypto_wait_req(crypto_kpp_compute_shared_secret(req), &wait);
3242
	if (err) {
3243
		pr_err("alg: %s: Party A: compute shared secret test failed. err %d\n",
3244 3245 3246
		       alg, err);
		goto free_all;
	}
3247 3248 3249

	if (vec->genkey) {
		/* Save the shared secret obtained by party A */
3250
		a_ss = kmemdup(sg_virt(req->dst), vec->expected_ss_size, GFP_KERNEL);
3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269
		if (!a_ss) {
			err = -ENOMEM;
			goto free_all;
		}

		/*
		 * Calculate party B's shared secret by using party A's
		 * public key.
		 */
		err = crypto_kpp_set_secret(tfm, vec->b_secret,
					    vec->b_secret_size);
		if (err < 0)
			goto free_all;

		sg_init_one(&src, a_public, vec->expected_a_public_size);
		sg_init_one(&dst, output_buf, out_len_max);
		kpp_request_set_input(req, &src, vec->expected_a_public_size);
		kpp_request_set_output(req, &dst, out_len_max);
		kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
3270 3271 3272
					 crypto_req_done, &wait);
		err = crypto_wait_req(crypto_kpp_compute_shared_secret(req),
				      &wait);
3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283
		if (err) {
			pr_err("alg: %s: Party B: compute shared secret failed. err %d\n",
			       alg, err);
			goto free_all;
		}

		shared_secret = a_ss;
	} else {
		shared_secret = (void *)vec->expected_ss;
	}

3284 3285 3286 3287
	/*
	 * verify shared secret from which the user will derive
	 * secret key by executing whatever hash it has chosen
	 */
3288
	if (memcmp(shared_secret, sg_virt(req->dst),
3289 3290 3291 3292 3293 3294 3295
		   vec->expected_ss_size)) {
		pr_err("alg: %s: compute shared secret test failed. Invalid output\n",
		       alg);
		err = -EINVAL;
	}

free_all:
3296
	kfree(a_ss);
3297 3298
	kfree(input_buf);
free_output:
3299
	kfree(a_public);
3300 3301 3302 3303 3304 3305 3306
	kfree(output_buf);
free_req:
	kpp_request_free(req);
	return err;
}

static int test_kpp(struct crypto_kpp *tfm, const char *alg,
3307
		    const struct kpp_testvec *vecs, unsigned int tcount)
3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327
{
	int ret, i;

	for (i = 0; i < tcount; i++) {
		ret = do_test_kpp(tfm, vecs++, alg);
		if (ret) {
			pr_err("alg: %s: test failed on vector %d, err=%d\n",
			       alg, i + 1, ret);
			return ret;
		}
	}
	return 0;
}

static int alg_test_kpp(const struct alg_test_desc *desc, const char *driver,
			u32 type, u32 mask)
{
	struct crypto_kpp *tfm;
	int err = 0;

3328
	tfm = crypto_alloc_kpp(driver, type, mask);
3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341
	if (IS_ERR(tfm)) {
		pr_err("alg: kpp: Failed to load tfm for %s: %ld\n",
		       driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}
	if (desc->suite.kpp.vecs)
		err = test_kpp(tfm, desc->alg, desc->suite.kpp.vecs,
			       desc->suite.kpp.count);

	crypto_free_kpp(tfm);
	return err;
}

3342 3343 3344 3345 3346 3347
static u8 *test_pack_u32(u8 *dst, u32 val)
{
	memcpy(dst, &val, sizeof(val));
	return dst + sizeof(val);
}

3348
static int test_akcipher_one(struct crypto_akcipher *tfm,
3349
			     const struct akcipher_testvec *vecs)
3350
{
3351
	char *xbuf[XBUFSIZE];
3352 3353 3354
	struct akcipher_request *req;
	void *outbuf_enc = NULL;
	void *outbuf_dec = NULL;
3355
	struct crypto_wait wait;
3356 3357
	unsigned int out_len_max, out_len = 0;
	int err = -ENOMEM;
3358
	struct scatterlist src, dst, src_tab[3];
3359 3360 3361
	const char *m, *c;
	unsigned int m_size, c_size;
	const char *op;
3362
	u8 *key, *ptr;
3363

3364 3365 3366
	if (testmgr_alloc_buf(xbuf))
		return err;

3367 3368
	req = akcipher_request_alloc(tfm, GFP_KERNEL);
	if (!req)
3369
		goto free_xbuf;
3370

3371
	crypto_init_wait(&wait);
3372

3373 3374 3375 3376 3377 3378 3379 3380 3381 3382
	key = kmalloc(vecs->key_len + sizeof(u32) * 2 + vecs->param_len,
		      GFP_KERNEL);
	if (!key)
		goto free_xbuf;
	memcpy(key, vecs->key, vecs->key_len);
	ptr = key + vecs->key_len;
	ptr = test_pack_u32(ptr, vecs->algo);
	ptr = test_pack_u32(ptr, vecs->param_len);
	memcpy(ptr, vecs->params, vecs->param_len);

3383
	if (vecs->public_key_vec)
3384
		err = crypto_akcipher_set_pub_key(tfm, key, vecs->key_len);
3385
	else
3386
		err = crypto_akcipher_set_priv_key(tfm, key, vecs->key_len);
3387
	if (err)
3388 3389
		goto free_req;

3390 3391 3392 3393
	/*
	 * First run test which do not require a private key, such as
	 * encrypt or verify.
	 */
3394 3395
	err = -ENOMEM;
	out_len_max = crypto_akcipher_maxsize(tfm);
3396 3397 3398 3399
	outbuf_enc = kzalloc(out_len_max, GFP_KERNEL);
	if (!outbuf_enc)
		goto free_req;

3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415
	if (!vecs->siggen_sigver_test) {
		m = vecs->m;
		m_size = vecs->m_size;
		c = vecs->c;
		c_size = vecs->c_size;
		op = "encrypt";
	} else {
		/* Swap args so we could keep plaintext (digest)
		 * in vecs->m, and cooked signature in vecs->c.
		 */
		m = vecs->c; /* signature */
		m_size = vecs->c_size;
		c = vecs->m; /* digest */
		c_size = vecs->m_size;
		op = "verify";
	}
3416

3417 3418 3419
	if (WARN_ON(m_size > PAGE_SIZE))
		goto free_all;
	memcpy(xbuf[0], m, m_size);
3420

3421
	sg_init_table(src_tab, 3);
3422
	sg_set_buf(&src_tab[0], xbuf[0], 8);
3423
	sg_set_buf(&src_tab[1], xbuf[0] + 8, m_size - 8);
3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434
	if (vecs->siggen_sigver_test) {
		if (WARN_ON(c_size > PAGE_SIZE))
			goto free_all;
		memcpy(xbuf[1], c, c_size);
		sg_set_buf(&src_tab[2], xbuf[1], c_size);
		akcipher_request_set_crypt(req, src_tab, NULL, m_size, c_size);
	} else {
		sg_init_one(&dst, outbuf_enc, out_len_max);
		akcipher_request_set_crypt(req, src_tab, &dst, m_size,
					   out_len_max);
	}
3435
	akcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
3436
				      crypto_req_done, &wait);
3437

