Lines Matching refs:vec

1036 			     const struct hash_testvec *vec,  in build_hash_sglist()  argument
1044 kv.iov_base = (void *)vec->plaintext; in build_hash_sglist()
1045 kv.iov_len = vec->psize; in build_hash_sglist()
1046 iov_iter_kvec(&input, WRITE, &kv, 1, vec->psize); in build_hash_sglist()
1047 return build_test_sglist(tsgl, cfg->src_divs, alignmask, vec->psize, in build_hash_sglist()
1053 const struct hash_testvec *vec, in check_hash_result() argument
1058 if (memcmp(result, vec->digest, digestsize) != 0) { in check_hash_result()
1088 const struct hash_testvec *vec, in test_shash_vec_cfg() argument
1105 if (vec->ksize) { in test_shash_vec_cfg()
1106 err = crypto_shash_setkey(tfm, vec->key, vec->ksize); in test_shash_vec_cfg()
1108 if (err == vec->setkey_error) in test_shash_vec_cfg()
1111 driver, vec_name, vec->setkey_error, err, in test_shash_vec_cfg()
1115 if (vec->setkey_error) { in test_shash_vec_cfg()
1117 driver, vec_name, vec->setkey_error); in test_shash_vec_cfg()
1123 err = build_hash_sglist(tsgl, vec, cfg, alignmask, divs); in test_shash_vec_cfg()
1136 vec->digest_error) { in test_shash_vec_cfg()
1147 if (err == vec->digest_error) in test_shash_vec_cfg()
1150 driver, vec_name, vec->digest_error, err, in test_shash_vec_cfg()
1154 if (vec->digest_error) { in test_shash_vec_cfg()
1156 driver, vec_name, vec->digest_error, cfg->name); in test_shash_vec_cfg()
1230 return check_hash_result("shash", result, digestsize, vec, vec_name, in test_shash_vec_cfg()
1271 const struct hash_testvec *vec, in test_ahash_vec_cfg() argument
1292 if (vec->ksize) { in test_ahash_vec_cfg()
1293 err = crypto_ahash_setkey(tfm, vec->key, vec->ksize); in test_ahash_vec_cfg()
1295 if (err == vec->setkey_error) in test_ahash_vec_cfg()
1298 driver, vec_name, vec->setkey_error, err, in test_ahash_vec_cfg()
1302 if (vec->setkey_error) { in test_ahash_vec_cfg()
1304 driver, vec_name, vec->setkey_error); in test_ahash_vec_cfg()
1310 err = build_hash_sglist(tsgl, vec, cfg, alignmask, divs); in test_ahash_vec_cfg()
1323 vec->digest_error) { in test_ahash_vec_cfg()
1327 ahash_request_set_crypt(req, tsgl->sgl, result, vec->psize); in test_ahash_vec_cfg()
1330 if (err == vec->digest_error) in test_ahash_vec_cfg()
1333 driver, vec_name, vec->digest_error, err, in test_ahash_vec_cfg()
1337 if (vec->digest_error) { in test_ahash_vec_cfg()
1339 driver, vec_name, vec->digest_error, cfg->name); in test_ahash_vec_cfg()
1431 return check_hash_result("ahash", result, digestsize, vec, vec_name, in test_ahash_vec_cfg()
1436 const struct hash_testvec *vec, in test_hash_vec_cfg() argument
1453 err = test_shash_vec_cfg(driver, vec, vec_name, cfg, desc, tsgl, in test_hash_vec_cfg()
1459 return test_ahash_vec_cfg(driver, vec, vec_name, cfg, req, tsgl, in test_hash_vec_cfg()
1463 static int test_hash_vec(const char *driver, const struct hash_testvec *vec, in test_hash_vec() argument
1475 err = test_hash_vec_cfg(driver, vec, vec_name, in test_hash_vec()
1490 err = test_hash_vec_cfg(driver, vec, vec_name, &cfg, in test_hash_vec()
1507 struct hash_testvec *vec, in generate_random_hash_testvec() argument
1513 vec->psize = generate_random_length(maxdatasize); in generate_random_hash_testvec()
