Lines Matching refs:alg

63 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
140 const char *alg;
144 int fips_allowed; /* set if alg is allowed in fips mode */
1209 pr_err("alg: generic driver name for \"%s\" would be too long\n",
1247 pr_err("alg: %s: %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
1252 pr_err("alg: %s: %s overran result buffer on test vector %s, cfg=\"%s\"\n",
1264 pr_err("alg: shash: %s %s() failed with err %d on test vector %s, cfg=\"%s\"\n",
1294 pr_err("alg: shash: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
1300 pr_err("alg: shash: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
1309 pr_err("alg: shash: %s: error preparing scatterlist for test vector %s, cfg=\"%s\"\n",
1333 pr_err("alg: shash: %s digest() failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
1339 pr_err("alg: shash: %s digest() unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
1392 pr_err("alg: shash: %s export() overran state buffer on test vector %s, cfg=\"%s\"\n",
1441 pr_err("alg: ahash: %s %s() failed with err %d on test vector %s, cfg=\"%s\"\n",
1446 pr_err("alg: ahash: %s %s() used result buffer on test vector %s, cfg=\"%s\"\n",
1482 pr_err("alg: ahash: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
1488 pr_err("alg: ahash: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
1497 pr_err("alg: ahash: %s: error preparing scatterlist for test vector %s, cfg=\"%s\"\n",
1517 pr_err("alg: ahash: %s digest() failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
1523 pr_err("alg: ahash: %s digest() unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
1572 pr_err("alg: ahash: %s export() overran state buffer on test vector %s, cfg=\"%s\"\n",
1601 pr_err("alg: ahash: %s final() failed with err %d on test vector %s, cfg=\"%s\"\n",
1609 pr_err("alg: ahash: %s finup() failed with err %d on test vector %s, cfg=\"%s\"\n",
1776 pr_warn("alg: hash: skipping comparison tests for %s because %s is unavailable\n",
1780 pr_err("alg: hash: error allocating %s (generic impl of %s): %d\n",
1802 pr_err("alg: hash: digestsize for %s (%u) doesn't match generic impl (%u)\n",
1810 pr_err("alg: hash: blocksize for %s (%u) doesn't match generic impl (%u)\n",
1880 pr_err("alg: hash: failed to allocate shash transform for %s: %ld\n",
1919 pr_err("alg: hash: failed to allocate transform for %s: %ld\n",
1927 pr_err("alg: hash: failed to allocate request for %s\n",
1943 pr_err("alg: hash: failed to allocate test buffers for %s\n",
1956 pr_err("alg: hash: failed to allocate hash state buffer for %s\n",
2007 pr_err("alg: hash: test vectors for %s out of order, "
2008 "unkeyed ones must come first\n", desc->alg);
2059 pr_err("alg: aead: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
2065 pr_err("alg: aead: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
2073 pr_err("alg: aead: %s setauthsize failed on test vector %s; expected_error=%d, actual_error=%d\n",
2078 pr_err("alg: aead: %s setauthsize unexpectedly succeeded on test vector %s; expected_error=%d\n",
2106 pr_err("alg: aead: %s %s: error preparing scatterlists for test vector %s, cfg=\"%s\"\n",
2134 pr_err("alg: aead: %s %s corrupted request struct on test vector %s, cfg=\"%s\"\n",