3438
	err = crypto_wait_req(vecs->siggen_sigver_test ?
3439 3440
			      /* Run asymmetric signature verification */
			      crypto_akcipher_verify(req) :
3441 3442
			      /* Run asymmetric encrypt */
			      crypto_akcipher_encrypt(req), &wait);
3443
	if (err) {
3444
		pr_err("alg: akcipher: %s test failed. err %d\n", op, err);
3445 3446
		goto free_all;
	}
3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461
	if (!vecs->siggen_sigver_test) {
		if (req->dst_len != c_size) {
			pr_err("alg: akcipher: %s test failed. Invalid output len\n",
			       op);
			err = -EINVAL;
			goto free_all;
		}
		/* verify that encrypted message is equal to expected */
		if (memcmp(c, outbuf_enc, c_size) != 0) {
			pr_err("alg: akcipher: %s test failed. Invalid output\n",
			       op);
			hexdump(outbuf_enc, c_size);
			err = -EINVAL;
			goto free_all;
		}
3462
	}
3463 3464 3465 3466 3467

	/*
	 * Don't invoke (decrypt or sign) test which require a private key
	 * for vectors with only a public key.
	 */
3468 3469 3470 3471 3472 3473 3474 3475 3476
	if (vecs->public_key_vec) {
		err = 0;
		goto free_all;
	}
	outbuf_dec = kzalloc(out_len_max, GFP_KERNEL);
	if (!outbuf_dec) {
		err = -ENOMEM;
		goto free_all;
	}
3477

3478 3479
	op = vecs->siggen_sigver_test ? "sign" : "decrypt";
	if (WARN_ON(c_size > PAGE_SIZE))
3480
		goto free_all;
3481
	memcpy(xbuf[0], c, c_size);
3482

3483
	sg_init_one(&src, xbuf[0], c_size);
3484
	sg_init_one(&dst, outbuf_dec, out_len_max);
3485
	crypto_init_wait(&wait);
3486
	akcipher_request_set_crypt(req, &src, &dst, c_size, out_len_max);
3487

3488
	err = crypto_wait_req(vecs->siggen_sigver_test ?
3489 3490
			      /* Run asymmetric signature generation */
			      crypto_akcipher_sign(req) :
3491 3492
			      /* Run asymmetric decrypt */
			      crypto_akcipher_decrypt(req), &wait);
3493
	if (err) {
3494
		pr_err("alg: akcipher: %s test failed. err %d\n", op, err);
3495 3496 3497
		goto free_all;
	}
	out_len = req->dst_len;
3498 3499 3500
	if (out_len < m_size) {
		pr_err("alg: akcipher: %s test failed. Invalid output len %u\n",
		       op, out_len);
3501 3502 3503 3504
		err = -EINVAL;
		goto free_all;
	}
	/* verify that decrypted message is equal to the original msg */
3505 3506 3507
	if (memchr_inv(outbuf_dec, 0, out_len - m_size) ||
	    memcmp(m, outbuf_dec + out_len - m_size, m_size)) {
		pr_err("alg: akcipher: %s test failed. Invalid output\n", op);
3508
		hexdump(outbuf_dec, out_len);
3509 3510 3511 3512 3513 3514 3515
		err = -EINVAL;
	}
free_all:
	kfree(outbuf_dec);
	kfree(outbuf_enc);
free_req:
	akcipher_request_free(req);
3516
	kfree(key);
3517 3518
free_xbuf:
	testmgr_free_buf(xbuf);
3519 3520 3521
	return err;
}

3522
static int test_akcipher(struct crypto_akcipher *tfm, const char *alg,
3523 3524
			 const struct akcipher_testvec *vecs,
			 unsigned int tcount)
3525
{
3526 3527
	const char *algo =
		crypto_tfm_alg_driver_name(crypto_akcipher_tfm(tfm));
3528 3529 3530
	int ret, i;

	for (i = 0; i < tcount; i++) {
3531 3532 3533
		ret = test_akcipher_one(tfm, vecs++);
		if (!ret)
			continue;
3534

3535 3536
		pr_err("alg: akcipher: test %d failed for %s, err=%d\n",
		       i + 1, algo, ret);
3537 3538
		return ret;
	}
3539 3540 3541 3542 3543 3544 3545 3546 3547
	return 0;
}

static int alg_test_akcipher(const struct alg_test_desc *desc,
			     const char *driver, u32 type, u32 mask)
{
	struct crypto_akcipher *tfm;
	int err = 0;

3548
	tfm = crypto_alloc_akcipher(driver, type, mask);
3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561
	if (IS_ERR(tfm)) {
		pr_err("alg: akcipher: Failed to load tfm for %s: %ld\n",
		       driver, PTR_ERR(tfm));
		return PTR_ERR(tfm);
	}
	if (desc->suite.akcipher.vecs)
		err = test_akcipher(tfm, desc->alg, desc->suite.akcipher.vecs,
				    desc->suite.akcipher.count);

	crypto_free_akcipher(tfm);
	return err;
}

3562 3563 3564 3565 3566 3567
static int alg_test_null(const struct alg_test_desc *desc,
			     const char *driver, u32 type, u32 mask)
{
	return 0;
}

