diff options
Diffstat (limited to 'crypto/testmgr.c')
-rw-r--r-- | crypto/testmgr.c | 166 |
1 files changed, 130 insertions, 36 deletions
diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 5823735cf381..ecddf921a9db 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c | |||
@@ -184,8 +184,9 @@ static int do_one_async_hash_op(struct ahash_request *req, | |||
184 | return ret; | 184 | return ret; |
185 | } | 185 | } |
186 | 186 | ||
187 | static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, | 187 | static int __test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, |
188 | unsigned int tcount, bool use_digest) | 188 | unsigned int tcount, bool use_digest, |
189 | const int align_offset) | ||
189 | { | 190 | { |
190 | const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm)); | 191 | const char *algo = crypto_tfm_alg_driver_name(crypto_ahash_tfm(tfm)); |
191 | unsigned int i, j, k, temp; | 192 | unsigned int i, j, k, temp; |
@@ -216,10 +217,15 @@ static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, | |||
216 | if (template[i].np) | 217 | if (template[i].np) |
217 | continue; | 218 | continue; |
218 | 219 | ||
220 | ret = -EINVAL; | ||
221 | if (WARN_ON(align_offset + template[i].psize > PAGE_SIZE)) | ||
222 | goto out; | ||
223 | |||
219 | j++; | 224 | j++; |
220 | memset(result, 0, 64); | 225 | memset(result, 0, 64); |
221 | 226 | ||
222 | hash_buff = xbuf[0]; | 227 | hash_buff = xbuf[0]; |
228 | hash_buff += align_offset; | ||
223 | 229 | ||
224 | memcpy(hash_buff, template[i].plaintext, template[i].psize); | 230 | memcpy(hash_buff, template[i].plaintext, template[i].psize); |
225 | sg_init_one(&sg[0], hash_buff, template[i].psize); | 231 | sg_init_one(&sg[0], hash_buff, template[i].psize); |
@@ -281,6 +287,10 @@ static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, | |||
281 | 287 | ||
282 | j = 0; | 288 | j = 0; |
283 | for (i = 0; i < tcount; i++) { | 289 | for (i = 0; i < tcount; i++) { |
290 | /* alignment tests are only done with continuous buffers */ | ||
291 | if (align_offset != 0) | ||
292 | break; | ||
293 | |||
284 | if (template[i].np) { | 294 | if (template[i].np) { |
285 | j++; | 295 | j++; |
286 | memset(result, 0, 64); | 296 | memset(result, 0, 64); |
@@ -358,9 +368,36 @@ out_nobuf: | |||
358 | return ret; | 368 | return ret; |
359 | } | 369 | } |
360 | 370 | ||
371 | static int test_hash(struct crypto_ahash *tfm, struct hash_testvec *template, | ||
372 | unsigned int tcount, bool use_digest) | ||
373 | { | ||
374 | unsigned int alignmask; | ||
375 | int ret; | ||
376 | |||
377 | ret = __test_hash(tfm, template, tcount, use_digest, 0); | ||
378 | if (ret) | ||
379 | return ret; | ||
380 | |||
381 | /* test unaligned buffers, check with one byte offset */ | ||
382 | ret = __test_hash(tfm, template, tcount, use_digest, 1); | ||
383 | if (ret) | ||
384 | return ret; | ||
385 | |||
386 | alignmask = crypto_tfm_alg_alignmask(&tfm->base); | ||
387 | if (alignmask) { | ||
388 | /* Check if alignment mask for tfm is correctly set. */ | ||
389 | ret = __test_hash(tfm, template, tcount, use_digest, | ||
390 | alignmask + 1); | ||
391 | if (ret) | ||
392 | return ret; | ||
393 | } | ||
394 | |||
395 | return 0; | ||
396 | } | ||
397 | |||
361 | static int __test_aead(struct crypto_aead *tfm, int enc, | 398 | static int __test_aead(struct crypto_aead *tfm, int enc, |
