tcrypt.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910
  1. /*
  2. * Quick & dirty crypto testing module.
  3. *
  4. * This will only exist until we have a better testing mechanism
  5. * (e.g. a char device).
  6. *
  7. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  8. * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
  9. *
  10. * This program is free software; you can redistribute it and/or modify it
  11. * under the terms of the GNU General Public License as published by the Free
  12. * Software Foundation; either version 2 of the License, or (at your option)
  13. * any later version.
  14. *
  15. * 14 - 09 - 2003
  16. * Rewritten by Kartikey Mahendra Bhatt
  17. */
  18. #include <linux/init.h>
  19. #include <linux/module.h>
  20. #include <linux/mm.h>
  21. #include <linux/slab.h>
  22. #include <asm/scatterlist.h>
  23. #include <linux/string.h>
  24. #include <linux/crypto.h>
  25. #include <linux/highmem.h>
  26. #include <linux/moduleparam.h>
  27. #include "tcrypt.h"
  28. /*
  29. * Need to kmalloc() memory for testing kmap().
  30. */
  31. #define TVMEMSIZE 4096
  32. #define XBUFSIZE 32768
  33. /*
  34. * Indexes into the xbuf to simulate cross-page access.
  35. */
  36. #define IDX1 37
  37. #define IDX2 32400
  38. #define IDX3 1
  39. #define IDX4 8193
  40. #define IDX5 22222
  41. #define IDX6 17101
  42. #define IDX7 27333
  43. #define IDX8 3000
  44. /*
  45. * Used by test_cipher()
  46. */
  47. #define ENCRYPT 1
  48. #define DECRYPT 0
  49. #define MODE_ECB 1
  50. #define MODE_CBC 0
  51. static unsigned int IDX[8] = { IDX1, IDX2, IDX3, IDX4, IDX5, IDX6, IDX7, IDX8 };
  52. static int mode;
  53. static char *xbuf;
  54. static char *tvmem;
  55. static char *check[] = {
  56. "des", "md5", "des3_ede", "rot13", "sha1", "sha256", "blowfish",
  57. "twofish", "serpent", "sha384", "sha512", "md4", "aes", "cast6",
  58. "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea",
  59. "khazad", "wp512", "wp384", "wp256", "tnepres", NULL
  60. };
  61. static void
  62. hexdump(unsigned char *buf, unsigned int len)
  63. {
  64. while (len--)
  65. printk("%02x", *buf++);
  66. printk("\n");
  67. }
  68. static void
  69. test_hash (char * algo, struct hash_testvec * template, unsigned int tcount)
  70. {
  71. char *p;
  72. unsigned int i, j, k, temp;
  73. struct scatterlist sg[8];
  74. char result[64];
  75. struct crypto_tfm *tfm;
  76. struct hash_testvec *hash_tv;
  77. unsigned int tsize;
  78. printk("\ntesting %s\n", algo);
  79. tsize = sizeof (struct hash_testvec);
  80. tsize *= tcount;
  81. if (tsize > TVMEMSIZE) {
  82. printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE);
  83. return;
  84. }
  85. memcpy(tvmem, template, tsize);
  86. hash_tv = (void *) tvmem;
  87. tfm = crypto_alloc_tfm(algo, 0);
  88. if (tfm == NULL) {
  89. printk("failed to load transform for %s\n", algo);
  90. return;
  91. }
  92. for (i = 0; i < tcount; i++) {
  93. printk ("test %u:\n", i + 1);
  94. memset (result, 0, 64);
  95. p = hash_tv[i].plaintext;
  96. sg[0].page = virt_to_page (p);
  97. sg[0].offset = offset_in_page (p);
  98. sg[0].length = hash_tv[i].psize;
  99. crypto_digest_init (tfm);
  100. if (tfm->crt_u.digest.dit_setkey) {
  101. crypto_digest_setkey (tfm, hash_tv[i].key,
  102. hash_tv[i].ksize);
  103. }
  104. crypto_digest_update (tfm, sg, 1);
  105. crypto_digest_final (tfm, result);
  106. hexdump (result, crypto_tfm_alg_digestsize (tfm));
  107. printk("%s\n",
  108. memcmp(result, hash_tv[i].digest,