3568 3569
#define __VECS(tv)	{ .vecs = tv, .count = ARRAY_SIZE(tv) }

3570 3571 3572
/* Please keep this list sorted by algorithm name. */
static const struct alg_test_desc alg_test_descs[] = {
	{
3573
		.alg = "adiantum(xchacha12,aes)",
3574
		.generic_driver = "adiantum(xchacha12-generic,aes-generic,nhpoly1305-generic)",
3575 3576 3577 3578 3579 3580
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(adiantum_xchacha12_aes_tv_template)
		},
	}, {
		.alg = "adiantum(xchacha20,aes)",
3581
		.generic_driver = "adiantum(xchacha20-generic,aes-generic,nhpoly1305-generic)",
3582 3583 3584 3585 3586
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(adiantum_xchacha20_aes_tv_template)
		},
	}, {
3587 3588 3589
		.alg = "aegis128",
		.test = alg_test_aead,
		.suite = {
3590
			.aead = __VECS(aegis128_tv_template)
3591 3592 3593 3594 3595
		}
	}, {
		.alg = "aegis128l",
		.test = alg_test_aead,
		.suite = {
3596
			.aead = __VECS(aegis128l_tv_template)
3597 3598 3599 3600 3601
		}
	}, {
		.alg = "aegis256",
		.test = alg_test_aead,
		.suite = {
3602
			.aead = __VECS(aegis256_tv_template)
3603 3604
		}
	}, {
3605 3606 3607
		.alg = "ansi_cprng",
		.test = alg_test_cprng,
		.suite = {
3608
			.cprng = __VECS(ansi_cprng_aes_tv_template)
3609
		}
3610 3611 3612 3613
	}, {
		.alg = "authenc(hmac(md5),ecb(cipher_null))",
		.test = alg_test_aead,
		.suite = {
3614
			.aead = __VECS(hmac_md5_ecb_cipher_null_tv_template)
3615
		}
3616
	}, {
3617
		.alg = "authenc(hmac(sha1),cbc(aes))",
3618
		.test = alg_test_aead,
3619
		.fips_allowed = 1,
3620
		.suite = {
3621
			.aead = __VECS(hmac_sha1_aes_cbc_tv_temp)
3622 3623
		}
	}, {
3624
		.alg = "authenc(hmac(sha1),cbc(des))",
3625 3626
		.test = alg_test_aead,
		.suite = {
3627
			.aead = __VECS(hmac_sha1_des_cbc_tv_temp)
3628 3629
		}
	}, {
3630
		.alg = "authenc(hmac(sha1),cbc(des3_ede))",
3631
		.test = alg_test_aead,
3632
		.fips_allowed = 1,
3633
		.suite = {
3634
			.aead = __VECS(hmac_sha1_des3_ede_cbc_tv_temp)
3635
		}
3636 3637 3638 3639
	}, {
		.alg = "authenc(hmac(sha1),ctr(aes))",
		.test = alg_test_null,
		.fips_allowed = 1,
3640 3641 3642 3643
	}, {
		.alg = "authenc(hmac(sha1),ecb(cipher_null))",
		.test = alg_test_aead,
		.suite = {
3644
			.aead = __VECS(hmac_sha1_ecb_cipher_null_tv_temp)
3645
		}
3646 3647 3648 3649
	}, {
		.alg = "authenc(hmac(sha1),rfc3686(ctr(aes)))",
		.test = alg_test_null,
		.fips_allowed = 1,
3650
	}, {
3651
		.alg = "authenc(hmac(sha224),cbc(des))",
3652 3653
		.test = alg_test_aead,
		.suite = {
3654
			.aead = __VECS(hmac_sha224_des_cbc_tv_temp)
3655 3656
		}
	}, {
3657
		.alg = "authenc(hmac(sha224),cbc(des3_ede))",
3658
		.test = alg_test_aead,
3659
		.fips_allowed = 1,
3660
		.suite = {
3661
			.aead = __VECS(hmac_sha224_des3_ede_cbc_tv_temp)
3662
		}
3663
	}, {
3664
		.alg = "authenc(hmac(sha256),cbc(aes))",
3665
		.test = alg_test_aead,
3666
		.fips_allowed = 1,
3667
		.suite = {
3668
			.aead = __VECS(hmac_sha256_aes_cbc_tv_temp)
3669 3670
		}
	}, {
3671
		.alg = "authenc(hmac(sha256),cbc(des))",
3672 3673
		.test = alg_test_aead,
		.suite = {
3674
			.aead = __VECS(hmac_sha256_des_cbc_tv_temp)
3675 3676
		}
	}, {
3677
		.alg = "authenc(hmac(sha256),cbc(des3_ede))",
3678
		.test = alg_test_aead,
3679
		.fips_allowed = 1,
3680
		.suite = {
3681
			.aead = __VECS(hmac_sha256_des3_ede_cbc_tv_temp)
3682
		}
3683 3684 3685 3686
	}, {
		.alg = "authenc(hmac(sha256),ctr(aes))",
		.test = alg_test_null,
		.fips_allowed = 1,
3687 3688 3689 3690
	}, {
		.alg = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
		.test = alg_test_null,
		.fips_allowed = 1,
3691
	}, {
3692
		.alg = "authenc(hmac(sha384),cbc(des))",
3693 3694
		.test = alg_test_aead,
		.suite = {
3695
			.aead = __VECS(hmac_sha384_des_cbc_tv_temp)
3696 3697
		}
	}, {
3698
		.alg = "authenc(hmac(sha384),cbc(des3_ede))",
3699
		.test = alg_test_aead,
3700
		.fips_allowed = 1,
3701
		.suite = {
3702
			.aead = __VECS(hmac_sha384_des3_ede_cbc_tv_temp)
3703
		}
3704 3705 3706 3707
	}, {
		.alg = "authenc(hmac(sha384),ctr(aes))",
		.test = alg_test_null,
		.fips_allowed = 1,
3708 3709 3710 3711
	}, {
		.alg = "authenc(hmac(sha384),rfc3686(ctr(aes)))",
		.test = alg_test_null,
		.fips_allowed = 1,
3712
	}, {
3713
		.alg = "authenc(hmac(sha512),cbc(aes))",
3714
		.fips_allowed = 1,
3715 3716
		.test = alg_test_aead,
		.suite = {
3717
			.aead = __VECS(hmac_sha512_aes_cbc_tv_temp)
3718 3719
		}
	}, {
3720
		.alg = "authenc(hmac(sha512),cbc(des))",
3721 3722
		.test = alg_test_aead,
		.suite = {
3723
			.aead = __VECS(hmac_sha512_des_cbc_tv_temp)
3724 3725
		}
	}, {
3726
		.alg = "authenc(hmac(sha512),cbc(des3_ede))",
3727
		.test = alg_test_aead,
3728
		.fips_allowed = 1,
3729
		.suite = {
3730
			.aead = __VECS(hmac_sha512_des3_ede_cbc_tv_temp)
3731
		}
3732 3733 3734 3735
	}, {
		.alg = "authenc(hmac(sha512),ctr(aes))",
		.test = alg_test_null,
		.fips_allowed = 1,
3736 3737 3738 3739
	}, {
		.alg = "authenc(hmac(sha512),rfc3686(ctr(aes)))",