362 | struct aead_testvec *template, unsigned int tcount, | 399 | struct aead_testvec *template, unsigned int tcount, |
363 | const bool diff_dst) | 400 | const bool diff_dst, const int align_offset) |
364 | { | 401 | { |
365 | const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)); | 402 | const char *algo = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)); |
366 | unsigned int i, j, k, n, temp; | 403 | unsigned int i, j, k, n, temp; |
@@ -423,15 +460,16 @@ static int __test_aead(struct crypto_aead *tfm, int enc, | |||
423 | if (!template[i].np) { | 460 | if (!template[i].np) { |
424 | j++; | 461 | j++; |
425 | 462 | ||
426 | /* some tepmplates have no input data but they will | 463 | /* some templates have no input data but they will |
427 | * touch input | 464 | * touch input |
428 | */ | 465 | */ |
429 | input = xbuf[0]; | 466 | input = xbuf[0]; |
467 | input += align_offset; | ||
430 | assoc = axbuf[0]; | 468 | assoc = axbuf[0]; |
431 | 469 | ||
432 | ret = -EINVAL; | 470 | ret = -EINVAL; |
433 | if (WARN_ON(template[i].ilen > PAGE_SIZE || | 471 | if (WARN_ON(align_offset + template[i].ilen > |
434 | template[i].alen > PAGE_SIZE)) | 472 | PAGE_SIZE || template[i].alen > PAGE_SIZE)) |
435 | goto out; | 473 | goto out; |
436 | 474 | ||
437 | memcpy(input, template[i].input, template[i].ilen); | 475 | memcpy(input, template[i].input, template[i].ilen); |
@@ -470,6 +508,7 @@ static int __test_aead(struct crypto_aead *tfm, int enc, | |||
470 | 508 | ||
471 | if (diff_dst) { | 509 | if (diff_dst) { |
472 | output = xoutbuf[0]; | 510 | output = xoutbuf[0]; |
511 | output += align_offset; | ||
473 | sg_init_one(&sgout[0], output, | 512 | sg_init_one(&sgout[0], output, |
474 | template[i].ilen + | 513 | template[i].ilen + |
475 | (enc ? authsize : 0)); | 514 | (enc ? authsize : 0)); |
@@ -530,6 +569,10 @@ static int __test_aead(struct crypto_aead *tfm, int enc, | |||
530 | } | 569 | } |
531 | 570 | ||
532 | for (i = 0, j = 0; i < tcount; i++) { | 571 | for (i = 0, j = 0; i < tcount; i++) { |
572 | /* alignment tests are only done with continuous buffers */ | ||
573 | if (align_offset != 0) | ||
574 | break; | ||
575 | |||
533 | if (template[i].np) { | 576 | if (template[i].np) { |
534 | j++; | 577 | j++; |
535 | 578 | ||
@@ -732,15 +775,34 @@ out_noxbuf: | |||
732 | static int test_aead(struct crypto_aead *tfm, int enc, | 775 | static int test_aead(struct crypto_aead *tfm, int enc, |
733 | struct aead_testvec *template, unsigned int tcount) | 776 | struct aead_testvec *template, unsigned int tcount) |
734 | { | 777 | { |
778 | unsigned int alignmask; | ||
735 | int ret; | 779 | int ret; |
736 | 780 | ||
737 | /* test 'dst == src' case */ | 781 | /* test 'dst == src' case */ |
738 | ret = __test_aead(tfm, enc, template, tcount, false); | 782 | ret = __test_aead(tfm, enc, template, tcount, false, 0); |
739 | if (ret) | 783 | if (ret) |
740 | return ret; | 784 | return ret; |
741 | 785 | ||
742 | /* test 'dst != src' case */ | 786 | /* test 'dst != src' case */ |
743 | return __test_aead(tfm, enc, template, tcount, true); | 787 | ret = __test_aead(tfm, enc, template, tcount, true, 0); |
788 | if (ret) | ||
789 | return ret; | ||
790 | |||
791 | /* test unaligned buffers, check with one byte offset */ | ||
792 | ret = __test_aead(tfm, enc, template, tcount, true, 1); | ||
793 | if (ret) | ||
794 | return ret; | ||
795 | |||