  109. crypto_tfm_alg_digestsize(tfm)) ? "fail" :
  110. "pass");
  111. }
  112. printk ("testing %s across pages\n", algo);
  113. /* setup the dummy buffer first */
  114. memset(xbuf, 0, XBUFSIZE);
  115. j = 0;
  116. for (i = 0; i < tcount; i++) {
  117. if (hash_tv[i].np) {
  118. j++;
  119. printk ("test %u:\n", j);
  120. memset (result, 0, 64);
  121. temp = 0;
  122. for (k = 0; k < hash_tv[i].np; k++) {
  123. memcpy (&xbuf[IDX[k]], hash_tv[i].plaintext + temp,
  124. hash_tv[i].tap[k]);
  125. temp += hash_tv[i].tap[k];
  126. p = &xbuf[IDX[k]];
  127. sg[k].page = virt_to_page (p);
  128. sg[k].offset = offset_in_page (p);
  129. sg[k].length = hash_tv[i].tap[k];
  130. }
  131. crypto_digest_digest (tfm, sg, hash_tv[i].np, result);
  132. hexdump (result, crypto_tfm_alg_digestsize (tfm));
  133. printk("%s\n",
  134. memcmp(result, hash_tv[i].digest,
  135. crypto_tfm_alg_digestsize(tfm)) ? "fail" :
  136. "pass");
  137. }
  138. }
  139. crypto_free_tfm (tfm);
  140. }
  141. #ifdef CONFIG_CRYPTO_HMAC
  142. static void
  143. test_hmac(char *algo, struct hmac_testvec * template, unsigned int tcount)
  144. {
  145. char *p;
  146. unsigned int i, j, k, temp;
  147. struct scatterlist sg[8];
  148. char result[64];
  149. struct crypto_tfm *tfm;
  150. struct hmac_testvec *hmac_tv;
  151. unsigned int tsize, klen;
  152. tfm = crypto_alloc_tfm(algo, 0);
  153. if (tfm == NULL) {
  154. printk("failed to load transform for %s\n", algo);
  155. return;
  156. }
  157. printk("\ntesting hmac_%s\n", algo);
  158. tsize = sizeof (struct hmac_testvec);
  159. tsize *= tcount;
  160. if (tsize > TVMEMSIZE) {
  161. printk("template (%u) too big for tvmem (%u)\n", tsize,
  162. TVMEMSIZE);
  163. goto out;
  164. }
  165. memcpy(tvmem, template, tsize);
  166. hmac_tv = (void *) tvmem;
  167. for (i = 0; i < tcount; i++) {
  168. printk("test %u:\n", i + 1);
  169. memset(result, 0, sizeof (result));
  170. p = hmac_tv[i].plaintext;
  171. klen = hmac_tv[i].ksize;
  172. sg[0].page = virt_to_page(p);
  173. sg[0].offset = offset_in_page(p);
  174. sg[0].length = hmac_tv[i].psize;
  175. crypto_hmac(tfm, hmac_tv[i].key, &klen, sg, 1, result);
  176. hexdump(result, crypto_tfm_alg_digestsize(tfm));
  177. printk("%s\n",
  178. memcmp(result, hmac_tv[i].digest,
  179. crypto_tfm_alg_digestsize(tfm)) ? "fail" :
  180. "pass");
  181. }
  182. printk("\ntesting hmac_%s across pages\n", algo);
  183. memset(xbuf, 0, XBUFSIZE);
  184. j = 0;
  185. for (i = 0; i < tcount; i++) {
  186. if (hmac_tv[i].np) {
  187. j++;
  188. printk ("test %u:\n",j);
  189. memset (result, 0, 64);
  190. temp = 0;
  191. klen = hmac_tv[i].ksize;
  192. for (k = 0; k < hmac_tv[i].np; k++) {
  193. memcpy (&xbuf[IDX[k]], hmac_tv[i].plaintext + temp,
  194. hmac_tv[i].tap[k]);
  195. temp += hmac_tv[i].tap[k];
  196. p = &xbuf[IDX[k]];
  197. sg[k].page = virt_to_page (p);
  198. sg[k].offset = offset_in_page (p);
  199. sg[k].length = hmac_tv[i].tap[k];
  200. }
  201. crypto_hmac(tfm, hmac_tv[i].key, &klen, sg, hmac_tv[i].np,
  202. result);
  203. hexdump(result, crypto_tfm_alg_digestsize(tfm));
  204. printk("%s\n",
  205. memcmp(result, hmac_tv[i].digest,
  206. crypto_tfm_alg_digestsize(tfm)) ? "fail" :
  207. "pass");
  208. }
  209. }
  210. out:
  211. crypto_free_tfm(tfm);
  212. }
  213. #endif /* CONFIG_CRYPTO_HMAC */
  214. static void
  215. test_cipher(char * algo, int mode, int enc, struct cipher_testvec * template, unsigned int tcount)
  216. {
  217. unsigned int ret, i, j, k, temp;