		.test = alg_test_null,
		.fips_allowed = 1,
3740
	}, {
3741
		.alg = "cbc(aes)",
3742
		.test = alg_test_skcipher,
3743
		.fips_allowed = 1,
3744
		.suite = {
3745 3746
			.cipher = __VECS(aes_cbc_tv_template)
		},
3747 3748
	}, {
		.alg = "cbc(anubis)",
3749
		.test = alg_test_skcipher,
3750
		.suite = {
3751 3752
			.cipher = __VECS(anubis_cbc_tv_template)
		},
3753 3754
	}, {
		.alg = "cbc(blowfish)",
3755
		.test = alg_test_skcipher,
3756
		.suite = {
3757 3758
			.cipher = __VECS(bf_cbc_tv_template)
		},
3759 3760
	}, {
		.alg = "cbc(camellia)",
3761
		.test = alg_test_skcipher,
3762
		.suite = {
3763 3764
			.cipher = __VECS(camellia_cbc_tv_template)
		},
3765 3766 3767 3768
	}, {
		.alg = "cbc(cast5)",
		.test = alg_test_skcipher,
		.suite = {
3769 3770
			.cipher = __VECS(cast5_cbc_tv_template)
		},
3771 3772 3773 3774
	}, {
		.alg = "cbc(cast6)",
		.test = alg_test_skcipher,
		.suite = {
3775 3776
			.cipher = __VECS(cast6_cbc_tv_template)
		},
3777 3778
	}, {
		.alg = "cbc(des)",
3779
		.test = alg_test_skcipher,
3780
		.suite = {
3781 3782
			.cipher = __VECS(des_cbc_tv_template)
		},
3783 3784
	}, {
		.alg = "cbc(des3_ede)",
3785
		.test = alg_test_skcipher,
3786
		.fips_allowed = 1,
3787
		.suite = {
3788 3789
			.cipher = __VECS(des3_ede_cbc_tv_template)
		},
3790 3791 3792 3793 3794 3795 3796
	}, {
		/* Same as cbc(aes) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "cbc(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
3797 3798 3799 3800 3801 3802
	}, {
		/* Same as cbc(sm4) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "cbc(psm4)",
		.test = alg_test_null,
3803 3804 3805 3806
	}, {
		.alg = "cbc(serpent)",
		.test = alg_test_skcipher,
		.suite = {
3807 3808
			.cipher = __VECS(serpent_cbc_tv_template)
		},
3809 3810 3811 3812 3813 3814
	}, {
		.alg = "cbc(sm4)",
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(sm4_cbc_tv_template)
		}
3815 3816
	}, {
		.alg = "cbc(twofish)",
3817
		.test = alg_test_skcipher,
3818
		.suite = {
3819 3820
			.cipher = __VECS(tf_cbc_tv_template)
		},
3821 3822 3823 3824 3825 3826 3827
	}, {
		.alg = "cbcmac(aes)",
		.fips_allowed = 1,
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(aes_cbcmac_tv_template)
		}
3828 3829
	}, {
		.alg = "ccm(aes)",
3830
		.generic_driver = "ccm_base(ctr(aes-generic),cbcmac(aes-generic))",
3831
		.test = alg_test_aead,
3832
		.fips_allowed = 1,
3833
		.suite = {
3834
			.aead = __VECS(aes_ccm_tv_template)
3835
		}
3836 3837 3838 3839 3840 3841 3842
	}, {
		.alg = "cfb(aes)",
		.test = alg_test_skcipher,
		.fips_allowed = 1,
		.suite = {
			.cipher = __VECS(aes_cfb_tv_template)
		},
3843 3844 3845 3846
	}, {
		.alg = "chacha20",
		.test = alg_test_skcipher,
		.suite = {
3847 3848
			.cipher = __VECS(chacha20_tv_template)
		},
3849 3850
	}, {
		.alg = "cmac(aes)",
3851
		.fips_allowed = 1,
3852 3853
		.test = alg_test_hash,
		.suite = {
3854
			.hash = __VECS(aes_cmac128_tv_template)
3855 3856 3857
		}
	}, {
		.alg = "cmac(des3_ede)",
3858
		.fips_allowed = 1,
3859 3860
		.test = alg_test_hash,
		.suite = {
3861
			.hash = __VECS(des3_ede_cmac64_tv_template)
3862
		}
3863 3864 3865
	}, {
		.alg = "compress_null",
		.test = alg_test_null,
3866 3867 3868
	}, {
		.alg = "crc32",
		.test = alg_test_hash,
3869
		.fips_allowed = 1,
3870
		.suite = {
3871
			.hash = __VECS(crc32_tv_template)
3872
		}
3873 3874
	}, {
		.alg = "crc32c",
3875
		.test = alg_test_crc32c,
3876
		.fips_allowed = 1,
3877
		.suite = {
3878
			.hash = __VECS(crc32c_tv_template)
3879
		}
3880 3881 3882 3883 3884
	}, {
		.alg = "crct10dif",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
3885
			.hash = __VECS(crct10dif_tv_template)
3886
		}
3887 3888 3889
	}, {
		.alg = "ctr(aes)",
		.test = alg_test_skcipher,
3890
		.fips_allowed = 1,
3891
		.suite = {
3892
			.cipher = __VECS(aes_ctr_tv_template)
3893
		}
3894 3895 3896 3897
	}, {
		.alg = "ctr(blowfish)",
		.test = alg_test_skcipher,
		.suite = {
3898
			.cipher = __VECS(bf_ctr_tv_template)
3899
		}
3900 3901 3902 3903
	}, {
		.alg = "ctr(camellia)",
		.test = alg_test_skcipher,
		.suite = {
3904
			.cipher = __VECS(camellia_ctr_tv_template)
3905
		}
3906 3907 3908 3909
	}, {
		.alg = "ctr(cast5)",
		.test = alg_test_skcipher,
		.suite = {
3910
			.cipher = __VECS(cast5_ctr_tv_template)
3911
		}
3912 3913 3914 3915
	}, {
		.alg = "ctr(cast6)",
		.test = alg_test_skcipher,
		.suite = {
3916
			.cipher = __VECS(cast6_ctr_tv_template)
3917
		}
3918 3919 3920 3921
	}, {
		.alg = "ctr(des)",
		.test = alg_test_skcipher,
		.suite = {
3922
			.cipher = __VECS(des_ctr_tv_template)
3923
		}
3924 3925 3926
	}, {
		.alg = "ctr(des3_ede)",
		.test = alg_test_skcipher,
3927
		.fips_allowed = 1,
3928
		.suite = {
3929
			.cipher = __VECS(des3_ede_ctr_tv_template)
3930
		}
3931 3932 3933 3934 3935 3936 3937
	}, {
		/* Same as ctr(aes) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "ctr(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
3938
	}, {
3939 3940 3941 3942 3943 3944 3945