1514 generate_random_bytes((u8 *)vec->plaintext, vec->psize); in generate_random_hash_testvec()
1520 vec->setkey_error = 0; in generate_random_hash_testvec()
1521 vec->ksize = 0; in generate_random_hash_testvec()
1523 vec->ksize = maxkeysize; in generate_random_hash_testvec()
1525 vec->ksize = 1 + (prandom_u32() % maxkeysize); in generate_random_hash_testvec()
1526 generate_random_bytes((u8 *)vec->key, vec->ksize); in generate_random_hash_testvec()
1528 vec->setkey_error = crypto_shash_setkey(desc->tfm, vec->key, in generate_random_hash_testvec()
1529 vec->ksize); in generate_random_hash_testvec()
1531 if (vec->setkey_error) in generate_random_hash_testvec()
1536 vec->digest_error = crypto_shash_digest(desc, vec->plaintext, in generate_random_hash_testvec()
1537 vec->psize, (u8 *)vec->digest); in generate_random_hash_testvec()
1540 vec->psize, vec->ksize); in generate_random_hash_testvec()
1564 struct hash_testvec vec = { 0 }; in test_hash_vs_generic_impl() local
1632 vec.key = kmalloc(maxkeysize, GFP_KERNEL); in test_hash_vs_generic_impl()
1633 vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL); in test_hash_vs_generic_impl()
1634 vec.digest = kmalloc(digestsize, GFP_KERNEL); in test_hash_vs_generic_impl()
1635 if (!vec.key || !vec.plaintext || !vec.digest) { in test_hash_vs_generic_impl()
1641 generate_random_hash_testvec(generic_desc, &vec, in test_hash_vs_generic_impl()
1646 err = test_hash_vec_cfg(driver, &vec, vec_name, cfg, in test_hash_vs_generic_impl()
1655 kfree(vec.key); in test_hash_vs_generic_impl()
1656 kfree(vec.plaintext); in test_hash_vs_generic_impl()
1657 kfree(vec.digest); in test_hash_vs_generic_impl()
1838 const struct aead_testvec *vec, in test_aead_vec_cfg() argument
1847 const unsigned int authsize = vec->clen - vec->plen; in test_aead_vec_cfg()
1860 if (vec->wk) in test_aead_vec_cfg()
1864 err = crypto_aead_setkey(tfm, vec->key, vec->klen); in test_aead_vec_cfg()
1865 if (err && err != vec->setkey_error) { in test_aead_vec_cfg()
1867 driver, vec_name, vec->setkey_error, err, in test_aead_vec_cfg()
1871 if (!err && vec->setkey_error) { in test_aead_vec_cfg()
1873 driver, vec_name, vec->setkey_error); in test_aead_vec_cfg()
1879 if (err && err != vec->setauthsize_error) { in test_aead_vec_cfg()
1881 driver, vec_name, vec->setauthsize_error, err); in test_aead_vec_cfg()
1884 if (!err && vec->setauthsize_error) { in test_aead_vec_cfg()
1886 driver, vec_name, vec->setauthsize_error); in test_aead_vec_cfg()
1890 if (vec->setkey_error || vec->setauthsize_error) in test_aead_vec_cfg()
1896 if (vec->iv) in test_aead_vec_cfg()
1897 memcpy(iv, vec->iv, ivsize); in test_aead_vec_cfg()
1902 input[0].iov_base = (void *)vec->assoc; in test_aead_vec_cfg()
1903 input[0].iov_len = vec->alen; in test_aead_vec_cfg()
1904 input[1].iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext; in test_aead_vec_cfg()
1905 input[1].iov_len = enc ? vec->plen : vec->clen; in test_aead_vec_cfg()
1907 vec->alen + (enc ? vec->plen : in test_aead_vec_cfg()
1908 vec->clen), in test_aead_vec_cfg()
1909 vec->alen + (enc ? vec->clen : in test_aead_vec_cfg()
1910 vec->plen), in test_aead_vec_cfg()
1922 enc ? vec->plen : vec->clen, iv); in test_aead_vec_cfg()