  218. unsigned int tsize;
  219. char *p, *q;
  220. struct crypto_tfm *tfm;
  221. char *key;
  222. struct cipher_testvec *cipher_tv;
  223. struct scatterlist sg[8];
  224. char e[11], m[4];
  225. if (enc == ENCRYPT)
  226. strncpy(e, "encryption", 11);
  227. else
  228. strncpy(e, "decryption", 11);
  229. if (mode == MODE_ECB)
  230. strncpy(m, "ECB", 4);
  231. else
  232. strncpy(m, "CBC", 4);
  233. printk("\ntesting %s %s %s \n", algo, m, e);
  234. tsize = sizeof (struct cipher_testvec);
  235. tsize *= tcount;
  236. if (tsize > TVMEMSIZE) {
  237. printk("template (%u) too big for tvmem (%u)\n", tsize,
  238. TVMEMSIZE);
  239. return;
  240. }
  241. memcpy(tvmem, template, tsize);
  242. cipher_tv = (void *) tvmem;
  243. if (mode)
  244. tfm = crypto_alloc_tfm (algo, 0);
  245. else
  246. tfm = crypto_alloc_tfm (algo, CRYPTO_TFM_MODE_CBC);
  247. if (tfm == NULL) {
  248. printk("failed to load transform for %s %s\n", algo, m);
  249. return;
  250. }
  251. j = 0;
  252. for (i = 0; i < tcount; i++) {
  253. if (!(cipher_tv[i].np)) {
  254. j++;
  255. printk("test %u (%d bit key):\n",
  256. j, cipher_tv[i].klen * 8);
  257. tfm->crt_flags = 0;
  258. if (cipher_tv[i].wk)
  259. tfm->crt_flags |= CRYPTO_TFM_REQ_WEAK_KEY;
  260. key = cipher_tv[i].key;
  261. ret = crypto_cipher_setkey(tfm, key, cipher_tv[i].klen);
  262. if (ret) {
  263. printk("setkey() failed flags=%x\n", tfm->crt_flags);
  264. if (!cipher_tv[i].fail)
  265. goto out;
  266. }
  267. p = cipher_tv[i].input;
  268. sg[0].page = virt_to_page(p);
  269. sg[0].offset = offset_in_page(p);
  270. sg[0].length = cipher_tv[i].ilen;
  271. if (!mode) {
  272. crypto_cipher_set_iv(tfm, cipher_tv[i].iv,
  273. crypto_tfm_alg_ivsize (tfm));
  274. }
  275. if (enc)
  276. ret = crypto_cipher_encrypt(tfm, sg, sg, cipher_tv[i].ilen);
  277. else
  278. ret = crypto_cipher_decrypt(tfm, sg, sg, cipher_tv[i].ilen);
  279. if (ret) {
  280. printk("%s () failed flags=%x\n", e, tfm->crt_flags);
  281. goto out;
  282. }
  283. q = kmap(sg[0].page) + sg[0].offset;
  284. hexdump(q, cipher_tv[i].rlen);
  285. printk("%s\n",
  286. memcmp(q, cipher_tv[i].result, cipher_tv[i].rlen) ? "fail" :
  287. "pass");
  288. }
  289. }
  290. printk("\ntesting %s %s %s across pages (chunking) \n", algo, m, e);
  291. memset(xbuf, 0, XBUFSIZE);
  292. j = 0;
  293. for (i = 0; i < tcount; i++) {
  294. if (cipher_tv[i].np) {
  295. j++;
  296. printk("test %u (%d bit key):\n",
  297. j, cipher_tv[i].klen * 8);
  298. tfm->crt_flags = 0;
  299. if (cipher_tv[i].wk)
  300. tfm->crt_flags |= CRYPTO_TFM_REQ_WEAK_KEY;
  301. key = cipher_tv[i].key;
  302. ret = crypto_cipher_setkey(tfm, key, cipher_tv[i].klen);
  303. if (ret) {
  304. printk("setkey() failed flags=%x\n", tfm->crt_flags);
  305. if (!cipher_tv[i].fail)
  306. goto out;
  307. }
  308. temp = 0;
  309. for (k = 0; k < cipher_tv[i].np; k++) {
  310. memcpy (&xbuf[IDX[k]], cipher_tv[i].input + temp,
  311. cipher_tv[i].tap[k]);
  312. temp += cipher_tv[i].tap[k];
  313. p = &xbuf[IDX[k]];
  314. sg[k].page = virt_to_page (p);
  315. sg[k].offset = offset_in_page (p);
  316. sg[k].length = cipher_tv[i].tap[k];
  317. }
  318. if (!mode) {
  319. crypto_cipher_set_iv(tfm, cipher_tv[i].iv,
  320. crypto_tfm_alg_ivsize (tfm));
  321. }
  322. if (enc)
  323. ret = crypto_cipher_encrypt(tfm, sg, sg, cipher_tv[i].ilen);
  324. else
  325. ret = crypto_cipher_decrypt(tfm, sg, sg, cipher_tv[i].ilen);
  326. if (ret) {
  327. printk("%s () failed flags=%x\n", e, tfm->crt_flags);