		/* Same as ctr(sm4) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "ctr(psm4)",
		.test = alg_test_null,
	}, {
3946 3947 3948
		.alg = "ctr(serpent)",
		.test = alg_test_skcipher,
		.suite = {
3949
			.cipher = __VECS(serpent_ctr_tv_template)
3950
		}
3951 3952 3953 3954 3955 3956
	}, {
		.alg = "ctr(sm4)",
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(sm4_ctr_tv_template)
		}
3957 3958 3959 3960
	}, {
		.alg = "ctr(twofish)",
		.test = alg_test_skcipher,
		.suite = {
3961
			.cipher = __VECS(tf_ctr_tv_template)
3962
		}
3963 3964
	}, {
		.alg = "cts(cbc(aes))",
3965
		.test = alg_test_skcipher,
3966
		.fips_allowed = 1,
3967
		.suite = {
3968
			.cipher = __VECS(cts_mode_tv_template)
3969
		}
3970 3971 3972 3973 3974 3975 3976
	}, {
		/* Same as cts(cbc((aes)) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "cts(cbc(paes))",
		.test = alg_test_null,
		.fips_allowed = 1,
3977 3978 3979
	}, {
		.alg = "deflate",
		.test = alg_test_comp,
3980
		.fips_allowed = 1,
3981 3982
		.suite = {
			.comp = {
3983 3984
				.comp = __VECS(deflate_comp_tv_template),
				.decomp = __VECS(deflate_decomp_tv_template)
3985 3986
			}
		}
3987 3988 3989 3990 3991
	}, {
		.alg = "dh",
		.test = alg_test_kpp,
		.fips_allowed = 1,
		.suite = {
3992
			.kpp = __VECS(dh_tv_template)
3993
		}
3994 3995 3996
	}, {
		.alg = "digest_null",
		.test = alg_test_null,
3997 3998 3999 4000 4001
	}, {
		.alg = "drbg_nopr_ctr_aes128",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4002
			.drbg = __VECS(drbg_nopr_ctr_aes128_tv_template)
4003 4004 4005 4006 4007 4008
		}
	}, {
		.alg = "drbg_nopr_ctr_aes192",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4009
			.drbg = __VECS(drbg_nopr_ctr_aes192_tv_template)
4010 4011 4012 4013 4014 4015
		}
	}, {
		.alg = "drbg_nopr_ctr_aes256",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4016
			.drbg = __VECS(drbg_nopr_ctr_aes256_tv_template)
4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030
		}
	}, {
		/*
		 * There is no need to specifically test the DRBG with every
		 * backend cipher -- covered by drbg_nopr_hmac_sha256 test
		 */
		.alg = "drbg_nopr_hmac_sha1",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_nopr_hmac_sha256",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4031
			.drbg = __VECS(drbg_nopr_hmac_sha256_tv_template)
4032 4033 4034 4035 4036 4037 4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050
		}
	}, {
		/* covered by drbg_nopr_hmac_sha256 test */
		.alg = "drbg_nopr_hmac_sha384",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_nopr_hmac_sha512",
		.test = alg_test_null,
		.fips_allowed = 1,
	}, {
		.alg = "drbg_nopr_sha1",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_nopr_sha256",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4051
			.drbg = __VECS(drbg_nopr_sha256_tv_template)
4052 4053 4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066
		}
	}, {
		/* covered by drbg_nopr_sha256 test */
		.alg = "drbg_nopr_sha384",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_nopr_sha512",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_ctr_aes128",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4067
			.drbg = __VECS(drbg_pr_ctr_aes128_tv_template)
4068 4069 4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083 4084 4085 4086
		}
	}, {
		/* covered by drbg_pr_ctr_aes128 test */
		.alg = "drbg_pr_ctr_aes192",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_ctr_aes256",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_hmac_sha1",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_hmac_sha256",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4087
			.drbg = __VECS(drbg_pr_hmac_sha256_tv_template)
4088 4089 4090 4091 4092 4093 4094 4095 4096 4097 4098 4099 4100 4101 4102 4103 4104 4105 4106
		}
	}, {
		/* covered by drbg_pr_hmac_sha256 test */
		.alg = "drbg_pr_hmac_sha384",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_hmac_sha512",
		.test = alg_test_null,
		.fips_allowed = 1,
	}, {
		.alg = "drbg_pr_sha1",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_sha256",
		.test = alg_test_drbg,
		.fips_allowed = 1,
		.suite = {
4107
			.drbg = __VECS(drbg_pr_sha256_tv_template)
4108 4109 4110 4111 4112 4113 4114 4115 4116 4117
		}
	}, {
		/* covered by drbg_pr_sha256 test */
		.alg = "drbg_pr_sha384",
		.fips_allowed = 1,
		.test = alg_test_null,
	}, {
		.alg = "drbg_pr_sha512",
		.fips_allowed = 1,
		.test = alg_test_null,
4118 4119
	}, {
		.alg = "ecb(aes)",
4120
		.test = alg_test_skcipher,
4121
		.fips_allowed = 1,
4122
		.suite = {
4123
			.cipher = __VECS(aes_tv_template)
4124 4125 4126
		}
	}, {
		.alg = "ecb(anubis)",
4127
		.test = alg_test_skcipher,
4128
		.suite = {
4129
			.cipher = __VECS(anubis_tv_template)
4130 4131 4132
		}
	}, {
		.alg = "ecb(arc4)",
4133
		.test = alg_test_skcipher,
4134
		.suite = {
4135
			.cipher = __VECS(arc4_tv_template)
4136 4137 4138
		}
	}, {
		.alg = "ecb(blowfish)",
4139
		.test = alg_test_skcipher,
4140
		.suite = {
4141
			.cipher = __VECS(bf_tv_template)
4142 4143 4144
		}
	}, {
		.alg = "ecb(camellia)",
4145
		.test = alg_test_skcipher,
4146
		.suite = {
4147
			.cipher = __VECS(camellia_tv_template)
4148 4149 4150
		}
	}, {
		.alg = "ecb(cast5)",
4151
		.test = alg_test_skcipher,
4152
		.suite = {
4153
			.cipher = __VECS(cast5_tv_template)
4154 4155 4156
		}
	}, {
		.alg = "ecb(cast6)",
4157
		.test = alg_test_skcipher,
4158
		.suite = {
4159
			.cipher = __VECS(cast6_tv_template)
4160
		}
4161 4162 4163
	}, {
		.alg = "ecb(cipher_null)",
		.test = alg_test_null,
4164
		.fips_allowed = 1,
4165 4166
	}, {
		.alg = "ecb(des)",
4167
		.test = alg_test_skcipher,
4168
		.suite = {
4169
			.cipher = __VECS(des_tv_template)
4170 4171 4172
		}
	}, {
		.alg = "ecb(des3_ede)",
4173
		.test = alg_test_skcipher,
4174
		.fips_allowed = 1,
4175
		.suite = {
4176
			.cipher = __VECS(des3_ede_tv_template)
4177
		}
4178 4179 4180 4181 4182
	}, {
		.alg = "ecb(fcrypt)",
		.test = alg_test_skcipher,
		.suite = {
			.cipher = {
4183 4184
				.vecs = fcrypt_pcbc_tv_template,
				.count = 1
4185 4186
			}
		}
4187 4188
	}, {
		.alg = "ecb(khazad)",
4189
		.test = alg_test_skcipher,
4190
		.suite = {
4191
			.cipher = __VECS(khazad_tv_template)
4192
		}
4193 4194 4195 4196 4197 4198 4199
	}, {
		/* Same as ecb(aes) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "ecb(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
4200 4201
	}, {
		.alg = "ecb(seed)",
4202
		.test = alg_test_skcipher,
4203
		.suite = {
4204
			.cipher = __VECS(seed_tv_template)
4205 4206 4207
		}
	}, {
		.alg = "ecb(serpent)",
4208
		.test = alg_test_skcipher,
4209
		.suite = {
4210
			.cipher = __VECS(serpent_tv_template)
4211
		}
4212 4213 4214 4215
	}, {
		.alg = "ecb(sm4)",
		.test = alg_test_skcipher,
		.suite = {
4216
			.cipher = __VECS(sm4_tv_template)
4217
		}
4218 4219
	}, {
		.alg = "ecb(tea)",
4220
		.test = alg_test_skcipher,
4221
		.suite = {
4222
			.cipher = __VECS(tea_tv_template)
4223 4224 4225
		}
	}, {
		.alg = "ecb(tnepres)",
4226
		.test = alg_test_skcipher,
4227
		.suite = {
4228
			.cipher = __VECS(tnepres_tv_template)
4229 4230 4231
		}
	}, {
		.alg = "ecb(twofish)",
4232
		.test = alg_test_skcipher,
4233
		.suite = {
4234
			.cipher = __VECS(tf_tv_template)
4235 4236 4237