1923 aead_request_set_ad(req, vec->alen); in test_aead_vec_cfg()
1932 if (req->cryptlen != (enc ? vec->plen : vec->clen) || in test_aead_vec_cfg()
1933 req->assoclen != vec->alen || in test_aead_vec_cfg()
1943 if (req->cryptlen != (enc ? vec->plen : vec->clen)) in test_aead_vec_cfg()
1945 if (req->assoclen != vec->alen) in test_aead_vec_cfg()
1976 expected_error = vec->novrfy ? -EBADMSG : vec->crypt_error; in test_aead_vec_cfg()
1991 err = verify_correct_output(&tsgls->dst, enc ? vec->ctext : vec->ptext, in test_aead_vec_cfg()
1992 enc ? vec->clen : vec->plen, in test_aead_vec_cfg()
1993 vec->alen, enc || !cfg->inplace); in test_aead_vec_cfg()
2009 const struct aead_testvec *vec, unsigned int vec_num, in test_aead_vec() argument
2017 if (enc && vec->novrfy) in test_aead_vec()
2023 err = test_aead_vec_cfg(driver, enc, vec, vec_name, in test_aead_vec()
2038 err = test_aead_vec_cfg(driver, enc, vec, vec_name, in test_aead_vec()
2055 struct aead_testvec *vec, in generate_random_aead_testvec() argument
2071 vec->klen = maxkeysize; in generate_random_aead_testvec()
2073 vec->klen = prandom_u32() % (maxkeysize + 1); in generate_random_aead_testvec()
2074 generate_random_bytes((u8 *)vec->key, vec->klen); in generate_random_aead_testvec()
2075 vec->setkey_error = crypto_aead_setkey(tfm, vec->key, vec->klen); in generate_random_aead_testvec()
2078 generate_random_bytes((u8 *)vec->iv, ivsize); in generate_random_aead_testvec()
2087 vec->setauthsize_error = crypto_aead_setauthsize(tfm, authsize); in generate_random_aead_testvec()
2092 vec->alen = 0; in generate_random_aead_testvec()
2094 vec->alen = generate_random_length(total_len); in generate_random_aead_testvec()
2095 vec->plen = total_len - vec->alen; in generate_random_aead_testvec()
2096 generate_random_bytes((u8 *)vec->assoc, vec->alen); in generate_random_aead_testvec()
2097 generate_random_bytes((u8 *)vec->ptext, vec->plen); in generate_random_aead_testvec()
2099 vec->clen = vec->plen + authsize; in generate_random_aead_testvec()
2105 if (vec->setkey_error || vec->setauthsize_error) in generate_random_aead_testvec()
2111 if (vec->alen) in generate_random_aead_testvec()
2112 sg_set_buf(&src[i++], vec->assoc, vec->alen); in generate_random_aead_testvec()
2113 if (vec->plen) in generate_random_aead_testvec()
2114 sg_set_buf(&src[i++], vec->ptext, vec->plen); in generate_random_aead_testvec()
2115 sg_init_one(&dst, vec->ctext, vec->alen + vec->clen); in generate_random_aead_testvec()
2116 memcpy(iv, vec->iv, ivsize); in generate_random_aead_testvec()
2118 aead_request_set_crypt(req, src, &dst, vec->plen, iv); in generate_random_aead_testvec()
2119 aead_request_set_ad(req, vec->alen); in generate_random_aead_testvec()
2120 vec->crypt_error = crypto_wait_req(crypto_aead_encrypt(req), &wait); in generate_random_aead_testvec()
2121 if (vec->crypt_error == 0) in generate_random_aead_testvec()
2122 memmove((u8 *)vec->ctext, vec->ctext + vec->alen, vec->clen); in generate_random_aead_testvec()
2126 vec->alen, vec->plen, authsize, vec->klen); in generate_random_aead_testvec()
2150 struct aead_testvec vec = { 0 }; in test_aead_vs_generic_impl() local
2228 vec.key = kmalloc(maxkeysize, GFP_KERNEL); in test_aead_vs_generic_impl()