  328. goto out;
  329. }
  330. temp = 0;
  331. for (k = 0; k < cipher_tv[i].np; k++) {
  332. printk("page %u\n", k);
  333. q = kmap(sg[k].page) + sg[k].offset;
  334. hexdump(q, cipher_tv[i].tap[k]);
  335. printk("%s\n",
  336. memcmp(q, cipher_tv[i].result + temp,
  337. cipher_tv[i].tap[k]) ? "fail" :
  338. "pass");
  339. temp += cipher_tv[i].tap[k];
  340. }
  341. }
  342. }
  343. out:
  344. crypto_free_tfm(tfm);
  345. }
  346. static void
  347. test_deflate(void)
  348. {
  349. unsigned int i;
  350. char result[COMP_BUF_SIZE];
  351. struct crypto_tfm *tfm;
  352. struct comp_testvec *tv;
  353. unsigned int tsize;
  354. printk("\ntesting deflate compression\n");
  355. tsize = sizeof (deflate_comp_tv_template);
  356. if (tsize > TVMEMSIZE) {
  357. printk("template (%u) too big for tvmem (%u)\n", tsize,
  358. TVMEMSIZE);
  359. return;
  360. }
  361. memcpy(tvmem, deflate_comp_tv_template, tsize);
  362. tv = (void *) tvmem;
  363. tfm = crypto_alloc_tfm("deflate", 0);
  364. if (tfm == NULL) {
  365. printk("failed to load transform for deflate\n");
  366. return;
  367. }
  368. for (i = 0; i < DEFLATE_COMP_TEST_VECTORS; i++) {
  369. int ilen, ret, dlen = COMP_BUF_SIZE;
  370. printk("test %u:\n", i + 1);
  371. memset(result, 0, sizeof (result));
  372. ilen = tv[i].inlen;
  373. ret = crypto_comp_compress(tfm, tv[i].input,
  374. ilen, result, &dlen);
  375. if (ret) {
  376. printk("fail: ret=%d\n", ret);
  377. continue;
  378. }
  379. hexdump(result, dlen);
  380. printk("%s (ratio %d:%d)\n",
  381. memcmp(result, tv[i].output, dlen) ? "fail" : "pass",
  382. ilen, dlen);
  383. }
  384. printk("\ntesting deflate decompression\n");
  385. tsize = sizeof (deflate_decomp_tv_template);
  386. if (tsize > TVMEMSIZE) {
  387. printk("template (%u) too big for tvmem (%u)\n", tsize,
  388. TVMEMSIZE);
  389. goto out;
  390. }
  391. memcpy(tvmem, deflate_decomp_tv_template, tsize);
  392. tv = (void *) tvmem;
  393. for (i = 0; i < DEFLATE_DECOMP_TEST_VECTORS; i++) {
  394. int ilen, ret, dlen = COMP_BUF_SIZE;
  395. printk("test %u:\n", i + 1);
  396. memset(result, 0, sizeof (result));
  397. ilen = tv[i].inlen;
  398. ret = crypto_comp_decompress(tfm, tv[i].input,
  399. ilen, result, &dlen);
  400. if (ret) {
  401. printk("fail: ret=%d\n", ret);
  402. continue;
  403. }
  404. hexdump(result, dlen);
  405. printk("%s (ratio %d:%d)\n",
  406. memcmp(result, tv[i].output, dlen) ? "fail" : "pass",
  407. ilen, dlen);
  408. }
  409. out:
  410. crypto_free_tfm(tfm);
  411. }
  412. static void
  413. test_crc32c(void)
  414. {
  415. #define NUMVEC 6
  416. #define VECSIZE 40
  417. int i, j, pass;
  418. u32 crc;
  419. u8 b, test_vec[NUMVEC][VECSIZE];
  420. static u32 vec_results[NUMVEC] = {
  421. 0x0e2c157f, 0xe980ebf6, 0xde74bded,
  422. 0xd579c862, 0xba979ad0, 0x2b29d913
  423. };
  424. static u32 tot_vec_results = 0x24c5d375;
  425. struct scatterlist sg[NUMVEC];
  426. struct crypto_tfm *tfm;
  427. char *fmtdata = "testing crc32c initialized to %08x: %s\n";
  428. #define SEEDTESTVAL 0xedcba987
  429. u32 seed;
  430. printk("\ntesting crc32c\n");
  431. tfm = crypto_alloc_tfm("crc32c", 0);
  432. if (tfm == NULL) {
  433. printk("failed to load transform for crc32c\n");
  434. return;
  435. }
  436. crypto_digest_init(tfm);
  437. crypto_digest_final(tfm, (u8*)&crc);
  438. printk(fmtdata, crc, (crc == 0) ? "pass" : "ERROR");
  439. /*
  440. * stuff test_vec with known values, simple incrementing
  441. * byte values.