2137 pr_err("alg: aead: changed 'req->cryptlen'\n");
2139 pr_err("alg: aead: changed 'req->assoclen'\n");
2141 pr_err("alg: aead: changed 'req->iv'\n");
2143 pr_err("alg: aead: changed 'req->src'\n");
2145 pr_err("alg: aead: changed 'req->dst'\n");
2147 pr_err("alg: aead: changed 'req->base.tfm'\n");
2149 pr_err("alg: aead: changed 'req->base.complete'\n");
2151 pr_err("alg: aead: changed 'req->base.flags'\n");
2153 pr_err("alg: aead: changed 'req->base.data'\n");
2157 pr_err("alg: aead: %s %s corrupted src sgl on test vector %s, cfg=\"%s\"\n",
2163 pr_err("alg: aead: %s %s corrupted dst sgl on test vector %s, cfg=\"%s\"\n",
2182 pr_err("alg: aead: %s %s failed on test vector %s; expected_error=%s, actual_error=%d, cfg=\"%s\"\n",
2187 pr_err("alg: aead: %s %s unexpectedly succeeded on test vector %s; expected_error=%s, cfg=\"%s\"\n",
2200 pr_err("alg: aead: %s %s overran dst buffer on test vector %s, cfg=\"%s\"\n",
2205 pr_err("alg: aead: %s %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
2514 pr_warn("alg: aead: skipping comparison tests for %s because %s is unavailable\n",
2518 pr_err("alg: aead: error allocating %s (generic impl of %s): %d\n",
2533 pr_err("alg: aead: maxauthsize for %s (%u) doesn't match generic impl (%u)\n",
2541 pr_err("alg: aead: ivsize for %s (%u) doesn't match generic impl (%u)\n",
2549 pr_err("alg: aead: blocksize for %s (%u) doesn't match generic impl (%u)\n",
2677 pr_err("alg: aead: empty test suite for %s\n", driver);
2683 pr_err("alg: aead: failed to allocate transform for %s: %ld\n",
2691 pr_err("alg: aead: failed to allocate request for %s\n",
2699 pr_err("alg: aead: failed to allocate test buffers for %s\n",
2768 pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n",
2774 pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n",
2792 printk(KERN_ERR "alg: cipher: Test %d failed "
2839 pr_err("alg: skcipher: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n",
2845 pr_err("alg: skcipher: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n",
2862 pr_err("alg: skcipher: %s has ivsize=0 but test vector %s generates IV!\n",
2875 pr_err("alg: skcipher: %s %s: error preparing scatterlists for test vector %s, cfg=\"%s\"\n",
2901 pr_err("alg: skcipher: %s %s corrupted request struct on test vector %s, cfg=\"%s\"\n",
2904 pr_err("alg: skcipher: changed 'req->cryptlen'\n");
2906 pr_err("alg: skcipher: changed 'req->iv'\n");
2908 pr_err("alg: skcipher: changed 'req->src'\n");
2910 pr_err("alg: skcipher: changed 'req->dst'\n");
2912 pr_err("alg: skcipher: changed 'req->base.tfm'\n");
2914 pr_err("alg: skcipher: changed 'req->base.complete'\n");
2916 pr_err("alg: skcipher: changed 'req->base.flags'\n");
2918 pr_err("alg: skcipher: changed 'req->base.data'\n");
2922 pr_err("alg: skcipher: %s %s corrupted src sgl on test vector %s, cfg=\"%s\"\n",
2928 pr_err("alg: skcipher: %s %s corrupted dst sgl on test vector %s, cfg=\"%s\"\n",
2937 pr_err("alg: skcipher: %s %s failed on test vector %s; expected_error=%d, actual_error=%d, cfg=\"%s\"\n",
2942 pr_err("alg: skcipher: %s %s unexpectedly succeeded on test vector %s; expected_error=%d, cfg=\"%s\"\n",