796 | alignmask = crypto_tfm_alg_alignmask(&tfm->base); | ||
797 | if (alignmask) { | ||
798 | /* Check if alignment mask for tfm is correctly set. */ | ||
799 | ret = __test_aead(tfm, enc, template, tcount, true, | ||
800 | alignmask + 1); | ||
801 | if (ret) | ||
802 | return ret; | ||
803 | } | ||
804 | |||
805 | return 0; | ||
744 | } | 806 | } |
745 | 807 | ||
746 | static int test_cipher(struct crypto_cipher *tfm, int enc, | 808 | static int test_cipher(struct crypto_cipher *tfm, int enc, |
@@ -820,7 +882,7 @@ out_nobuf: | |||
820 | 882 | ||
821 | static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc, | 883 | static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc, |
822 | struct cipher_testvec *template, unsigned int tcount, | 884 | struct cipher_testvec *template, unsigned int tcount, |
823 | const bool diff_dst) | 885 | const bool diff_dst, const int align_offset) |
824 | { | 886 | { |
825 | const char *algo = | 887 | const char *algo = |
826 | crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm)); | 888 | crypto_tfm_alg_driver_name(crypto_ablkcipher_tfm(tfm)); |
@@ -876,10 +938,12 @@ static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc, | |||
876 | j++; | 938 | j++; |
877 | 939 | ||
878 | ret = -EINVAL; | 940 | ret = -EINVAL; |
879 | if (WARN_ON(template[i].ilen > PAGE_SIZE)) | 941 | if (WARN_ON(align_offset + template[i].ilen > |
942 | PAGE_SIZE)) | ||
880 | goto out; | 943 | goto out; |
881 | 944 | ||
882 | data = xbuf[0]; | 945 | data = xbuf[0]; |
946 | data += align_offset; | ||
883 | memcpy(data, template[i].input, template[i].ilen); | 947 | memcpy(data, template[i].input, template[i].ilen); |
884 | 948 | ||
885 | crypto_ablkcipher_clear_flags(tfm, ~0); | 949 | crypto_ablkcipher_clear_flags(tfm, ~0); |
@@ -900,6 +964,7 @@ static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc, | |||
900 | sg_init_one(&sg[0], data, template[i].ilen); | 964 | sg_init_one(&sg[0], data, template[i].ilen); |
901 | if (diff_dst) { | 965 | if (diff_dst) { |
902 | data = xoutbuf[0]; | 966 | data = xoutbuf[0]; |
967 | data += align_offset; | ||
903 | sg_init_one(&sgout[0], data, template[i].ilen); | 968 | sg_init_one(&sgout[0], data, template[i].ilen); |
904 | } | 969 | } |
905 | 970 | ||
@@ -941,6 +1006,9 @@ static int __test_skcipher(struct crypto_ablkcipher *tfm, int enc, | |||
941 | 1006 | ||
942 | j = 0; | 1007 | j = 0; |
943 | for (i = 0; i < tcount; i++) { | 1008 | for (i = 0; i < tcount; i++) { |
1009 | /* alignment tests are only done with continuous buffers */ | ||
1010 | if (align_offset != 0) | ||
1011 | break; | ||
944 | 1012 | ||
945 | if (template[i].iv) | 1013 | if (template[i].iv) |
946 | memcpy(iv, template[i].iv, MAX_IVLEN); | 1014 | memcpy(iv, template[i].iv, MAX_IVLEN); |
@@ -1075,15 +1143,34 @@ out_nobuf: | |||
1075 | static int test_skcipher(struct crypto_ablkcipher *tfm, int enc, | 1143 | static int test_skcipher(struct crypto_ablkcipher *tfm, int enc, |
1076 | struct cipher_testvec *template, unsigned int tcount) | 1144 | struct cipher_testvec *template, unsigned int tcount) |
1077 | { | 1145 | { |
1146 | unsigned int alignmask; | ||
1078 | int ret; | 1147 | int ret; |
1079 | 1148 | ||
1080 | /* test 'dst == src' case */ | 1149 | /* test 'dst == src' case */ |
1081 | ret = __test_skcipher(tfm, enc, template, tcount, false); | 1150 | ret = __test_skcipher(tfm, enc, template, tcount, false, 0); |