  442. */
  443. b = 0;
  444. for (i = 0; i < NUMVEC; i++) {
  445. for (j = 0; j < VECSIZE; j++)
  446. test_vec[i][j] = ++b;
  447. sg[i].page = virt_to_page(test_vec[i]);
  448. sg[i].offset = offset_in_page(test_vec[i]);
  449. sg[i].length = VECSIZE;
  450. }
  451. seed = SEEDTESTVAL;
  452. (void)crypto_digest_setkey(tfm, (const u8*)&seed, sizeof(u32));
  453. crypto_digest_final(tfm, (u8*)&crc);
  454. printk("testing crc32c setkey returns %08x : %s\n", crc, (crc == (SEEDTESTVAL ^ ~(u32)0)) ?
  455. "pass" : "ERROR");
  456. printk("testing crc32c using update/final:\n");
  457. pass = 1; /* assume all is well */
  458. for (i = 0; i < NUMVEC; i++) {
  459. seed = ~(u32)0;
  460. (void)crypto_digest_setkey(tfm, (const u8*)&seed, sizeof(u32));
  461. crypto_digest_update(tfm, &sg[i], 1);
  462. crypto_digest_final(tfm, (u8*)&crc);
  463. if (crc == vec_results[i]) {
  464. printk(" %08x:OK", crc);
  465. } else {
  466. printk(" %08x:BAD, wanted %08x\n", crc, vec_results[i]);
  467. pass = 0;
  468. }
  469. }
  470. printk("\ntesting crc32c using incremental accumulator:\n");
  471. crc = 0;
  472. for (i = 0; i < NUMVEC; i++) {
  473. seed = (crc ^ ~(u32)0);
  474. (void)crypto_digest_setkey(tfm, (const u8*)&seed, sizeof(u32));
  475. crypto_digest_update(tfm, &sg[i], 1);
  476. crypto_digest_final(tfm, (u8*)&crc);
  477. }
  478. if (crc == tot_vec_results) {
  479. printk(" %08x:OK", crc);
  480. } else {
  481. printk(" %08x:BAD, wanted %08x\n", crc, tot_vec_results);
  482. pass = 0;
  483. }
  484. printk("\ntesting crc32c using digest:\n");
  485. seed = ~(u32)0;
  486. (void)crypto_digest_setkey(tfm, (const u8*)&seed, sizeof(u32));
  487. crypto_digest_digest(tfm, sg, NUMVEC, (u8*)&crc);
  488. if (crc == tot_vec_results) {
  489. printk(" %08x:OK", crc);
  490. } else {
  491. printk(" %08x:BAD, wanted %08x\n", crc, tot_vec_results);
  492. pass = 0;
  493. }
  494. printk("\n%s\n", pass ? "pass" : "ERROR");
  495. crypto_free_tfm(tfm);
  496. printk("crc32c test complete\n");
  497. }
  498. static void
  499. test_available(void)
  500. {
  501. char **name = check;
  502. while (*name) {
  503. printk("alg %s ", *name);
  504. printk((crypto_alg_available(*name, 0)) ?
  505. "found\n" : "not found\n");
  506. name++;
  507. }
  508. }
  509. static void
  510. do_test(void)
  511. {
  512. switch (mode) {
  513. case 0:
  514. test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
  515. test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
  516. //DES
  517. test_cipher ("des", MODE_ECB, ENCRYPT, des_enc_tv_template, DES_ENC_TEST_VECTORS);
  518. test_cipher ("des", MODE_ECB, DECRYPT, des_dec_tv_template, DES_DEC_TEST_VECTORS);
  519. test_cipher ("des", MODE_CBC, ENCRYPT, des_cbc_enc_tv_template, DES_CBC_ENC_TEST_VECTORS);
  520. test_cipher ("des", MODE_CBC, DECRYPT, des_cbc_dec_tv_template, DES_CBC_DEC_TEST_VECTORS);
  521. //DES3_EDE
  522. test_cipher ("des3_ede", MODE_ECB, ENCRYPT, des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS);
  523. test_cipher ("des3_ede", MODE_ECB, DECRYPT, des3_ede_dec_tv_template, DES3_EDE_DEC_TEST_VECTORS);
  524. test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
  525. test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
  526. //BLOWFISH
  527. test_cipher ("blowfish", MODE_ECB, ENCRYPT, bf_enc_tv_template, BF_ENC_TEST_VECTORS);
  528. test_cipher ("blowfish", MODE_ECB, DECRYPT, bf_dec_tv_template, BF_DEC_TEST_VECTORS);