2951 pr_err("alg: skcipher: %s %s overran dst buffer on test vector %s, cfg=\"%s\"\n",
2956 pr_err("alg: skcipher: %s %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n",
2963 pr_err("alg: skcipher: %s %s test failed (wrong output IV) on test vector %s, cfg=\"%s\"\n",
3122 pr_warn("alg: skcipher: skipping comparison tests for %s because %s is unavailable\n",
3126 pr_err("alg: skcipher: error allocating %s (generic impl of %s): %d\n",
3147 pr_err("alg: skcipher: min keysize for %s (%u) doesn't match generic impl (%u)\n",
3155 pr_err("alg: skcipher: max keysize for %s (%u) doesn't match generic impl (%u)\n",
3163 pr_err("alg: skcipher: ivsize for %s (%u) doesn't match generic impl (%u)\n",
3170 pr_err("alg: skcipher: blocksize for %s (%u) doesn't match generic impl (%u)\n",
3254 pr_err("alg: skcipher: empty test suite for %s\n", driver);
3260 pr_err("alg: skcipher: failed to allocate transform for %s: %ld\n",
3268 pr_err("alg: skcipher: failed to allocate request for %s\n",
3276 pr_err("alg: skcipher: failed to allocate test buffers for %s\n",
3329 printk(KERN_ERR "alg: comp: compression failed "
3340 pr_err("alg: comp: compression failed: decompress: on test %d for %s failed: ret=%d\n",
3346 printk(KERN_ERR "alg: comp: Compression test %d "
3355 pr_err("alg: comp: compression failed: output differs: on test %d for %s\n",
3373 printk(KERN_ERR "alg: comp: decompression failed "
3380 printk(KERN_ERR "alg: comp: Decompression test %d "
3388 printk(KERN_ERR "alg: comp: Decompression test %d "
3445 pr_err("alg: acomp: request alloc failed for %s\n",
3458 pr_err("alg: acomp: compression failed on test %d for %s: ret=%d\n",
3474 pr_err("alg: acomp: compression failed on test %d for %s: ret=%d\n",
3482 pr_err("alg: acomp: Compression test %d failed for %s: output len = %d\n",
3491 pr_err("alg: acomp: Compression test %d failed for %s\n",
3507 pr_err("alg: acomp: compression failed on NULL dst buffer test %d for %s: ret=%d\n",
3537 pr_err("alg: acomp: request alloc failed for %s\n",
3550 pr_err("alg: acomp: decompression failed on test %d for %s: ret=%d\n",
3558 pr_err("alg: acomp: Decompression test %d failed for %s: output len = %d\n",
3567 pr_err("alg: acomp: Decompression test %d failed for %s\n",
3582 pr_err("alg: acomp: decompression failed on NULL dst buffer test %d for %s: ret=%d\n",
3615 printk(KERN_ERR "alg: cprng: Failed to allocate seed space "
3631 printk(KERN_ERR "alg: cprng: Failed to reset rng "
3640 printk(KERN_ERR "alg: cprng: Failed to obtain "
3651 printk(KERN_ERR "alg: cprng: Test %d failed for %s\n",
3673 printk(KERN_ERR "alg: cipher: Failed to load transform for "
3697 pr_err("alg: acomp: Failed to load transform for %s: %ld\n",
3709 pr_err("alg: comp: Failed to load transform for %s: %ld\n",
3745 printk(KERN_ERR "alg: crc32c: Failed to load transform for %s: "
3760 printk(KERN_ERR "alg: crc32c: Operation failed for "
3766 pr_err("alg: crc32c: Test failed for %s: %u\n",
3785 printk(KERN_ERR "alg: cprng: Failed to load transform for %s: "
3812 printk(KERN_ERR "alg: drbg: could not allocate DRNG handle for "
3823 printk(KERN_ERR "alg: drbg: Failed to reset rng\n");
3837 printk(KERN_ERR "alg: drbg: could not obtain random data for "