2229 vec.iv = kmalloc(ivsize, GFP_KERNEL); in test_aead_vs_generic_impl()
2230 vec.assoc = kmalloc(maxdatasize, GFP_KERNEL); in test_aead_vs_generic_impl()
2231 vec.ptext = kmalloc(maxdatasize, GFP_KERNEL); in test_aead_vs_generic_impl()
2232 vec.ctext = kmalloc(maxdatasize, GFP_KERNEL); in test_aead_vs_generic_impl()
2233 if (!vec.key || !vec.iv || !vec.assoc || !vec.ptext || !vec.ctext) { in test_aead_vs_generic_impl()
2239 generate_random_aead_testvec(generic_req, &vec, in test_aead_vs_generic_impl()
2244 err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, cfg, in test_aead_vs_generic_impl()
2248 err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, cfg, in test_aead_vs_generic_impl()
2257 kfree(vec.key); in test_aead_vs_generic_impl()
2258 kfree(vec.iv); in test_aead_vs_generic_impl()
2259 kfree(vec.assoc); in test_aead_vs_generic_impl()
2260 kfree(vec.ptext); in test_aead_vs_generic_impl()
2261 kfree(vec.ctext); in test_aead_vs_generic_impl()
2435 const struct cipher_testvec *vec, in test_skcipher_vec_cfg() argument
2455 if (vec->wk) in test_skcipher_vec_cfg()
2460 err = crypto_skcipher_setkey(tfm, vec->key, vec->klen); in test_skcipher_vec_cfg()
2462 if (err == vec->setkey_error) in test_skcipher_vec_cfg()
2465 driver, vec_name, vec->setkey_error, err, in test_skcipher_vec_cfg()
2469 if (vec->setkey_error) { in test_skcipher_vec_cfg()
2471 driver, vec_name, vec->setkey_error); in test_skcipher_vec_cfg()
2479 if (vec->generates_iv && !enc) in test_skcipher_vec_cfg()
2480 memcpy(iv, vec->iv_out, ivsize); in test_skcipher_vec_cfg()
2481 else if (vec->iv) in test_skcipher_vec_cfg()
2482 memcpy(iv, vec->iv, ivsize); in test_skcipher_vec_cfg()
2486 if (vec->generates_iv) { in test_skcipher_vec_cfg()
2495 input.iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext; in test_skcipher_vec_cfg()
2496 input.iov_len = vec->len; in test_skcipher_vec_cfg()
2498 vec->len, vec->len, &input, 1); in test_skcipher_vec_cfg()
2509 vec->len, iv); in test_skcipher_vec_cfg()
2518 if (req->cryptlen != vec->len || in test_skcipher_vec_cfg()
2528 if (req->cryptlen != vec->len) in test_skcipher_vec_cfg()
2560 if (err == vec->crypt_error) in test_skcipher_vec_cfg()
2563 driver, op, vec_name, vec->crypt_error, err, cfg->name); in test_skcipher_vec_cfg()
2566 if (vec->crypt_error) { in test_skcipher_vec_cfg()
2568 driver, op, vec_name, vec->crypt_error, cfg->name); in test_skcipher_vec_cfg()
2573 err = verify_correct_output(&tsgls->dst, enc ? vec->ctext : vec->ptext, in test_skcipher_vec_cfg()
2574 vec->len, 0, true); in test_skcipher_vec_cfg()
2587 if (vec->iv_out && memcmp(iv, vec->iv_out, ivsize) != 0) { in test_skcipher_vec_cfg()
2598 const struct cipher_testvec *vec, in test_skcipher_vec() argument
2607 if (fips_enabled && vec->fips_skip) in test_skcipher_vec()
2613 err = test_skcipher_vec_cfg(driver, enc, vec, vec_name, in test_skcipher_vec()
2628 err = test_skcipher_vec_cfg(driver, enc, vec, vec_name, in test_skcipher_vec()
2645 struct cipher_testvec *vec, in generate_random_cipher_testvec() argument
2657 vec->klen = maxkeysize; in generate_random_cipher_testvec()
2659 vec->klen = prandom_u32() % (maxkeysize + 1); in generate_random_cipher_testvec()