  529. test_cipher ("blowfish", MODE_CBC, ENCRYPT, bf_cbc_enc_tv_template, BF_CBC_ENC_TEST_VECTORS);
  530. test_cipher ("blowfish", MODE_CBC, DECRYPT, bf_cbc_dec_tv_template, BF_CBC_DEC_TEST_VECTORS);
  531. //TWOFISH
  532. test_cipher ("twofish", MODE_ECB, ENCRYPT, tf_enc_tv_template, TF_ENC_TEST_VECTORS);
  533. test_cipher ("twofish", MODE_ECB, DECRYPT, tf_dec_tv_template, TF_DEC_TEST_VECTORS);
  534. test_cipher ("twofish", MODE_CBC, ENCRYPT, tf_cbc_enc_tv_template, TF_CBC_ENC_TEST_VECTORS);
  535. test_cipher ("twofish", MODE_CBC, DECRYPT, tf_cbc_dec_tv_template, TF_CBC_DEC_TEST_VECTORS);
  536. //SERPENT
  537. test_cipher ("serpent", MODE_ECB, ENCRYPT, serpent_enc_tv_template, SERPENT_ENC_TEST_VECTORS);
  538. test_cipher ("serpent", MODE_ECB, DECRYPT, serpent_dec_tv_template, SERPENT_DEC_TEST_VECTORS);
  539. //TNEPRES
  540. test_cipher ("tnepres", MODE_ECB, ENCRYPT, tnepres_enc_tv_template, TNEPRES_ENC_TEST_VECTORS);
  541. test_cipher ("tnepres", MODE_ECB, DECRYPT, tnepres_dec_tv_template, TNEPRES_DEC_TEST_VECTORS);
  542. //AES
  543. test_cipher ("aes", MODE_ECB, ENCRYPT, aes_enc_tv_template, AES_ENC_TEST_VECTORS);
  544. test_cipher ("aes", MODE_ECB, DECRYPT, aes_dec_tv_template, AES_DEC_TEST_VECTORS);
  545. //CAST5
  546. test_cipher ("cast5", MODE_ECB, ENCRYPT, cast5_enc_tv_template, CAST5_ENC_TEST_VECTORS);
  547. test_cipher ("cast5", MODE_ECB, DECRYPT, cast5_dec_tv_template, CAST5_DEC_TEST_VECTORS);
  548. //CAST6
  549. test_cipher ("cast6", MODE_ECB, ENCRYPT, cast6_enc_tv_template, CAST6_ENC_TEST_VECTORS);
  550. test_cipher ("cast6", MODE_ECB, DECRYPT, cast6_dec_tv_template, CAST6_DEC_TEST_VECTORS);
  551. //ARC4
  552. test_cipher ("arc4", MODE_ECB, ENCRYPT, arc4_enc_tv_template, ARC4_ENC_TEST_VECTORS);
  553. test_cipher ("arc4", MODE_ECB, DECRYPT, arc4_dec_tv_template, ARC4_DEC_TEST_VECTORS);
  554. //TEA
  555. test_cipher ("tea", MODE_ECB, ENCRYPT, tea_enc_tv_template, TEA_ENC_TEST_VECTORS);
  556. test_cipher ("tea", MODE_ECB, DECRYPT, tea_dec_tv_template, TEA_DEC_TEST_VECTORS);
  557. //XTEA
  558. test_cipher ("xtea", MODE_ECB, ENCRYPT, xtea_enc_tv_template, XTEA_ENC_TEST_VECTORS);
  559. test_cipher ("xtea", MODE_ECB, DECRYPT, xtea_dec_tv_template, XTEA_DEC_TEST_VECTORS);
  560. //KHAZAD
  561. test_cipher ("khazad", MODE_ECB, ENCRYPT, khazad_enc_tv_template, KHAZAD_ENC_TEST_VECTORS);
  562. test_cipher ("khazad", MODE_ECB, DECRYPT, khazad_dec_tv_template, KHAZAD_DEC_TEST_VECTORS);
  563. //ANUBIS
  564. test_cipher ("anubis", MODE_ECB, ENCRYPT, anubis_enc_tv_template, ANUBIS_ENC_TEST_VECTORS);
  565. test_cipher ("anubis", MODE_ECB, DECRYPT, anubis_dec_tv_template, ANUBIS_DEC_TEST_VECTORS);
  566. test_cipher ("anubis", MODE_CBC, ENCRYPT, anubis_cbc_enc_tv_template, ANUBIS_CBC_ENC_TEST_VECTORS);
  567. test_cipher ("anubis", MODE_CBC, DECRYPT, anubis_cbc_dec_tv_template, ANUBIS_CBC_ENC_TEST_VECTORS);
  568. test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
  569. test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
  570. test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
  571. test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
  572. test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
  573. test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
  574. test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
  575. test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
  576. test_deflate();
  577. test_crc32c();