3852 printk(KERN_ERR "alg: drbg: could not obtain random data for "
3881 printk(KERN_ERR "alg: drbg: Test %d failed for %s\n",
3892 const char *alg)
3932 pr_err("alg: %s: Party A: generate public key test failed. err %d\n",
3933 alg, err);
3948 pr_err("alg: %s: Party A: generate public key test failed. Invalid output\n",
3949 alg);
3970 pr_err("alg: %s: Party A: compute shared secret test failed. err %d\n",
3971 alg, err);
4001 pr_err("alg: %s: Party B: compute shared secret failed. err %d\n",
4002 alg, err);
4017 pr_err("alg: %s: compute shared secret test failed. Invalid output\n",
4018 alg);
4033 static int test_kpp(struct crypto_kpp *tfm, const char *alg,
4039 ret = do_test_kpp(tfm, vecs++, alg);
4041 pr_err("alg: %s: test failed on vector %d, err=%d\n",
4042 alg, i + 1, ret);
4057 pr_err("alg: kpp: Failed to load tfm for %s: %ld\n",
4062 err = test_kpp(tfm, desc->alg, desc->suite.kpp.vecs,
4172 pr_err("alg: akcipher: %s test failed. err %d\n", op, err);
4177 pr_err("alg: akcipher: %s test failed. Invalid output len\n",
4184 pr_err("alg: akcipher: %s test failed. Invalid output\n",
4228 pr_err("alg: akcipher: %s test failed. err %d\n", op, err);
4233 pr_err("alg: akcipher: %s test failed. Invalid output len %u\n",
4241 pr_err("alg: akcipher: %s test failed. Invalid output\n", op);
4257 static int test_akcipher(struct crypto_akcipher *tfm, const char *alg,
4270 pr_err("alg: akcipher: test %d failed for %s, err=%d\n",
4285 pr_err("alg: akcipher: Failed to load tfm for %s: %ld\n",
4290 err = test_akcipher(tfm, desc->alg, desc->suite.akcipher.vecs,
4309 .alg = "adiantum(xchacha12,aes)",
4316 .alg = "adiantum(xchacha20,aes)",
4323 .alg = "aegis128",
4329 .alg = "ansi_cprng",
4335 .alg = "authenc(hmac(md5),ecb(cipher_null))",
4341 .alg = "authenc(hmac(sha1),cbc(aes))",
4348 .alg = "authenc(hmac(sha1),cbc(des))",
4354 .alg = "authenc(hmac(sha1),cbc(des3_ede))",
4360 .alg = "authenc(hmac(sha1),ctr(aes))",
4364 .alg = "authenc(hmac(sha1),ecb(cipher_null))",
4370 .alg = "authenc(hmac(sha1),rfc3686(ctr(aes)))",
4374 .alg = "authenc(hmac(sha224),cbc(des))",
4380 .alg = "authenc(hmac(sha224),cbc(des3_ede))",
4386 .alg = "authenc(hmac(sha256),cbc(aes))",
4393 .alg = "authenc(hmac(sha256),cbc(des))",
4399 .alg = "authenc(hmac(sha256),cbc(des3_ede))",
4405 .alg = "authenc(hmac(sha256),ctr(aes))",
4409 .alg = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
4413 .alg = "authenc(hmac(sha384),cbc(des))",
4419 .alg = "authenc(hmac(sha384),cbc(des3_ede))",
4425 .alg = "authenc(hmac(sha384),ctr(aes))",
4429 .alg = "authenc(hmac(sha384),rfc3686(ctr(aes)))",
4433 .alg = "authenc(hmac(sha512),cbc(aes))",
4440 .alg = "authenc(hmac(sha512),cbc(des))",
4446 .alg = "authenc(hmac(sha512),cbc(des3_ede))",
4452 .alg = "authenc(hmac(sha512),ctr(aes))",
4456 .alg = "authenc(hmac(sha512),rfc3686(ctr(aes)))",
4460 .alg = "blake2b-160",
4467 .alg = "blake2b-256",
4474 .alg = "blake2b-384",
4481 .alg = "blake2b-512",
4488 .alg = "cbc(aes)",
4495 .alg = "cbc(anubis)",
4501 .alg = "cbc(aria)",
4507 .alg = "cbc(blowfish)",
4513 .alg = "cbc(camellia)",
4519 .alg = "cbc(cast5)",
4525 .alg = "cbc(cast6)",
4531 .alg = "cbc(des)",
4537 .alg = "cbc(des3_ede)",
4546 .alg = "cbc(paes)",
4553 .alg = "cbc(psm4)",