2660 generate_random_bytes((u8 *)vec->key, vec->klen); in generate_random_cipher_testvec()
2661 vec->setkey_error = crypto_skcipher_setkey(tfm, vec->key, vec->klen); in generate_random_cipher_testvec()
2664 generate_random_bytes((u8 *)vec->iv, ivsize); in generate_random_cipher_testvec()
2667 vec->len = generate_random_length(maxdatasize); in generate_random_cipher_testvec()
2668 generate_random_bytes((u8 *)vec->ptext, vec->len); in generate_random_cipher_testvec()
2671 if (vec->setkey_error) in generate_random_cipher_testvec()
2675 sg_init_one(&src, vec->ptext, vec->len); in generate_random_cipher_testvec()
2676 sg_init_one(&dst, vec->ctext, vec->len); in generate_random_cipher_testvec()
2677 memcpy(iv, vec->iv, ivsize); in generate_random_cipher_testvec()
2679 skcipher_request_set_crypt(req, &src, &dst, vec->len, iv); in generate_random_cipher_testvec()
2680 vec->crypt_error = crypto_wait_req(crypto_skcipher_encrypt(req), &wait); in generate_random_cipher_testvec()
2683 vec->len, vec->klen); in generate_random_cipher_testvec()
2704 struct cipher_testvec vec = { 0 }; in test_skcipher_vs_generic_impl() local
2781 vec.key = kmalloc(tfm->keysize, GFP_KERNEL); in test_skcipher_vs_generic_impl()
2782 vec.iv = kmalloc(ivsize, GFP_KERNEL); in test_skcipher_vs_generic_impl()
2783 vec.ptext = kmalloc(maxdatasize, GFP_KERNEL); in test_skcipher_vs_generic_impl()
2784 vec.ctext = kmalloc(maxdatasize, GFP_KERNEL); in test_skcipher_vs_generic_impl()
2785 if (!vec.key || !vec.iv || !vec.ptext || !vec.ctext) { in test_skcipher_vs_generic_impl()
2791 generate_random_cipher_testvec(generic_req, &vec, maxdatasize, in test_skcipher_vs_generic_impl()
2795 err = test_skcipher_vec_cfg(driver, ENCRYPT, &vec, vec_name, in test_skcipher_vs_generic_impl()
2799 err = test_skcipher_vec_cfg(driver, DECRYPT, &vec, vec_name, in test_skcipher_vs_generic_impl()
2808 kfree(vec.key); in test_skcipher_vs_generic_impl()
2809 kfree(vec.iv); in test_skcipher_vs_generic_impl()
2810 kfree(vec.ptext); in test_skcipher_vs_generic_impl()
2811 kfree(vec.ctext); in test_skcipher_vs_generic_impl()
3461 static int do_test_kpp(struct crypto_kpp *tfm, const struct kpp_testvec *vec, in do_test_kpp() argument
3481 err = crypto_kpp_set_secret(tfm, vec->secret, vec->secret_size); in do_test_kpp()
3507 if (vec->genkey) { in do_test_kpp()
3516 if (memcmp(vec->expected_a_public, sg_virt(req->dst), in do_test_kpp()
3517 vec->expected_a_public_size)) { in do_test_kpp()
3526 input_buf = kmemdup(vec->b_public, vec->b_public_size, GFP_KERNEL); in do_test_kpp()
3532 sg_init_one(&src, input_buf, vec->b_public_size); in do_test_kpp()
3534 kpp_request_set_input(req, &src, vec->b_public_size); in do_test_kpp()
3545 if (vec->genkey) { in do_test_kpp()
3547 a_ss = kmemdup(sg_virt(req->dst), vec->expected_ss_size, GFP_KERNEL); in do_test_kpp()
3557 err = crypto_kpp_set_secret(tfm, vec->b_secret, in do_test_kpp()
3558 vec->b_secret_size); in do_test_kpp()
3562 sg_init_one(&src, a_public, vec->expected_a_public_size); in do_test_kpp()
3564 kpp_request_set_input(req, &src, vec->expected_a_public_size); in do_test_kpp()
3578 shared_secret = (void *)vec->expected_ss; in do_test_kpp()
3586 vec->expected_ss_size)) { in do_test_kpp()