  578. #ifdef CONFIG_CRYPTO_HMAC
  579. test_hmac("md5", hmac_md5_tv_template, HMAC_MD5_TEST_VECTORS);
  580. test_hmac("sha1", hmac_sha1_tv_template, HMAC_SHA1_TEST_VECTORS);
  581. test_hmac("sha256", hmac_sha256_tv_template, HMAC_SHA256_TEST_VECTORS);
  582. #endif
  583. test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
  584. break;
  585. case 1:
  586. test_hash("md5", md5_tv_template, MD5_TEST_VECTORS);
  587. break;
  588. case 2:
  589. test_hash("sha1", sha1_tv_template, SHA1_TEST_VECTORS);
  590. break;
  591. case 3:
  592. test_cipher ("des", MODE_ECB, ENCRYPT, des_enc_tv_template, DES_ENC_TEST_VECTORS);
  593. test_cipher ("des", MODE_ECB, DECRYPT, des_dec_tv_template, DES_DEC_TEST_VECTORS);
  594. test_cipher ("des", MODE_CBC, ENCRYPT, des_cbc_enc_tv_template, DES_CBC_ENC_TEST_VECTORS);
  595. test_cipher ("des", MODE_CBC, DECRYPT, des_cbc_dec_tv_template, DES_CBC_DEC_TEST_VECTORS);
  596. break;
  597. case 4:
  598. test_cipher ("des3_ede", MODE_ECB, ENCRYPT, des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS);
  599. test_cipher ("des3_ede", MODE_ECB, DECRYPT, des3_ede_dec_tv_template, DES3_EDE_DEC_TEST_VECTORS);
  600. break;
  601. case 5:
  602. test_hash("md4", md4_tv_template, MD4_TEST_VECTORS);
  603. break;
  604. case 6:
  605. test_hash("sha256", sha256_tv_template, SHA256_TEST_VECTORS);
  606. break;
  607. case 7:
  608. test_cipher ("blowfish", MODE_ECB, ENCRYPT, bf_enc_tv_template, BF_ENC_TEST_VECTORS);
  609. test_cipher ("blowfish", MODE_ECB, DECRYPT, bf_dec_tv_template, BF_DEC_TEST_VECTORS);
  610. test_cipher ("blowfish", MODE_CBC, ENCRYPT, bf_cbc_enc_tv_template, BF_CBC_ENC_TEST_VECTORS);
  611. test_cipher ("blowfish", MODE_CBC, DECRYPT, bf_cbc_dec_tv_template, BF_CBC_DEC_TEST_VECTORS);
  612. break;
  613. case 8:
  614. test_cipher ("twofish", MODE_ECB, ENCRYPT, tf_enc_tv_template, TF_ENC_TEST_VECTORS);
  615. test_cipher ("twofish", MODE_ECB, DECRYPT, tf_dec_tv_template, TF_DEC_TEST_VECTORS);
  616. test_cipher ("twofish", MODE_CBC, ENCRYPT, tf_cbc_enc_tv_template, TF_CBC_ENC_TEST_VECTORS);
  617. test_cipher ("twofish", MODE_CBC, DECRYPT, tf_cbc_dec_tv_template, TF_CBC_DEC_TEST_VECTORS);
  618. break;
  619. case 9:
  620. test_cipher ("serpent", MODE_ECB, ENCRYPT, serpent_enc_tv_template, SERPENT_ENC_TEST_VECTORS);
  621. test_cipher ("serpent", MODE_ECB, DECRYPT, serpent_dec_tv_template, SERPENT_DEC_TEST_VECTORS);
  622. break;
  623. case 10:
  624. test_cipher ("aes", MODE_ECB, ENCRYPT, aes_enc_tv_template, AES_ENC_TEST_VECTORS);
  625. test_cipher ("aes", MODE_ECB, DECRYPT, aes_dec_tv_template, AES_DEC_TEST_VECTORS);
  626. break;
  627. case 11:
  628. test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS);
  629. break;
  630. case 12:
  631. test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS);
  632. break;
  633. case 13:
  634. test_deflate();
  635. break;
  636. case 14:
  637. test_cipher ("cast5", MODE_ECB, ENCRYPT, cast5_enc_tv_template, CAST5_ENC_TEST_VECTORS);
  638. test_cipher ("cast5", MODE_ECB, DECRYPT, cast5_dec_tv_template, CAST5_DEC_TEST_VECTORS);
  639. break;
  640. case 15:
  641. test_cipher ("cast6", MODE_ECB, ENCRYPT, cast6_enc_tv_template, CAST6_ENC_TEST_VECTORS);
  642. test_cipher ("cast6", MODE_ECB, DECRYPT, cast6_dec_tv_template, CAST6_DEC_TEST_VECTORS);
  643. break;
  644. case 16:
  645. test_cipher ("arc4", MODE_ECB, ENCRYPT, arc4_enc_tv_template, ARC4_ENC_TEST_VECTORS);