4556 .alg = "cbc(serpent)",
4562 .alg = "cbc(sm4)",
4568 .alg = "cbc(twofish)",
4575 .alg = "cbc-paes-s390",
4583 .alg = "cbcmac(aes)",
4589 .alg = "cbcmac(sm4)",
4595 .alg = "ccm(aes)",
4606 .alg = "ccm(sm4)",
4616 .alg = "cfb(aes)",
4623 .alg = "cfb(aria)",
4629 .alg = "cfb(sm4)",
4635 .alg = "chacha20",
4641 .alg = "cmac(aes)",
4648 .alg = "cmac(camellia)",
4654 .alg = "cmac(des3_ede)",
4660 .alg = "cmac(sm4)",
4666 .alg = "compress_null",
4669 .alg = "crc32",
4676 .alg = "crc32c",
4683 .alg = "crc64-rocksoft",
4690 .alg = "crct10dif",
4697 .alg = "ctr(aes)",
4704 .alg = "ctr(aria)",
4710 .alg = "ctr(blowfish)",
4716 .alg = "ctr(camellia)",
4722 .alg = "ctr(cast5)",
4728 .alg = "ctr(cast6)",
4734 .alg = "ctr(des)",
4740 .alg = "ctr(des3_ede)",
4749 .alg = "ctr(paes)",
4757 .alg = "ctr(psm4)",
4760 .alg = "ctr(serpent)",
4766 .alg = "ctr(sm4)",
4772 .alg = "ctr(twofish)",
4779 .alg = "ctr-paes-s390",
4787 .alg = "cts(cbc(aes))",
4797 .alg = "cts(cbc(paes))",
4801 .alg = "cts(cbc(sm4))",
4807 .alg = "curve25519",
4813 .alg = "deflate",
4823 .alg = "dh",
4829 .alg = "digest_null",
4832 .alg = "drbg_nopr_ctr_aes128",
4839 .alg = "drbg_nopr_ctr_aes192",
4846 .alg = "drbg_nopr_ctr_aes256",
4857 .alg = "drbg_nopr_hmac_sha1",
4861 .alg = "drbg_nopr_hmac_sha256",
4869 .alg = "drbg_nopr_hmac_sha384",
4872 .alg = "drbg_nopr_hmac_sha512",
4879 .alg = "drbg_nopr_sha1",
4883 .alg = "drbg_nopr_sha256",
4891 .alg = "drbg_nopr_sha384",
4894 .alg = "drbg_nopr_sha512",
4898 .alg = "drbg_pr_ctr_aes128",
4906 .alg = "drbg_pr_ctr_aes192",
4910 .alg = "drbg_pr_ctr_aes256",
4914 .alg = "drbg_pr_hmac_sha1",
4918 .alg = "drbg_pr_hmac_sha256",
4926 .alg = "drbg_pr_hmac_sha384",
4929 .alg = "drbg_pr_hmac_sha512",
4933 .alg = "drbg_pr_sha1",
4937 .alg = "drbg_pr_sha256",
4945 .alg = "drbg_pr_sha384",
4948 .alg = "drbg_pr_sha512",
4952 .alg = "ecb(aes)",
4959 .alg = "ecb(anubis)",
4965 .alg = "ecb(arc4)",
4972 .alg = "ecb(aria)",
4978 .alg = "ecb(blowfish)",
4984 .alg = "ecb(camellia)",
4990 .alg = "ecb(cast5)",
4996 .alg = "ecb(cast6)",
5002 .alg = "ecb(cipher_null)",
5006 .alg = "ecb(des)",
5012 .alg = "ecb(des3_ede)",
5018 .alg = "ecb(fcrypt)",
5027 .alg = "ecb(khazad)",
5036 .alg = "ecb(paes)",
5040 .alg = "ecb(seed)",
5046 .alg = "ecb(serpent)",
5052 .alg = "ecb(sm4)",
5058 .alg = "ecb(tea)",
5064 .alg = "ecb(twofish)",
5070 .alg = "ecb(xeta)",
5076 .alg = "ecb(xtea)",
5083 .alg = "ecb-paes-s390",
5091 .alg = "ecdh-nist-p192",
5097 .alg = "ecdh-nist-p256",
5104 .alg = "ecdh-nist-p384",
5111 .alg = "ecdsa-nist-p192",
5117 .alg = "ecdsa-nist-p256",
5124 .alg = "ecdsa-nist-p384",
5131 .alg = "ecrdsa",
5137 .alg = "essiv(authenc(hmac(sha256),cbc(aes)),sha256)",
5144 .alg = "essiv(cbc(aes),sha256)",
5152 .alg = "ffdhe2048(dh)",
5159 .alg = "ffdhe3072(dh)",
5166 .alg = "ffdhe4096(dh)",
5173 .alg = "ffdhe6144(dh)",
5180 .alg = "ffdhe8192(dh)",
5188 .alg = "gcm(aes)",
5196 .alg = "gcm(aria)",
5203 .alg = "gcm(sm4)",
5210 .alg = "ghash",
5216 .alg = "hctr2(aes)",
5224 .alg = "hmac(md5)",
5230 .alg = "hmac(rmd160)",
5236 .alg = "hmac(sha1)",
5243 .alg = "hmac(sha224)",
5250 .alg = "hmac(sha256)",
5257 .alg = "hmac(sha3-224)",
5264 .alg = "hmac(sha3-256)",