1082 | if (ret) | 1151 | if (ret) |
1083 | return ret; | 1152 | return ret; |
1084 | 1153 | ||
1085 | /* test 'dst != src' case */ | 1154 | /* test 'dst != src' case */ |
1086 | return __test_skcipher(tfm, enc, template, tcount, true); | 1155 | ret = __test_skcipher(tfm, enc, template, tcount, true, 0); |
1156 | if (ret) | ||
1157 | return ret; | ||
1158 | |||
1159 | /* test unaligned buffers, check with one byte offset */ | ||
1160 | ret = __test_skcipher(tfm, enc, template, tcount, true, 1); | ||
1161 | if (ret) | ||
1162 | return ret; | ||
1163 | |||
1164 | alignmask = crypto_tfm_alg_alignmask(&tfm->base); | ||
1165 | if (alignmask) { | ||
1166 | /* Check if alignment mask for tfm is correctly set. */ | ||
1167 | ret = __test_skcipher(tfm, enc, template, tcount, true, | ||
1168 | alignmask + 1); | ||
1169 | if (ret) | ||
1170 | return ret; | ||
1171 | } | ||
1172 | |||
1173 | return 0; | ||
1087 | } | 1174 | } |
1088 | 1175 | ||
1089 | static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate, | 1176 | static int test_comp(struct crypto_comp *tfm, struct comp_testvec *ctemplate, |
@@ -1654,16 +1741,10 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
1654 | .alg = "__cbc-twofish-avx", | 1741 | .alg = "__cbc-twofish-avx", |
1655 | .test = alg_test_null, | 1742 | .test = alg_test_null, |
1656 | }, { | 1743 | }, { |
1657 | .alg = "__cbc-twofish-avx2", | ||
1658 | .test = alg_test_null, | ||
1659 | }, { | ||
1660 | .alg = "__driver-cbc-aes-aesni", | 1744 | .alg = "__driver-cbc-aes-aesni", |
1661 | .test = alg_test_null, | 1745 | .test = alg_test_null, |
1662 | .fips_allowed = 1, | 1746 | .fips_allowed = 1, |
1663 | }, { | 1747 | }, { |
1664 | .alg = "__driver-cbc-blowfish-avx2", | ||
1665 | .test = alg_test_null, | ||
1666 | }, { | ||
1667 | .alg = "__driver-cbc-camellia-aesni", | 1748 | .alg = "__driver-cbc-camellia-aesni", |
1668 | .test = alg_test_null, | 1749 | .test = alg_test_null, |
1669 | }, { | 1750 | }, { |
@@ -1688,16 +1769,10 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
1688 | .alg = "__driver-cbc-twofish-avx", | 1769 | .alg = "__driver-cbc-twofish-avx", |
1689 | .test = alg_test_null, | 1770 | .test = alg_test_null, |
1690 | }, { | 1771 | }, { |
1691 | .alg = "__driver-cbc-twofish-avx2", | ||
1692 | .test = alg_test_null, | ||
1693 | }, { | ||
1694 | .alg = "__driver-ecb-aes-aesni", | 1772 | .alg = "__driver-ecb-aes-aesni", |
1695 | .test = alg_test_null, | 1773 | .test = alg_test_null, |
1696 | .fips_allowed = 1, | 1774 | .fips_allowed = 1, |
1697 | }, { | 1775 | }, { |
1698 | .alg = "__driver-ecb-blowfish-avx2", | ||
1699 | .test = alg_test_null, | ||
1700 | }, { | ||
1701 | .alg = "__driver-ecb-camellia-aesni", | 1776 | .alg = "__driver-ecb-camellia-aesni", |
1702 | .test = alg_test_null, | 1777 | .test = alg_test_null, |
1703 | }, { | 1778 | }, { |
@@ -1722,9 +1797,6 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
1722 | .alg = "__driver-ecb-twofish-avx", | 1797 | .alg = "__driver-ecb-twofish-avx", |
1723 | .test = alg_test_null, | 1798 | .test = alg_test_null, |
1724 | }, { | 1799 | }, { |
1725 | .alg = "__driver-ecb-twofish-avx2", | ||
1726 | .test = alg_test_null, | ||
1727 | }, { | ||
1728 | .alg = "__ghash-pclmulqdqni", | 1800 | .alg = "__ghash-pclmulqdqni", |
1729 | .test = alg_test_null, | 1801 | .test = alg_test_null, |
1730 | .fips_allowed = 1, | 1802 | .fips_allowed = 1, |