		}
	}, {
		.alg = "ecb(xeta)",
4238
		.test = alg_test_skcipher,
4239
		.suite = {
4240
			.cipher = __VECS(xeta_tv_template)
4241 4242 4243
		}
	}, {
		.alg = "ecb(xtea)",
4244
		.test = alg_test_skcipher,
4245
		.suite = {
4246
			.cipher = __VECS(xtea_tv_template)
4247
		}
4248 4249 4250 4251 4252
	}, {
		.alg = "ecdh",
		.test = alg_test_kpp,
		.fips_allowed = 1,
		.suite = {
4253
			.kpp = __VECS(ecdh_tv_template)
4254
		}
4255 4256 4257 4258 4259 4260
	}, {
		.alg = "ecrdsa",
		.test = alg_test_akcipher,
		.suite = {
			.akcipher = __VECS(ecrdsa_tv_template)
		}
4261 4262
	}, {
		.alg = "gcm(aes)",
4263
		.generic_driver = "gcm_base(ctr(aes-generic),ghash-generic)",
4264
		.test = alg_test_aead,
4265
		.fips_allowed = 1,
4266
		.suite = {
4267
			.aead = __VECS(aes_gcm_tv_template)
4268
		}
4269 4270 4271
	}, {
		.alg = "ghash",
		.test = alg_test_hash,
4272
		.fips_allowed = 1,
4273
		.suite = {
4274
			.hash = __VECS(ghash_tv_template)
4275
		}
4276 4277 4278 4279
	}, {
		.alg = "hmac(md5)",
		.test = alg_test_hash,
		.suite = {
4280
			.hash = __VECS(hmac_md5_tv_template)
4281 4282 4283 4284 4285
		}
	}, {
		.alg = "hmac(rmd128)",
		.test = alg_test_hash,
		.suite = {
4286
			.hash = __VECS(hmac_rmd128_tv_template)
4287 4288 4289 4290 4291
		}
	}, {
		.alg = "hmac(rmd160)",
		.test = alg_test_hash,
		.suite = {
4292
			.hash = __VECS(hmac_rmd160_tv_template)
4293 4294 4295 4296
		}
	}, {
		.alg = "hmac(sha1)",
		.test = alg_test_hash,
4297
		.fips_allowed = 1,
4298
		.suite = {
4299
			.hash = __VECS(hmac_sha1_tv_template)
4300 4301 4302 4303
		}
	}, {
		.alg = "hmac(sha224)",
		.test = alg_test_hash,
4304
		.fips_allowed = 1,
4305
		.suite = {
4306
			.hash = __VECS(hmac_sha224_tv_template)
4307 4308 4309 4310
		}
	}, {
		.alg = "hmac(sha256)",
		.test = alg_test_hash,
4311
		.fips_allowed = 1,
4312
		.suite = {
4313
			.hash = __VECS(hmac_sha256_tv_template)
4314
		}
4315 4316 4317 4318 4319
	}, {
		.alg = "hmac(sha3-224)",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4320
			.hash = __VECS(hmac_sha3_224_tv_template)
4321 4322 4323 4324 4325 4326
		}
	}, {
		.alg = "hmac(sha3-256)",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4327
			.hash = __VECS(hmac_sha3_256_tv_template)
4328 4329 4330 4331 4332 4333
		}
	}, {
		.alg = "hmac(sha3-384)",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4334
			.hash = __VECS(hmac_sha3_384_tv_template)
4335 4336 4337 4338 4339 4340
		}
	}, {
		.alg = "hmac(sha3-512)",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4341
			.hash = __VECS(hmac_sha3_512_tv_template)
4342
		}
4343 4344 4345
	}, {
		.alg = "hmac(sha384)",
		.test = alg_test_hash,
4346
		.fips_allowed = 1,
4347
		.suite = {
4348
			.hash = __VECS(hmac_sha384_tv_template)
4349 4350 4351 4352
		}
	}, {
		.alg = "hmac(sha512)",
		.test = alg_test_hash,
4353
		.fips_allowed = 1,
4354
		.suite = {
4355
			.hash = __VECS(hmac_sha512_tv_template)
4356
		}
4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368
	}, {
		.alg = "hmac(streebog256)",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(hmac_streebog256_tv_template)
		}
	}, {
		.alg = "hmac(streebog512)",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(hmac_streebog512_tv_template)
		}
4369 4370 4371 4372
	}, {
		.alg = "jitterentropy_rng",
		.fips_allowed = 1,
		.test = alg_test_null,
4373 4374 4375 4376 4377
	}, {
		.alg = "kw(aes)",
		.test = alg_test_skcipher,
		.fips_allowed = 1,
		.suite = {
4378
			.cipher = __VECS(aes_kw_tv_template)
4379
		}
4380 4381
	}, {
		.alg = "lrw(aes)",
4382
		.generic_driver = "lrw(ecb(aes-generic))",
4383
		.test = alg_test_skcipher,
4384
		.suite = {
4385
			.cipher = __VECS(aes_lrw_tv_template)
4386
		}
4387 4388
	}, {
		.alg = "lrw(camellia)",
4389
		.generic_driver = "lrw(ecb(camellia-generic))",
4390 4391
		.test = alg_test_skcipher,
		.suite = {
4392
			.cipher = __VECS(camellia_lrw_tv_template)
4393
		}
4394 4395
	}, {
		.alg = "lrw(cast6)",
4396
		.generic_driver = "lrw(ecb(cast6-generic))",
4397 4398
		.test = alg_test_skcipher,
		.suite = {
4399
			.cipher = __VECS(cast6_lrw_tv_template)
4400
		}
4401 4402
	}, {
		.alg = "lrw(serpent)",
4403
		.generic_driver = "lrw(ecb(serpent-generic))",
4404 4405
		.test = alg_test_skcipher,
		.suite = {
4406
			.cipher = __VECS(serpent_lrw_tv_template)
4407
		}
4408 4409
	}, {
		.alg = "lrw(twofish)",
4410
		.generic_driver = "lrw(ecb(twofish-generic))",
4411 4412
		.test = alg_test_skcipher,
		.suite = {
4413
			.cipher = __VECS(tf_lrw_tv_template)
4414
		}
4415 4416 4417 4418 4419 4420
	}, {
		.alg = "lz4",
		.test = alg_test_comp,
		.fips_allowed = 1,
		.suite = {
			.comp = {
4421 4422
				.comp = __VECS(lz4_comp_tv_template),
				.decomp = __VECS(lz4_decomp_tv_template)
4423 4424 4425 4426 4427 4428 4429 4430
			}
		}
	}, {
		.alg = "lz4hc",
		.test = alg_test_comp,
		.fips_allowed = 1,
		.suite = {
			.comp = {
4431 4432
				.comp = __VECS(lz4hc_comp_tv_template),
				.decomp = __VECS(lz4hc_decomp_tv_template)
4433 4434
			}
		}
4435 4436 4437
	}, {
		.alg = "lzo",
		.test = alg_test_comp,
4438
		.fips_allowed = 1,
4439 4440
		.suite = {
			.comp = {
4441 4442
				.comp = __VECS(lzo_comp_tv_template),
				.decomp = __VECS(lzo_decomp_tv_template)
4443 4444 4445 4446 4447 4448
			}
		}
	}, {
		.alg = "md4",
		.test = alg_test_hash,
		.suite = {
4449
			.hash = __VECS(md4_tv_template)
4450 4451 4452 4453 4454
		}
	}, {
		.alg = "md5",
		.test = alg_test_hash,
		.suite = {
4455
			.hash = __VECS(md5_tv_template)
4456 4457 4458 4459 4460
		}
	}, {
		.alg = "michael_mic",
		.test = alg_test_hash,
		.suite = {
4461
			.hash = __VECS(michael_mic_tv_template)
4462
		}
4463 4464 4465 4466
	}, {
		.alg = "morus1280",
		.test = alg_test_aead,
		.suite = {
4467
			.aead = __VECS(morus1280_tv_template)
4468 4469 4470 4471 4472
		}
	}, {
		.alg = "morus640",
		.test = alg_test_aead,
		.suite = {
4473
			.aead = __VECS(morus640_tv_template)
4474
		}
4475 4476 4477 4478 4479 4480
	}, {
		.alg = "nhpoly1305",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(nhpoly1305_tv_template)
		}
4481 4482 4483 4484 4485
	}, {
		.alg = "ofb(aes)",
		.test = alg_test_skcipher,
		.fips_allowed = 1,
		.suite = {
4486
			.cipher = __VECS(aes_ofb_tv_template)
4487
		}
4488 4489 4490 4491 4492 4493 4494
	}, {
		/* Same as ofb(aes) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "ofb(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
4495 4496
	}, {
		.alg = "pcbc(fcrypt)",
4497
		.test = alg_test_skcipher,
4498
		.suite = {
4499
			.cipher = __VECS(fcrypt_pcbc_tv_template)
4500
		}
4501 4502 4503 4504 4505 4506 4507 4508 4509 4510 4511 4512 4513 4514 4515 4516 4517 4518 4519
	}, {
		.alg = "pkcs1pad(rsa,sha224)",
		.test = alg_test_null,
		.fips_allowed = 1,
	}, {
		.alg = "pkcs1pad(rsa,sha256)",
		.test = alg_test_akcipher,
		.fips_allowed = 1,
		.suite = {
			.akcipher = __VECS(pkcs1pad_rsa_tv_template)
		}
	}, {
		.alg = "pkcs1pad(rsa,sha384)",
		.test = alg_test_null,
		.fips_allowed = 1,
	}, {
		.alg = "pkcs1pad(rsa,sha512)",
		.test = alg_test_null,
		.fips_allowed = 1,
4520 4521 4522 4523
	}, {
		.alg = "poly1305",
		.test = alg_test_hash,
		.suite = {
4524
			.hash = __VECS(poly1305_tv_template)
4525
		}
4526 4527
	}, {
		.alg = "rfc3686(ctr(aes))",
4528
		.test = alg_test_skcipher,