  646. test_cipher ("arc4", MODE_ECB, DECRYPT, arc4_dec_tv_template, ARC4_DEC_TEST_VECTORS);
  647. break;
  648. case 17:
  649. test_hash("michael_mic", michael_mic_tv_template, MICHAEL_MIC_TEST_VECTORS);
  650. break;
  651. case 18:
  652. test_crc32c();
  653. break;
  654. case 19:
  655. test_cipher ("tea", MODE_ECB, ENCRYPT, tea_enc_tv_template, TEA_ENC_TEST_VECTORS);
  656. test_cipher ("tea", MODE_ECB, DECRYPT, tea_dec_tv_template, TEA_DEC_TEST_VECTORS);
  657. break;
  658. case 20:
  659. test_cipher ("xtea", MODE_ECB, ENCRYPT, xtea_enc_tv_template, XTEA_ENC_TEST_VECTORS);
  660. test_cipher ("xtea", MODE_ECB, DECRYPT, xtea_dec_tv_template, XTEA_DEC_TEST_VECTORS);
  661. break;
  662. case 21:
  663. test_cipher ("khazad", MODE_ECB, ENCRYPT, khazad_enc_tv_template, KHAZAD_ENC_TEST_VECTORS);
  664. test_cipher ("khazad", MODE_ECB, DECRYPT, khazad_dec_tv_template, KHAZAD_DEC_TEST_VECTORS);
  665. break;
  666. case 22:
  667. test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS);
  668. break;
  669. case 23:
  670. test_hash("wp384", wp384_tv_template, WP384_TEST_VECTORS);
  671. break;
  672. case 24:
  673. test_hash("wp256", wp256_tv_template, WP256_TEST_VECTORS);
  674. break;
  675. case 25:
  676. test_cipher ("tnepres", MODE_ECB, ENCRYPT, tnepres_enc_tv_template, TNEPRES_ENC_TEST_VECTORS);
  677. test_cipher ("tnepres", MODE_ECB, DECRYPT, tnepres_dec_tv_template, TNEPRES_DEC_TEST_VECTORS);
  678. break;
  679. case 26:
  680. test_cipher ("anubis", MODE_ECB, ENCRYPT, anubis_enc_tv_template, ANUBIS_ENC_TEST_VECTORS);
  681. test_cipher ("anubis", MODE_ECB, DECRYPT, anubis_dec_tv_template, ANUBIS_DEC_TEST_VECTORS);
  682. test_cipher ("anubis", MODE_CBC, ENCRYPT, anubis_cbc_enc_tv_template, ANUBIS_CBC_ENC_TEST_VECTORS);
  683. test_cipher ("anubis", MODE_CBC, DECRYPT, anubis_cbc_dec_tv_template, ANUBIS_CBC_ENC_TEST_VECTORS);
  684. break;
  685. case 27:
  686. test_hash("tgr192", tgr192_tv_template, TGR192_TEST_VECTORS);
  687. break;
  688. case 28:
  689. test_hash("tgr160", tgr160_tv_template, TGR160_TEST_VECTORS);
  690. break;
  691. case 29:
  692. test_hash("tgr128", tgr128_tv_template, TGR128_TEST_VECTORS);
  693. break;
  694. #ifdef CONFIG_CRYPTO_HMAC
  695. case 100:
  696. test_hmac("md5", hmac_md5_tv_template, HMAC_MD5_TEST_VECTORS);
  697. break;
  698. case 101:
  699. test_hmac("sha1", hmac_sha1_tv_template, HMAC_SHA1_TEST_VECTORS);
  700. break;
  701. case 102:
  702. test_hmac("sha256", hmac_sha256_tv_template, HMAC_SHA256_TEST_VECTORS);
  703. break;
  704. #endif
  705. case 1000:
  706. test_available();
  707. break;
  708. default:
  709. /* useful for debugging */
  710. printk("not testing anything\n");
  711. break;
  712. }
  713. }
  714. static int __init
  715. init(void)
  716. {
  717. tvmem = kmalloc(TVMEMSIZE, GFP_KERNEL);
  718. if (tvmem == NULL)
  719. return -ENOMEM;
  720. xbuf = kmalloc(XBUFSIZE, GFP_KERNEL);
  721. if (xbuf == NULL) {
  722. kfree(tvmem);
  723. return -ENOMEM;
  724. }
  725. do_test();
  726. kfree(xbuf);
  727. kfree(tvmem);
  728. return 0;
  729. }
  730. /*
  731. * If an init function is provided, an exit function must also be provided
  732. * to allow module unload.
  733. */
  734. static void __exit fini(void) { }
  735. module_init(init);
  736. module_exit(fini);
  737. module_param(mode, int, 0);
  738. MODULE_LICENSE("GPL");
  739. MODULE_DESCRIPTION("Quick & dirty crypto testing module");
  740. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");