5271 .alg = "hmac(sha3-384)",
5278 .alg = "hmac(sha3-512)",
5285 .alg = "hmac(sha384)",
5292 .alg = "hmac(sha512)",
5299 .alg = "hmac(sm3)",
5305 .alg = "hmac(streebog256)",
5311 .alg = "hmac(streebog512)",
5317 .alg = "jitterentropy_rng",
5321 .alg = "kw(aes)",
5328 .alg = "lrw(aes)",
5335 .alg = "lrw(camellia)",
5342 .alg = "lrw(cast6)",
5349 .alg = "lrw(serpent)",
5356 .alg = "lrw(twofish)",
5363 .alg = "lz4",
5373 .alg = "lz4hc",
5383 .alg = "lzo",
5393 .alg = "lzo-rle",
5403 .alg = "md4",
5409 .alg = "md5",
5415 .alg = "michael_mic",
5421 .alg = "nhpoly1305",
5427 .alg = "ofb(aes)",
5437 .alg = "ofb(paes)",
5441 .alg = "ofb(sm4)",
5447 .alg = "pcbc(fcrypt)",
5453 .alg = "pkcs1pad(rsa,sha224)",
5457 .alg = "pkcs1pad(rsa,sha256)",
5464 .alg = "pkcs1pad(rsa,sha384)",
5468 .alg = "pkcs1pad(rsa,sha512)",
5472 .alg = "poly1305",
5478 .alg = "polyval",
5484 .alg = "rfc3686(ctr(aes))",
5491 .alg = "rfc3686(ctr(sm4))",
5497 .alg = "rfc4106(gcm(aes))",
5509 .alg = "rfc4309(ccm(aes))",
5521 .alg = "rfc4543(gcm(aes))",
5532 .alg = "rfc7539(chacha20,poly1305)",
5538 .alg = "rfc7539esp(chacha20,poly1305)",
5548 .alg = "rmd160",
5554 .alg = "rsa",
5561 .alg = "sha1",
5568 .alg = "sha224",
5575 .alg = "sha256",
5582 .alg = "sha3-224",
5589 .alg = "sha3-256",
5596 .alg = "sha3-384",
5603 .alg = "sha3-512",
5610 .alg = "sha384",
5617 .alg = "sha512",
5624 .alg = "sm2",
5630 .alg = "sm3",
5636 .alg = "streebog256",
5642 .alg = "streebog512",
5648 .alg = "vmac64(aes)",
5654 .alg = "wp256",
5660 .alg = "wp384",
5666 .alg = "wp512",
5672 .alg = "xcbc(aes)",
5678 .alg = "xcbc(sm4)",
5684 .alg = "xchacha12",
5690 .alg = "xchacha20",
5696 .alg = "xctr(aes)",
5702 .alg = "xts(aes)",
5710 .alg = "xts(camellia)",
5717 .alg = "xts(cast6)",
5727 .alg = "xts(paes)",
5731 .alg = "xts(serpent)",
5738 .alg = "xts(sm4)",
5745 .alg = "xts(twofish)",
5753 .alg = "xts-paes-s390",
5761 .alg = "xts4096(paes)",
5765 .alg = "xts512(paes)",
5769 .alg = "xxhash64",
5776 .alg = "zlib-deflate",
5786 .alg = "zstd",
5803 int diff = strcmp(alg_test_descs[i - 1].alg,
5804 alg_test_descs[i].alg);
5808 alg_test_descs[i - 1].alg,
5809 alg_test_descs[i].alg);
5814 alg_test_descs[i].alg);
5838 pr_warn("alg: extra crypto tests enabled. This is intended for developer use only.\n");
5842 static int alg_find_test(const char *alg)
5849 int diff = strcmp(alg_test_descs[i].alg, alg);
5867 static int alg_fips_disabled(const char *driver, const char *alg)
5869 pr_info("alg: %s (%s) is disabled due to FIPS\n", alg, driver);
5874 int alg_test(const char *driver, const char *alg, u32 type, u32 mask)
5881 printk_once(KERN_INFO "alg: self-tests disabled\n");
5890 if (snprintf(nalg, sizeof(nalg), "ecb(%s)", alg) >=
5905 i = alg_find_test(alg);
5930 panic("alg: self-tests for %s (%s) failed in %s mode!\n",
5931 driver, alg,
5934 pr_warn("alg: self-tests for %s using %s failed (rc=%d)",
5935 alg, driver, rc);
5937 "alg: self-tests for %s using %s failed (rc=%d)",
5938 alg, driver, rc);
5941 pr_info("alg: self-tests for %s (%s) passed\n",
5942 driver, alg);
5948 printk(KERN_INFO "alg: No test for %s (%s)\n", alg, driver);
5951 return alg_fips_disabled(driver, alg);
5955 return alg_fips_disabled(driver, alg);