4529
		.fips_allowed = 1,
4530
		.suite = {
4531
			.cipher = __VECS(aes_ctr_rfc3686_tv_template)
4532
		}
4533
	}, {
4534
		.alg = "rfc4106(gcm(aes))",
4535
		.generic_driver = "rfc4106(gcm_base(ctr(aes-generic),ghash-generic))",
4536
		.test = alg_test_aead,
4537
		.fips_allowed = 1,
4538
		.suite = {
4539
			.aead = __VECS(aes_gcm_rfc4106_tv_template)
4540 4541
		}
	}, {
4542
		.alg = "rfc4309(ccm(aes))",
4543
		.generic_driver = "rfc4309(ccm_base(ctr(aes-generic),cbcmac(aes-generic)))",
4544
		.test = alg_test_aead,
4545
		.fips_allowed = 1,
4546
		.suite = {
4547
			.aead = __VECS(aes_ccm_rfc4309_tv_template)
4548
		}
4549
	}, {
4550
		.alg = "rfc4543(gcm(aes))",
4551
		.generic_driver = "rfc4543(gcm_base(ctr(aes-generic),ghash-generic))",
4552 4553
		.test = alg_test_aead,
		.suite = {
4554
			.aead = __VECS(aes_gcm_rfc4543_tv_template)
4555
		}
4556 4557 4558 4559
	}, {
		.alg = "rfc7539(chacha20,poly1305)",
		.test = alg_test_aead,
		.suite = {
4560
			.aead = __VECS(rfc7539_tv_template)
4561
		}
4562 4563 4564 4565
	}, {
		.alg = "rfc7539esp(chacha20,poly1305)",
		.test = alg_test_aead,
		.suite = {
4566
			.aead = __VECS(rfc7539esp_tv_template)
4567
		}
4568 4569 4570 4571
	}, {
		.alg = "rmd128",
		.test = alg_test_hash,
		.suite = {
4572
			.hash = __VECS(rmd128_tv_template)
4573 4574 4575 4576 4577
		}
	}, {
		.alg = "rmd160",
		.test = alg_test_hash,
		.suite = {
4578
			.hash = __VECS(rmd160_tv_template)
4579 4580 4581 4582 4583
		}
	}, {
		.alg = "rmd256",
		.test = alg_test_hash,
		.suite = {
4584
			.hash = __VECS(rmd256_tv_template)
4585 4586 4587 4588 4589
		}
	}, {
		.alg = "rmd320",
		.test = alg_test_hash,
		.suite = {
4590
			.hash = __VECS(rmd320_tv_template)
4591
		}
4592 4593 4594 4595 4596
	}, {
		.alg = "rsa",
		.test = alg_test_akcipher,
		.fips_allowed = 1,
		.suite = {
4597
			.akcipher = __VECS(rsa_tv_template)
4598
		}
4599 4600
	}, {
		.alg = "salsa20",
4601
		.test = alg_test_skcipher,
4602
		.suite = {
4603
			.cipher = __VECS(salsa20_stream_tv_template)
4604 4605 4606 4607
		}
	}, {
		.alg = "sha1",
		.test = alg_test_hash,
4608
		.fips_allowed = 1,
4609
		.suite = {
4610
			.hash = __VECS(sha1_tv_template)
4611 4612 4613 4614
		}
	}, {
		.alg = "sha224",
		.test = alg_test_hash,
4615
		.fips_allowed = 1,
4616
		.suite = {
4617
			.hash = __VECS(sha224_tv_template)
4618 4619 4620 4621
		}
	}, {
		.alg = "sha256",
		.test = alg_test_hash,
4622
		.fips_allowed = 1,
4623
		.suite = {
4624
			.hash = __VECS(sha256_tv_template)
4625
		}
4626 4627 4628 4629 4630
	}, {
		.alg = "sha3-224",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4631
			.hash = __VECS(sha3_224_tv_template)
4632 4633 4634 4635 4636 4637
		}
	}, {
		.alg = "sha3-256",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4638
			.hash = __VECS(sha3_256_tv_template)
4639 4640 4641 4642 4643 4644
		}
	}, {
		.alg = "sha3-384",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4645
			.hash = __VECS(sha3_384_tv_template)
4646 4647 4648 4649 4650 4651
		}
	}, {
		.alg = "sha3-512",
		.test = alg_test_hash,
		.fips_allowed = 1,
		.suite = {
4652
			.hash = __VECS(sha3_512_tv_template)
4653
		}
4654 4655 4656
	}, {
		.alg = "sha384",
		.test = alg_test_hash,
4657
		.fips_allowed = 1,
4658
		.suite = {
4659
			.hash = __VECS(sha384_tv_template)
4660 4661 4662 4663
		}
	}, {
		.alg = "sha512",
		.test = alg_test_hash,
4664
		.fips_allowed = 1,
4665
		.suite = {
4666
			.hash = __VECS(sha512_tv_template)
4667
		}
4668 4669 4670 4671 4672 4673
	}, {
		.alg = "sm3",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(sm3_tv_template)
		}
4674 4675 4676 4677 4678 4679 4680 4681 4682 4683 4684 4685
	}, {
		.alg = "streebog256",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(streebog256_tv_template)
		}
	}, {
		.alg = "streebog512",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(streebog512_tv_template)
		}
4686 4687 4688 4689
	}, {
		.alg = "tgr128",
		.test = alg_test_hash,
		.suite = {
4690
			.hash = __VECS(tgr128_tv_template)
4691 4692 4693 4694 4695
		}
	}, {
		.alg = "tgr160",
		.test = alg_test_hash,
		.suite = {
4696
			.hash = __VECS(tgr160_tv_template)
4697 4698 4699 4700 4701
		}
	}, {
		.alg = "tgr192",
		.test = alg_test_hash,
		.suite = {
4702
			.hash = __VECS(tgr192_tv_template)
4703
		}
4704 4705 4706 4707 4708 4709
	}, {
		.alg = "vmac64(aes)",
		.test = alg_test_hash,
		.suite = {
			.hash = __VECS(vmac64_aes_tv_template)
		}
4710 4711 4712 4713
	}, {
		.alg = "wp256",
		.test = alg_test_hash,
		.suite = {
4714
			.hash = __VECS(wp256_tv_template)
4715 4716 4717 4718 4719
		}
	}, {
		.alg = "wp384",
		.test = alg_test_hash,
		.suite = {
4720
			.hash = __VECS(wp384_tv_template)
4721 4722 4723 4724 4725
		}
	}, {
		.alg = "wp512",
		.test = alg_test_hash,
		.suite = {
4726
			.hash = __VECS(wp512_tv_template)
4727 4728 4729 4730 4731
		}
	}, {
		.alg = "xcbc(aes)",
		.test = alg_test_hash,
		.suite = {
4732
			.hash = __VECS(aes_xcbc128_tv_template)
4733
		}
4734 4735 4736 4737 4738 4739
	}, {
		.alg = "xchacha12",
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(xchacha12_tv_template)
		},
4740 4741 4742 4743 4744 4745
	}, {
		.alg = "xchacha20",
		.test = alg_test_skcipher,
		.suite = {
			.cipher = __VECS(xchacha20_tv_template)
		},
4746 4747
	}, {
		.alg = "xts(aes)",
4748
		.generic_driver = "xts(ecb(aes-generic))",
4749
		.test = alg_test_skcipher,
4750
		.fips_allowed = 1,
4751
		.suite = {
4752
			.cipher = __VECS(aes_xts_tv_template)
4753
		}
4754 4755
	}, {
		.alg = "xts(camellia)",
4756
		.generic_driver = "xts(ecb(camellia-generic))",
4757 4758
		.test = alg_test_skcipher,
		.suite = {
4759
			.cipher = __VECS(camellia_xts_tv_template)
4760
		}
4761 4762
	}, {
		.alg = "xts(cast6)",
4763
		.generic_driver = "xts(ecb(cast6-generic))",
4764 4765
		.test = alg_test_skcipher,
		.suite = {
4766
			.cipher = __VECS(cast6_xts_tv_template)
4767
		}
4768 4769 4770 4771 4772 4773 4774
	}, {
		/* Same as xts(aes) except the key is stored in
		 * hardware secure memory which we reference by index
		 */
		.alg = "xts(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
4775 4776
	}, {
		.alg = "xts(serpent)",
4777
		.generic_driver = "xts(ecb(serpent-generic))",
4778 4779
		.test = alg_test_skcipher,
		.suite = {
4780
			.cipher = __VECS(serpent_xts_tv_template)
4781
		}
4782 4783
	}, {
		.alg = "xts(twofish)",
4784
		.generic_driver = "xts(ecb(twofish-generic))",
4785 4786
		.test = alg_test_skcipher,
		.suite = {
4787
			.cipher = __VECS(tf_xts_tv_template)
4788
		}
4789 4790 4791 4792 4793 4794 4795 4796
	}, {
		.alg = "xts4096(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
	}, {
		.alg = "xts512(paes)",
		.test = alg_test_null,
		.fips_allowed = 1,
4797 4798 4799 4800 4801 4802 4803 4804 4805 4806
	}, {
		.alg = "zlib-deflate",
		.test = alg_test_comp,
		.fips_allowed = 1,
		.suite = {
			.comp = {
				.comp = __VECS(zlib_deflate_comp_tv_template),
				.decomp = __VECS(zlib_deflate_decomp_tv_template)
			}
		}
N
Nick Terrell 已提交
4807 4808 4809 4810 4811 4812 4813 4814 4815 4816
	}, {
		.alg = "zstd",
		.test = alg_test_comp,
		.fips_allowed = 1,
		.suite = {
			.comp = {
				.comp = __VECS(zstd_comp_tv_template),
				.decomp = __VECS(zstd_decomp_tv_template)
			}
		}
4817 4818 4819
	}
};