@@ -1978,9 +2050,6 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
1978 | .test = alg_test_null, | 2050 | .test = alg_test_null, |
1979 | .fips_allowed = 1, | 2051 | .fips_allowed = 1, |
1980 | }, { | 2052 | }, { |
1981 | .alg = "cryptd(__driver-cbc-blowfish-avx2)", | ||
1982 | .test = alg_test_null, | ||
1983 | }, { | ||
1984 | .alg = "cryptd(__driver-cbc-camellia-aesni)", | 2053 | .alg = "cryptd(__driver-cbc-camellia-aesni)", |
1985 | .test = alg_test_null, | 2054 | .test = alg_test_null, |
1986 | }, { | 2055 | }, { |
@@ -1994,9 +2063,6 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
1994 | .test = alg_test_null, | 2063 | .test = alg_test_null, |
1995 | .fips_allowed = 1, | 2064 | .fips_allowed = 1, |
1996 | }, { | 2065 | }, { |
1997 | .alg = "cryptd(__driver-ecb-blowfish-avx2)", | ||
1998 | .test = alg_test_null, | ||
1999 | }, { | ||
2000 | .alg = "cryptd(__driver-ecb-camellia-aesni)", | 2066 | .alg = "cryptd(__driver-ecb-camellia-aesni)", |
2001 | .test = alg_test_null, | 2067 | .test = alg_test_null, |
2002 | }, { | 2068 | }, { |
@@ -2021,9 +2087,6 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
2021 | .alg = "cryptd(__driver-ecb-twofish-avx)", | 2087 | .alg = "cryptd(__driver-ecb-twofish-avx)", |
2022 | .test = alg_test_null, | 2088 | .test = alg_test_null, |
2023 | }, { | 2089 | }, { |
2024 | .alg = "cryptd(__driver-ecb-twofish-avx2)", | ||
2025 | .test = alg_test_null, | ||
2026 | }, { | ||
2027 | .alg = "cryptd(__driver-gcm-aes-aesni)", | 2090 | .alg = "cryptd(__driver-gcm-aes-aesni)", |
2028 | .test = alg_test_null, | 2091 | .test = alg_test_null, |
2029 | .fips_allowed = 1, | 2092 | .fips_allowed = 1, |
@@ -3068,6 +3131,35 @@ static const struct alg_test_desc alg_test_descs[] = { | |||
3068 | } | 3131 | } |
3069 | }; | 3132 | }; |
3070 | 3133 | ||
3134 | static bool alg_test_descs_checked; | ||
3135 | |||
3136 | static void alg_test_descs_check_order(void) | ||
3137 | { | ||
3138 | int i; | ||
3139 | |||
3140 | /* only check once */ | ||
3141 | if (alg_test_descs_checked) | ||
3142 | return; | ||
3143 | |||
3144 | alg_test_descs_checked = true; | ||
3145 | |||
3146 | for (i = 1; i < ARRAY_SIZE(alg_test_descs); i++) { | ||
3147 | int diff = strcmp(alg_test_descs[i - 1].alg, | ||
3148 | alg_test_descs[i].alg); | ||
3149 | |||
3150 | if (WARN_ON(diff > 0)) { | ||
3151 | pr_warn("testmgr: alg_test_descs entries in wrong order: '%s' before '%s'\n", | ||
3152 | alg_test_descs[i - 1].alg, | ||
3153 | alg_test_descs[i].alg); | ||
3154 | } | ||
3155 | |||
3156 | if (WARN_ON(diff == 0)) { | ||
3157 | pr_warn("testmgr: duplicate alg_test_descs entry: '%s'\n", | ||
3158 | alg_test_descs[i].alg); | ||
3159 | } | ||
3160 | } | ||
3161 | } | ||
3162 | |||
3071 | static int alg_find_test(const char *alg) | 3163 | static int alg_find_test(const char *alg) |
3072 | { | 3164 | { |
3073 | int start = 0; | 3165 | int start = 0; |
@@ -3099,6 +3191,8 @@ int alg_test(const char *driver, const char *alg, u32 type, u32 mask) | |||
3099 | int j; | 3191 | int j; |
3100 | int rc; | 3192 | int rc; |
3101 | 3193 | ||
3194 | alg_test_descs_check_order(); | ||
3195 | |||
3102 | if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) { | 3196 | if ((type & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_CIPHER) { |
3103 | char nalg[CRYPTO_MAX_ALG_NAME]; | 3197 | char nalg[CRYPTO_MAX_ALG_NAME]; |
3104 | 3198 | ||