4820
static void alg_check_test_descs_order(void)
4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836 4837 4838 4839 4840
{
	int i;

	for (i = 1; i < ARRAY_SIZE(alg_test_descs); i++) {
		int diff = strcmp(alg_test_descs[i - 1].alg,
				  alg_test_descs[i].alg);

		if (WARN_ON(diff > 0)) {
			pr_warn("testmgr: alg_test_descs entries in wrong order: '%s' before '%s'\n",
				alg_test_descs[i - 1].alg,
				alg_test_descs[i].alg);
		}

		if (WARN_ON(diff == 0)) {
			pr_warn("testmgr: duplicate alg_test_descs entry: '%s'\n",
				alg_test_descs[i].alg);
		}
	}
}

4841 4842
static void alg_check_testvec_configs(void)
{
4843 4844 4845 4846 4847
	int i;

	for (i = 0; i < ARRAY_SIZE(default_cipher_testvec_configs); i++)
		WARN_ON(!valid_testvec_config(
				&default_cipher_testvec_configs[i]));
4848 4849 4850 4851

	for (i = 0; i < ARRAY_SIZE(default_hash_testvec_configs); i++)
		WARN_ON(!valid_testvec_config(
				&default_hash_testvec_configs[i]));
4852 4853 4854 4855 4856 4857
}

static void testmgr_onetime_init(void)
{
	alg_check_test_descs_order();
	alg_check_testvec_configs();
4858 4859 4860 4861

#ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
	pr_warn("alg: extra crypto tests enabled.  This is intended for developer use only.\n");
#endif
4862 4863
}

4864
static int alg_find_test(const char *alg)
4865 4866 4867 4868 4869 4870 4871 4872 4873 4874 4875 4876 4877 4878 4879 4880 4881 4882
{
	int start = 0;
	int end = ARRAY_SIZE(alg_test_descs);

	while (start < end) {
		int i = (start + end) / 2;
		int diff = strcmp(alg_test_descs[i].alg, alg);

		if (diff > 0) {
			end = i;
			continue;
		}

		if (diff < 0) {
			start = i + 1;
			continue;
		}

4883 4884 4885 4886 4887 4888 4889 4890 4891
		return i;
	}

	return -1;
}

int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
{
	int i;
4892
	int j;
4893
	int rc;
4894

4895 4896 4897 4898 4899
	if (!fips_enabled && notests) {
		printk_once(KERN_INFO "alg: self-tests disabled\n");
		return 0;
	}

4900
	DO_ONCE(testmgr_onetime_init);
4901

4902 4903 4904 4905 4906 4907 4908 4909 4910 4911 4912
	if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) {
		char nalg[CRYPTO_MAX_ALG_NAME];

		if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
		    sizeof(nalg))
			return -ENAMETOOLONG;

		i = alg_find_test(nalg);
		if (i < 0)
			goto notest;

4913 4914 4915
		if (fips_enabled && !alg_test_descs[i].fips_allowed)
			goto non_fips_alg;

4916 4917
		rc = alg_test_cipher(alg_test_descs + i, driver, type, mask);
		goto test_done;
4918 4919
	}

4920
	i = alg_find_test(alg);
4921 4922
	j = alg_find_test(driver);
	if (i < 0 && j < 0)
4923 4924
		goto notest;

4925 4926
	if (fips_enabled && ((i >= 0 && !alg_test_descs[i].fips_allowed) ||
			     (j >= 0 && !alg_test_descs[j].fips_allowed)))
4927 4928
		goto non_fips_alg;

4929 4930 4931 4932
	rc = 0;
	if (i >= 0)
		rc |= alg_test_descs[i].test(alg_test_descs + i, driver,
					     type, mask);
4933
	if (j >= 0 && j != i)
4934 4935 4936
		rc |= alg_test_descs[j].test(alg_test_descs + j, driver,
					     type, mask);

4937
test_done:
4938 4939 4940
	if (rc && (fips_enabled || panic_on_fail))
		panic("alg: self-tests for %s (%s) failed in %s mode!\n",
		      driver, alg, fips_enabled ? "fips" : "panic_on_fail");
4941

4942
	if (fips_enabled && !rc)
4943
		pr_info("alg: self-tests for %s (%s) passed\n", driver, alg);
4944

4945
	return rc;
4946 4947

notest:
4948 4949
	printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
	return 0;
4950 4951
non_fips_alg:
	return -EINVAL;
4952
}
4953

4954
#endif /* CONFIG_CRYPTO_MANAGER_DISABLE_TESTS */
4955

4956
EXPORT_SYMBOL_GPL(alg_test);